专业网络工程师网站|培训机构|服务商(加客服微信:cnitpm或QQ:773104605进网络工程师学霸群)

软题库 培训课程
当前位置:信管网 >> 网络工程师 >> 每日一练 >> 文章内容
网络工程师每日一练试题(2022/11/23)
来源:信管网 2022年11月24日 【所有评论 分享到微信

网络工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=8

往期网络工程师每日一练试题汇总:www.cnitpm.com/class/27/e8_1.html

网络工程师每日一练试题(2022/11/23)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=8&day=2022/11/23

点击查看:更多网络工程师习题与指导

网络工程师每日一练试题内容(2022/11/23)

  • 试题1

    使用traceroute命令测试网络时可以(  )。
    A.检验链路协议是否运行正常
    B.检验目标网络是否在路由表中
    C.查看域名解析服务
    D.显示分组到达目标路径上经过的各个路由器

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/4188529942.html

  • 试题2

    使用白盒测试时,确定测试数据应根据(  )指定覆盖准则。
    A.程序的内部逻辑
    B.程序的复杂程度
    C.使用说明书
    D.程序的功能

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/4495824626.html

  • 试题3

    ADSL 采用多路复用技术是 (1) ,最大传输距离可达 (2) 米。
    (1)A、TDM
    B、FDM
    C、WDM
    D、CDMA
    (2)A、500
    B、1000
    C、5000
    D、10000

    查看答案

    试题参考答案:B、C

    试题解析与讨论:www.cnitpm.com/st/84912924.html

  • 试题4

    传输层的主要任务是完成( )

    A.进程通信服务
    B.网络连接服务
    C.路径选择服务
    D.子网一子网连接服务

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/317135999.html

  • 试题5

    宏病毒可以感染后缀为()的文件。
    A.exe
    B.txt
    C.pdf
    D.Xls

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/23943630.html

  • 试题6

    Let us now see how randomization is done when a collision occurs . After a (1), time is divided into discrete slots whose length is equal to the worst-case round-trip propagation time on ether. To accommodate the longest path allowed by Ethernet, the slot time has been set to 512 bit times, or 51.2us.
    After the first collision, each station waits either 0 or 1 (2) times before trying again. If two stations collide and each one picks the same random number, they will collide again. After the second collision, each one picks either 0,1,2 or 3 at random and waits that number of slot times. If a third collision occurs (the probability of this happening is 0.25), then the next time the number of slots to wait is chosen at (3) from the interval 0 to 23-1.
    In general, after I collisions, a random number between 0 and 2i -1 is chosen, and that number of slots is skipped. However, after ten collisions have been reached, the randomization (4) is frozen at a maximum of 1023 slots. After 16 collisions, the controller throws in the towel and reports failure back to the computer. Further recoveries up to (5) layers.

    (1)A.datagram
     B.collision
     C.connection
    D.service
    (2)A.slot
     B.switch
     C.process
     D.fire
    (3)A.rest
     B.random
     C.once
     D.odds
    (4)A.unicast
     B.multicast
     C.broadcast
     D.interval
    (5)A.local
     B.next
     C.higher
     D.lower

    查看答案

    试题参考答案:B、A、B、D、C

    试题解析与讨论:www.cnitpm.com/st/2344912465.html

  • 试题7

     关于网络安全管理的描述中,正确的是(  )。
    A.能够恢复全部被破坏的数据
    B. 快速反击入侵者
    C. 提供单层防卫手段
    D. 维护安全日志

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/314457054.html

  • 试题8

    A virtual (  ) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (  ). It prevents (  ) people from eavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (  ).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (  ) to network.
    (1)A. public
    B. private
    C. personal
    D. proper
    (2)A. encoded
    B. encrypted
    C. stored
    D. transmitted
    (3)A. employed
    B. authorized
    C. unauthorized
    D. criminal
    (4)A. channel
    B. path
    C. tunnel
    D. route
    (5)A. network
    B. device
    C. computer
    D. endpoin

    查看答案

    试题参考答案:B、D、C、C、A

    试题解析与讨论:www.cnitpm.com/st/4189813956.html

  • 试题9

    网络系统设计过程中,物理网络设计阶段的任务是( )。
    A.依据逻辑网络设计的要求,确定设备的具体物理分布和运行环境
    B.分析现有网络和新网络的各类资源分布,掌握网络所处的状态
    C.根据需求规范和通信规范,实施资源分配和安全规划
    D.理解网络应该具有的功能和性能,最终设计出符合用户需求的网络

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/1308323231.html

  • 试题10

    下列 ( ) 命令可以更改一个文件的权限设置。
    A、attrib
    B、file
    C、chmod
    D、change

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/85622948.html

扫码关注公众号

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,官方教材参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

相关内容

发表评论  查看完整评论  

推荐文章