Current location - Quotes Website - Signature design - Can I ask for the written and computer-based test questions for last year’s Computer Level 2 and Level 3 exams?
Can I ask for the written and computer-based test questions for last year’s Computer Level 2 and Level 3 exams?

I have four questions

Cannot send them

September 2006 National Computer Grade Examination Level 3 Network Technology Written Test Paper

1. Multiple choice questions (1 point for each question, ***60 points)

Among the four options A), B), C) and D) for the following questions, only one option is correct. Please write the correct option

in the corresponding position on the answer sheet. Answers will not be scored on the test paper.

(1) Microprocessors have entered the era of dual-core and 64-bit. The company currently competing comprehensively with Intel in chip technology and achieving impressive results is ______.

A) AMD Company

B) HP Company

C) SUN Company

D) IBM Company

(2) In 1983, ARPANET officially adopted the TCP/IP protocol, marking the emergence of the Internet. The earliest time when our country was officially connected to the Internet was______.

A) 1984

B) 1988

C) 1994

D) 1998

(3) Which of the following descriptions of the Pentium processor architecture is incorrect?

A) The Harvard architecture is a mixed storage of instructions and data

B) The characteristics of super-pipeline technology are to increase the main frequency and refine the pipeline

C) The characteristic of superscalar technology is to set up multiple pipelines to execute multiple processes at the same time

D) Branch prediction can dynamically predict the transfer of program branches

(4) The following description of the PCI local bus Which one is wrong?

A) PCI means peripheral component interface

B) PCI means personal computer interface

C) PCI has obvious advantages over EISA

p>

D) PCI has obvious advantages over VESA

(5) Which of the following descriptions about motherboards is incorrect?

A) According to the CPU socket, there are Slot motherboards and Socket motherboards

B) According to the specifications of the motherboard, there are TX motherboards and DX motherboards

C) According to data The ports are classified into SCSI motherboards and EDO motherboards

D) The display slots are classified into PCI motherboards and USB motherboards

(6) Which of the following descriptions of application software is correct? of?

A) Microsoft's browsing software is Internet Explorer

B) Desktop publishing software includes Publisher and Powerpoint

C) Spreadsheet software includes Excel and Access< /p>

D) Kingsoft’s word processing system is WPS 2000

(7) Which of the following descriptions of computer network characteristics is incorrect?

A) The main purpose of establishing a computer network is to realize the sharing of computer resources

B) Network users can call multiple computers in the network to complete a certain task simultaneously.

C) Networked computers can work both online and offline

D) Networked computers must use a unified operating system

(8) What kind of wide area network Is the technology developed on the basis of the X.25 public packet switching network?

A) ATM

B) Frame Relay

C) ADSL

D) Optical fiber distributed data interface

(9) In the actual computer network establishment process, what should be done first?

A) Network topology design

B) Equipment selection

C) Application structure design

D) Network protocol selection Type

(10) The design goal of Integrated Services Digital Network ISDN is to provide a harmonized digital communication network around the world, support various communication services, and use the same ______ in different countries .

A) Standard

B) Structure

C) Equipment

D) Application

(11) The transmission medium used in the backbone network of the metropolitan area network is mainly ______.

A) Coaxial cable B) Optical fiber

C) Shielded double rubber wire

D) Wireless channel

(12) Commonly used The data transmission rate units include kbps, Mbps, and Gips. If the transmission rate of the LAN is 100Mbps, then the time required to send 1 bit of data is ______.

A) 1×10-6s

B) 1×10-7s

C) 1×10-8s

D ) 1×10-9s

(13) The bit error rate refers to the ______ of binary symbols being transmitted incorrectly in the data transmission system.

A) Number of bits

B) Number of bytes

C) Probability

D) Speed

(14) The T1 carrier rate is ______.

A) 1.544Mbps

B) 2.048Mbps

C) 64kbps

D) 128kbps

( 15) Which of the following statements about the OSI reference model is incorrect?

A) The OSI reference model defines the hierarchical structure of the open system

B) The OSI reference model defines the possible services included in each layer

C) The OSI reference model defines the implementation methods of interfaces at each layer

D) The OSI reference model serves as a framework to coordinate and organize the formulation of protocols at each layer

(16) Address Resolution Protocol ARP belongs to TCP/ Which layer of IP?

A) Host-network layer

B) Interconnect layer

C) Transport layer

D) Application layer

(17) What does the IEEE 802.1 standard mainly include?

I. LAN architecture

II. Network interconnection

III. Network management

IV. Performance test

< p>A) Only Ⅰ and Ⅱ

B) Only Ⅰ, Ⅱ and Ⅲ

C) Only Ⅱ and Ⅲ

D) All

(18) The IEEE 802.3z standard defines the Gigabit Medium Specific Interface GMI to separate the MAC sublayer and ______.

A) Physical layer

B) LLC sublayer

C) Signal encoding method

D) Transmission medium

(19) An Ethernet switch is essentially a multi-port ______.

A) Repeater

B) Hub

C) Bridge

D) Router

(20) The advantage of Ethernet switches using direct switching is short switching delay time, but the disadvantage is the lack of ______.

A) Concurrent switching capability

B) Error detection capability

C) Routing capability

D) Address resolution capability

(21) If 4 HUBs that comply with the 10BASET standard are connected, the maximum distance between the two computers that are farthest apart in this LAN is ______.

A) 200 meters

B) 300 meters

C) 400 meters

D) 500 meters

(22) Which of the following descriptions of Ethernet addresses is wrong?

A) The Ethernet address is commonly known as the MAC address

B) The MAC address is also called the LAN hardware address

C) Domain name resolution will inevitably use the MAC Address

D) The LAN hardware address is stored in the network card

(23) Which of the following addresses is the MAC address?

A) 0D-01-22-AA

B) 00-01-22-0A-AD-01

C) A0.01.00

p>

D)139.216.000.012.002

(24) In an Ethernet, there are four hosts A, B, C, and D. If A sends data to B, then ______.

A) Only B can receive the data

B) All four hosts can receive the data

C) Only B, C, and D can receive the data Data

D) None of the four hosts can receive data

(25) Which of the following descriptions of virtual local area characteristics is incorrect?

A) Virtual LAN is built on a LAN switch or ATM switch

B) Virtual LAN can divide the nodes on the network into several logical work groups according to the nature of work and needs< /p>

C) Virtual LAN implements the division and management of logical work groups through software

D) Members of the same logical work group must be connected to the same physical network segment

< p> (26) Which of the following descriptions of operating systems is incorrect?

A) DOS is a single-task graphical interface operating system

B) DOS searches for disk files through FAT files

C) Windows is a multi-tasking graphical interface Interface operating system

D) Windows looks for disk files through the virtual file table VFAT

(27) Which of the following descriptions of network operating systems is incorrect?

A) Shield the difference between local resources and network resources

B) Have hardware independence and support multiple platforms

C) Provide file services and printing Management

D) Client and server software are interchangeable

(28) Which of the following statements about Windows 2000 is incorrect?

A) One of the new features of the server is Active Directory service

B) Domain is the basic management unit

C) Domain controller no longer distinguishes between masters and From the structure

D) The data center version is suitable for digital home use

(29) Which of the following statements about NetWare is incorrect?

A) Powerful file and print service functions

B) Does not support TCP/IP protocol

C) Good compatibility and system fault tolerance

p>

D) Complete security measures

(30) Regarding Linux, which of the following statements is wrong?

A) Linux is an open source operating system

B) Linux provides a powerful application development environment

C) Linux is free to use

p>

D) Linux does not support the Sparc hardware platform

(31) Regarding the characteristics of the Unix operating system, which of the following statements is incorrect?

A) Unix is ??an operating system that supports multi-tasking and multi-users

B) Unix itself is written in Pascal language, easy to read and easy to transplant

C) Unix provides a powerful Shell programming language

D) Unix's tree structure file system has good security and maintainability

(32) The bandwidth of the communication line is a description of communication The ______ of the line.

A) Error correction capability

B) Physical size

C) Interconnection capability

D) Transmission capability

< p>(33) In the Internet, which of the following protocols is mainly used to shield the differences between physical networks?

A) NETBEIU

B)IP

C)TCP

D)SNMP

(34) Which of the following is a private IP address that users can use only within the local internal network?

A)192.168.1.1

B)20.10.1.1

C)202.113.1.1

D)203.5.1.1

p>

(35) Regarding the header of IP datagram, which of the following statements is wrong?

A) The version field indicates the version number of the IP protocol corresponding to the datagram

B) The header checksum field is used to protect the integrity of the IP header

C) The service type field describes the form of data in the data area

D) The lifetime field indicates how long the datagram can survive in the Internet

(36) About static routing , which of the following statements is incorrect?

A) Static routes are usually created manually by administrators

B) Static routes can be used on the Internet with subnet addressing

C) Static routes cannot Automatically changes with changes in the Internet structure

D) Static routing is obsolete and is rarely used at present

(37) In the Internet, the network protocol that routers must implement is

p>

A) IP

B) IP and HTTP

C) IP and FTP

D) HTTP and FTP

(38) Regarding the Internet's domain name system, which of the following statements is incorrect?

A) Domain name resolution needs to be completed with the help of a group of independent and cooperative domain name servers

B) Domain name servers logically form a certain hierarchical structure

C ) Domain name resolution always starts from the root domain name server

D) Domain name resolution includes recursive resolution and repeated resolution

(39) It is possible for IP datagrams to travel through the Internet Be fragmented. After an IP datagram is fragmented, which of the following devices typically reassembles it?

A) Source host

B) Destination host

C) Forwarding router

D) Forwarding switch

(40) Which of the following software is different from FTP client software?

A) DNS

B) IE

C) CuteFtp

D)NetAnts

(41) Which of the following descriptions of the WWW service system is incorrect?

A) The WWW service system adopts the client/server working model

B) The WWW service system locates resources in the system through URLs

C) The WWW service system uses The transmission protocol is HTML

D) Resources in the WWW service system are stored in the form of pages

(42) If a user connects his host to the Internet through the telephone network to access the Internet Web site, then the user does not need to install and configure ______ on this host.

A) Modem

B) Network card

C) TCP/IP protocol

D) WWW browser

< p> (43) Which of the following descriptions of network management functions is incorrect?

A) Configuration management is to master and control the configuration information of the network

B) Fault management is to locate faults in the network

C) Performance management monitoring and adjust working parameters to improve network performance

D) Security management is to maintain network performance at a good level

(44) Which of the following operating systems can reach the C2 security level?

Ⅰ. Windows 3.x

Ⅱ.Apple System 7.x

Ⅲ. Windows NT

IV.NetWare 3. x

A) Ⅰ and Ⅲ

B) Ⅱ and Ⅲ

C) Ⅱ and Ⅳ

D) Ⅲ and Ⅳ< /p>

(45) Which of the following attack methods is a passive attack?

A) Denial of service attack

B) Replay attack

C) Traffic analysis attack

D) Impersonation attack

p>

(46) Which of the following attack(s) is a non-service attack?

Ⅰ. Mail bomb attack

Ⅱ. Source routing attack

Ⅲ. Address spoofing attack

A) Only Ⅰ

B) I and II

C) II and III

D) I and III

(47) The end-to-end encryption method is network It is an important way to encrypt data. Where is the encryption and decryption performed?

A) Source node, intermediate node

B) Intermediate node, destination node

C) Intermediate node, intermediate node

p>

D) Source node, destination node

(48) DES is a commonly used symmetric encryption algorithm, and its general packet length is

A) 32 bits

B) 56 bits

C) 64 bits

D) 128 bits

(49) Which of the following is not the RSA cryptosystem? Characteristics?

A) Its security is based on the large integer factorization problem

B) It is a public key cryptography system

C) Its encryption speed is DES is fast

D) It is often used for digital signatures and authentication

(50) Which of the following methods cannot be used for computer virus detection?

A) Self-verification

B) Encrypted executable program

C) Keyword detection

D) Determine the length of the file

(51) Which of the following descriptions of firewall technology is wrong?

A) Firewalls are divided into two categories: packet filtering and application gateways

B) Firewalls can control external users’ access to internal systems

C) Firewalls can Prevent insiders from attacking external parties

D) Firewalls can analyze and manage network usage

(52) Which of the following statements about IPSec is incorrect?

A) It is a set of protocols for network layer security

B) It can provide data source authentication services

C) It can provide traffic confidentiality services

D) It can only be used in an Ipv4 environment

(53) Regarding SSL and SET protocols, which of the following statements is correct?

A) Both SSL and SET can isolate order information and personal account information

B) Neither SSL nor SET can isolate order information and personal account information

C ) SSL can isolate order information and personal account information, SET cannot

D) SET can isolate order information and personal account information, SSL cannot

(54) Which type of EDI users usually use Does the platform complete data exchange?

A) Dedicated EDI exchange platform

B) General email exchange platform

C) Dedicated virtual LAN

Exchange platform

D) General telephone exchange platform

(55) Regarding the description of the security basic layer in the e-commerce system structure, which of the following statements is incorrect?

A) The security base layer is located at the bottom of the e-commerce system structure

B) The security base layer is used to ensure the security of data transmission

C) Security The base layer can realize the identity authentication of all parties to the transaction

D) The security base layer is used to prevent the occurrence of denials in transactions

(56) Three levels included in the construction of e-government application systems yes______.

A) Network construction, information collection, business processing

B) Information collection, business processing, decision support

C) Business processing, network construction, decision-making Support

D) Information collection, decision support, and network construction

(57) The e-government intranet mainly includes ______.

A) Public service business network, non-confidential government office network and non-confidential government office network

B) Internet, public service business network and non-confidential government office network

p>

China's largest IT technology/IT management/IT education/IT training/IT consulting resource site

C) Internet, public service business network and confidential government office network

< p>D) Internet, non-confidential government office network and confidential government office network

(58) Which of the following is not a main feature of ATM technology?

A) Cell transmission

B) Connectionless oriented

C) Statistical multiplexing

D) Quality of Service Guarantee

(59) Which of the following statements about ADSL technology is wrong?

A) ADSL can have different uplink and downlink transmission rates

B) ADSL can transmit data, video and other information

C) ADSL signals can be combined with voice signals Transmitted on the same pair of telephone lines

D) ADSL can provide 8Mbps downlink channel for users 10km away

(60) Which of the following devices does a wireless LAN usually consist of?

I. Wireless network card

II. Wireless access point

III. Ethernet switch

IV. Computer

A) I, II and III

B) II, III and IV

C) I, II and IV

D) I, III and IV

2. Fill-in-the-blank questions (2 points for each blank, ***40 points)

Please write your answers on the horizontal lines numbered 1 to 20 in the question card There will be no points for answering the questions on the test paper.

(1) Itanium is a 1-bit chip.

(2) The international standard for television-quality video and audio compression is 2.

(3) Computer networks use communication lines to connect multiple computer systems in different geographical locations to achieve maximum sharing of resources.

(4) Computer network topology reflects the 4 relationships between entities in the network.

(5) ARPANET is a 5 switching network.

(6) In the TCP/IP protocol, the transport layer is responsible for providing services for layer 6.

(7) In the network, in order to transmit voice signals together with data, text, graphics, and images, 7 technology must be used to digitize the voice signals.

(8) IEEE 802.11b defines a wireless LAN standard using frequency hopping technology, and its maximum transmission rate can reach 8Mbps.

(9) Early network operating systems experienced the transition from 9 structure to master-slave structure.

(10) The protocol used by the interconnection layer of the next generation Internet is IPv 10.

(11) The IP address of a host is 10.1.1.100, and the shielding code is 255.0.0.0. Now the user needs to configure the default route for this host.

If the only router directly connected to this host has 2 IP addresses, one is 10.2.1.100 with a mask code of 255.0.0.0 and the other is 11.1.1.1 with a mask code of 255.0.0.0, then the default route for this host should be is 11.

(12) The 4-level access control of the website established using IIS is IP address restriction, user authentication, 12 permissions and NTFS permissions.

(13) The 13 protocol is usually used to transmit emails between mail servers.

(14) In the general network management model, a manager can exchange information with multiple 14 to achieve network management.

(15) SNMP is the most commonly used computer network management protocol. SNMPv3 adds and improves the management mechanism based on SNMPv2.

(16) The most commonly used implementation method of digital signature is based on public key cryptography and secure one-way 16 function.

(17) One of the measures to prevent password guessing is to strictly limit consecutive unsuccessful logins from one terminal17.

(18) E-commerce application system includes CA system, 18 system, business application system and user terminal system.

(19) According to relevant national e-government regulations, confidential networks must be 19 isolated from non-confidential networks.

(20) Bluetooth technology is generally used for wireless connections between mobile phones, PCs, handheld terminals and other devices within 20 meters.

Answers to the Level 3 Network Technology Written Test of the National Computer Rank Examination in September 2006

Answers:

1-30 ACABB DDBAA BCCAC BBABB DCBAD ADDBD

31-60BDBAC CACBA CBDDC CDCCB CDAAA BABDC

1)64,

2)MPEG,

3) Autonomy,

4) Structure,

5) Virtual,

6) Application,

7) Modem,

8)11,< /p>

9)Peer to peer,

10)6

11)10.2.1.100

12)wed access

13)SMTP

14)Proxy node

15)Security

16)Hash

17)Number of times

18) Payment gateway

19)Physical

20)10