Current location - Quotes Website - Signature design - Soft test junior network administrator
Soft test junior network administrator
I suggest you read this book: sorting out the exam cases of network administrators, thoroughly solving the real questions, and strengthening training (afternoon questions)

/product.aspx? product_id=20670698

Examination outline:

Basic knowledge of computer and network

Chapter 1 Fundamentals of Computer Science

1. 1 number system and its transformation

1.2 data representation

1.2. 1 original code, complement, complement and shift code

1.2.2 Fixed and floating point numbers

1.2.3 coding of character symbols

1.2.4 sound coding

1.2.5 image coding

Overview of 1.2.6 check code

1.2.7 parity

1.2.8 Hamming code and constant ratio code

1.2.9 cyclic redundancy check code

1.3 Arithmetic and logic operations

1.3. 1 Operation Method of Binary Numbers in Computer

1.3.2 Basic operations of logical algebra and simplification of logical expressions

1.4 Example analysis in this chapter

Chapter II Basic Knowledge of Computer Hardware

2. 1 Structure and working principle of computer system

2. 1. 1 Composition of computer system

2. 1.2 computer types and characteristics

2.2 central processing unit CPU

2.2. 1 CPU

2.2.2 Timing generator and control mode

2.2.3 Classification of instruction stream, data stream and computer

2.2.4 instruction system

2.2.5 Processor performance

2.3 main memory and auxiliary memory

2.3. 1 memory

External storage

cache

2.4 I/O interface, I/O equipment and communication equipment

List of input/output devices

Input/output controller

Identification of peripheral equipment

2.4.4 Access to peripheral devices

2.4.5 Universal Input/Output Interface

trunk

2.5 the case analysis in this chapter

Chapter 3 Basic knowledge of operating system

3. 1 Overview of computer software system

3.2 Basic concepts of operating system

3.3 Operation management

3.4 Process management

3.5 Storage management

3.6 Equipment management

3.7 Document management

3.8 Example analysis in this chapter

Chapter 4 Basic knowledge of database system

4. 1 Development of database technology

4.2 data description

4.3 Data model

4.4 Database architecture

4.5 Database Management System

4.6 Database system

4.7 Relationship model

4.7. 1 relational data model

4.7.2 Integrity rules of relational model

4.8 SQL language

4.8. 1 SQL architecture

Data definition of SQL

SQL data query

SQL data update

4.9 Example analysis in this chapter

Chapter 5 Basic knowledge of data communication

5. 1 data signal and channel

5. 1. 1 data signal

5. 1.2 data channel

5.2 Data communication model

5.2. 1 data communication model

Data communication mode

5.3 Data transmission basis

5.3. 1 error control

Synchronous control

Multiplexing

5.4 Transmission control

5.5 data modulation and coding

5.5. 1 Analog channel transmits analog data.

5.5.2 Digital channel transmits analog data.

5.5.3 Analog channels transmit digital data.

5.5.4 Digital channels transmit digital data.

5.6 Data exchange technology

5.6. 1 circuit switching

Storage exchange

5.7 Example analysis in this chapter

Chapter VI Basic Knowledge of Computer Network

6. 1 Introduction to Computer Network

6. 1. 1 Basic concept of computer network

6. 1.2 computer network classification

6. 1.3 Composition of computer network

6.2 Open Systems Interconnection

6.2. 1 OSI/RM hierarchy

6.2.2 Functions of OSI/RM layer

6.3 TCP/IP

6.3. Overview of1TCP/IP

6.3.2 Network interconnection layer protocol

6.3.3 Transport layer protocol

6.4 Network transmission medium

6.4. 1 Comprehensive comparison

Twisted pair characteristics

Optical fiber characteristics

6.5 network equipment

6.6 Example analysis in this chapter

Chapter 7 Basic LAN Technology

7. 1 IEEE 802 reference model

7. 1. 1 Overview

7. 1.2 Characteristics of LAN

7. 1.3 IEEE 802 standard

7. 1.4 IEEE 802 reference model

7.2 LAN topology

7.3 Local Area Network Media Access Control Technology CSMA/ CD

7.3. 1 LAN media access control technology

7.3.2 Carrier Monitoring Multiple Access

7.3.3 Carrier Monitoring Multiple Access with Collision Detection

7.4 Basic knowledge of Ethernet

Overview of Ethernet

7.4.2 Technical Basis of Ethernet

7.4.3 Introduction of Ethernet Frame Format

7.4.4 Introduction of Frame Format

IEEE 802.3 physical layer specification

Fast Ethernet

7.4.7 Gigabit Ethernet

Switched Ethernet

7.4.9 Full Duplex Ethernet

7.5 Example analysis in this chapter

Chapter VIII Basic Knowledge of Computer Network Application

8. 1 Internet application foundation

8. 1. 1 the origin of the internet

8. 1.2 China and the Internet

8. 1.3 Internet service providers

8. 1.4 Various Internet access modes

8. 1.5 WWW basics

8. 1.6 Various services provided by the Internet

8.2 Network Operating System

8.2. 1 network operating system function

8.2.2 Structure of network operating system

8.2.3 Characteristics of network operating system

8.2.4 Common network operating systems

8.3 Introduction of Linux Operating System

8.3. Basic composition of1Linux

8.3.2 file and directory operations

8.3.3 System Management Command

8.4 Basic knowledge of application server

8.4. Basic principles of1DNS service

8.4.2 Basic Principles of World Wide Web Services

8.4.3 Basic principle of FTP service

8.4.4 Basic principles of e-mail service

8.4.5 Basic principles of DHCP service

The basic principle of proxy server

8.5 Example analysis in this chapter

Chapter 9 Basic knowledge of network management

9. 1 Basic concepts of network management

9. 1. 1 Basic concepts of network management

9. 1.2 Classification and function of network management

9. 1.3 network management standards and protocols

9. 1.4 network management architecture model

9. 1.5 Simple Network Management Protocol

9.2 Basic commands of network management

9.2. 1 Windows network diagnosis command

9.2.2 Linux network diagnosis command

9.3 Example analysis in this chapter

Chapter 10 Basic knowledge of network security

10. 1 evaluation criteria for trusted computer systems

10.2 network security vulnerability

10.2. 1 the concept of network security vulnerabilities

10.2.2 vulnerability classification

10.2.3 vulnerability level

10.2.4 reasons for security vulnerabilities

10.2.5 scanning technology for major network vulnerabilities

10.3 network security control technology

10.4 disaster recovery system

10.5 common methods and techniques of first aid

10.5. 1 characteristics of emergency treatment

10.5.2 emergency treatment methods and technologies

10.6 example analysis in this chapter

Chapter 1 1 Basic knowledge of standardization

1 1. 1 Basic concept of standardization

1 1.2 standardization organizations and standard categories

1 1.2. 1 ISO

1 1.2.2 standard classification and its relationship

1 1.2.3 Mandatory standards and recommended standards

1 1.3 General IT standards at home and abroad

1 1.3. 1 coding standard

1 1.3.2 software engineering and documentation standards

1 1.3.3 e-government standard system framework

1 1.4 Example analysis in this chapter

Chapter 12 Basic knowledge of informatization

12. 1 information awareness

12. 1. 1 information

12. 1.2 informatization

12.2 global informatization, national informatization and enterprise informatization

Global informatization trend

12.2.2 national informatization strategy

12.2.3 enterprise informatization strategy and tactics

12.2.4 enterprise informatization and e-commerce

12.3 knowledge of internet-related laws and regulations

12.3. 1 computer information network management regulations

12.3.2 computer network security management related laws and regulations

Internet domain name management related laws and regulations.

12.3.4 Internet information service

12.4 personal information protection rules

12.5 example analysis in this chapter

Chapter 13 New Network Technology

13. 1 WLAN

Overview 13. 1. 1

13.1.2 IEEE 802.11standard.

13. 1.3 Common Topology Structure of Wireless LAN

13.10.4 application prospect of wireless local area network

13.2 wireless wide area network

1 satellite communication network

13.2.2 mobile communication and 3G technology

Introduction to 13.2.3 WAP

13.3 Next-generation Internet technology standard IPv6

13.3. 1 IPv6.

13.3.2 datagram format of IPv6.

Routing principle of 13.3.3 IPv6.

Domain name resolution of 13.3.4 IPv6.

13.3.5 Comprehensive comparison between IPv6 and IPv4.

Transition Scheme from IPv4 to IPv6

13.4 example analysis in this chapter

Chapter 14 Protection of Intellectual Property Rights

14. 1 Copyright Law and its implementing regulations

14. 1. 1 object of copyright law

14. 1.2 Subject of Copyright Law

14. 1.3 All rights reserved.

14.2 computer software protection regulations

Objects protected by 14.2. 1

14.2.2 determination of copyright owner

14.2.3 Software Copyright

14.3 patent law and its implementing rules

14.3. 1 object protected by patent law

14.3.2 determining the patentee

14.3.3 patent right

14.4 example analysis in this chapter

Chapter 15 Computer English

The next chapter is network system management and maintenance.

16 Chapter Construction of Small Computer Local Area Network

16. 1 network design

16. 1. 1 network design objectives and standards

16. 1.2 network system design

16.2 network equipment selection and deployment

1 equipment selection

16.2.2 Ethernet switch deployment

16.3 VLAN division

16.4 example analysis in this chapter

Chapter 17 Integrated Wiring

17. 1 the concept of integrated wiring system

17. 1. 1 Relationship between Integrated Wiring System and Intelligent Building

17. 1.2 definition, characteristics and scope of integrated wiring system

17.2 composition of integrated wiring system

17.2. 1 composition of integrated wiring system

17.2.2 Application of integrated wiring system

17.3 design of integrated wiring system

1 system design principles

17.3.2 design of workspace subsystem

17.3.3 horizontal trunk subsystem design

17.3.4 subsystem design of management room

17.3.5 design of vertical trunk subsystem

17.3.6 subsystem design of building complex

17.3.7 computer room subsystem design

17.3.8 pipeline construction design of integrated wiring system

17.3.9 power supply, protection and grounding design

17.4 related standards and specifications of integrated wiring system

17.5 basic environment preparation for integrated wiring

17.5. 1 technical preparation

Preparation of tools/equipment

17.6 selection and installation of cables and related hardware

Select 17.6. 1 cable and related hardware.

17.6.2 cable connector

17.6.3 optical fiber connector

17.6.4 jumper

17.7 Install cables and related hardware.

17.8 example analysis in this chapter

Chapter 18 Configuration of Small Computer LAN Server

Plan and configure 18. 1 IP address and subnet mask.

18. 1. 1 IP address

18. 1.2 netmask and subnet

18.1.3 planning and configuration of IP address and subnet mask

Planning, setup and maintenance of 18.2 DNS server

Basic concepts 18.2. 1

18.2.2 DNS server classification

18.2.3 DNS server planning

18.2.4 set up DNS server under Linux.

18.2.5 Setting up DNS server under Windows 2003

18.2.6 DNS server maintenance

18.3 planning, setup and maintenance of e-mail server

18.3. 1 email

18.3.2 mail server planning

18.3.3 Windows 2003 mail system settings

Planning, setup and maintenance of 18.4 FTP server

18.4. 1 FTP server planning

18.4.2 setting up FTP server under Linux.

18.4.3 setting up FTP server under windows 2003

18.5 planning, setup and maintenance of proxy server

Basic concepts 18.5. 1

18.5.2 planning and design of proxy server

18.5.3 Setting up proxy server in Windows environment

18.6 installation and setup of DHCP server

18.6. 1 Introduction to Dynamic Address Allocation (DHCP)

18.6.2 Dynamic Address Allocation (DHCP) Planning

18. 6. 3 DHCP installation settings

18.7 example analysis in this chapter

Chapter 19 website establishment, management, maintenance and webpage production

19. 1 website planning, construction, management and maintenance

19. 1. 1 website planning

19. 1.2 website construction

19. 1.3 website management and maintenance

19.2 making static web pages

19.2. 1 web page making tool

19.2.2 HTML

19.2.3 JavaScript

19.3 making dynamic web pages

19.3. 1 JSP

19.3.2 ASP

19.4 example analysis in this chapter

Chapter 20 Operation, Maintenance and Management of Network System

20. 1 network management software

20. 1. 1 network operation command

20. 1.2 network management platform

20. 1.3 monitoring network performance with tools

20.2 network fault management

20.2. 1 Common network faults

20.2.2 Judgment and recovery of network fault

20.2.3 Common network fault judgment tools

20.3 Network security management

20.3. 1 safety analysis of common hazards

Construction of safety protection

security mechanism

Network antivirus measures

20.3.5 Using tools to monitor network security

20.4 network maintenance

20.4. 1 maintenance implementation

20.4.2 Hardware maintenance, software maintenance and maintenance contract

20.4.3 Develop strategies and plans for maintenance and upgrading.

20.5 data management

20.5. 1 backup strategy and recovery plan

20.5.2 The purpose of network backup system

20.5.3 Network Backup Storage Management System

Online recovery

20.6 system performance analysis

6. 1 system capacity limit

Key points of system evaluation

20.7 sample analysis in this chapter

Chapter 265438 +0 Firewall Technology

2 1. 1 network virus protection strategy

2 1. 1. 1 virus characteristics

2 1. 1.2 virus classification

Prevent 2 1. 1.3 virus attack.

2 1. 1.4 network-based antivirus system

2 1.2 firewall technology

2 1.2. 1 the concept of firewall

2 1.2.2 firewall function

Advantages and limitations of 2 1.2.3 firewall

2 1.2.4 basic terms of firewall

2 1.2.5 firewall technology

2 1.2.6 firewall architecture

Configuration strategy of 2 1.3 firewall

2 1.3. 1 system settings

2 1.3.2 security level setting

2 1.3.3 Introduction to Default IP Rules

2 1.3.4 custom IP rules

2 1.3.5 general application rule setting description

2 1.3.6 advanced application rule settings

2 1.3.7 network access monitoring function

2 1.3.8 system vulnerability patching function

2 1.3.9 log viewing and analysis

2 1.3. 10 Disconnect/Connect the network

2 1.4 intrusion handling strategy

2 1.4. 1 intrusion detection principle

2 1.4.2 Functions of Intrusion Detection System

2 1.4.3 classification of intrusion detection system

2 1.4.4 Main methods of intrusion detection

2 1.5 vulnerability handling strategy

2 1.5. 1 classification and implementation method

Problems and solutions of 2 1.5.2

2 1.5.3 Various port scanning technologies

2 1.6 encryption, authentication and digital signature

2 1.6. 1 private key and public key encryption standard

2 1.6.2 certification

2 1.6.3 integrity

2 1.6.4 access control

2 1.7 example analysis in this chapter

Chapter 22 Basic configuration of switches and routers

22. Configuration of1switch

22. 1. 1 basic configuration of switch

22. Basic configuration of1.2 VLAN

22. 1.3 VLAN trunking protocol (VTP)

22. 1.4 Spanning Tree Protocol

22.2 router configuration

22.2. 1 general configuration of router

22.2.2 Routing Protocol and Configuration

Network address translation (NAT)

22.3 WAN access configuration

22.3. 1 PSTN access

22.3.2 ISDN access

22. 3. 3 x25 channel

PPP access

FR

Virtual private network access

22.4 Example analysis in this chapter

Appendix A Network Administrator Grade Examination Outline

Exam reference book: analysis of test sites, detailed explanation of real questions of network administrators.

/product.aspx? Product identification =20529 132

If you read these two books, it is not a big problem for administrators to pass the soft exam! Trust me!