专业网络工程师网站|服务平台|服务商(加客服微信:cnitpm或QQ:773104605进网络工程师学霸群)

软题库 学习课程
当前位置:信管网 >> 网络工程师 >> 每日一练 >> 文章内容
网络工程师每日一练试题(2024/5/8)

网络工程师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=8

往期网络工程师每日一练试题汇总:www.cnitpm.com/class/27/e8_1.html

网络工程师每日一练试题(2024/5/8)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=8&day=2024/5/8

点击查看:更多网络工程师习题与指导

网络工程师每日一练试题内容(2024/5/8)

  • 试题1

    一台16口的全双工千兆交换机,至少需要()的背板带宽才能实现线速转发。
    A.1.488Gbps
    B.3.2Gbps
    C.32Gbps
    D.320Gbps

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=8&day=2024/5/8

  • 试题2

    IP地址块112.56.80.192/26包含了(1)个主机地址,不属于这个网络的地址是(2)。
    (1)A.15
    B.32
    C.62
    D.64
    (2)A.112.56.80.202
    B.112.56.80.191
    C.112.56.80.253
    D.112.56.80.195

    查看答案

    试题参考答案:C、B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=8&day=2024/5/8

  • 试题3

    关于IGMP协议的描述中,正确的是:
    A.IGMPv1具有组成员快速离开机制
    B.IGMP决定数据报文在路由器之间如何转发
    C.IGMP组播成员管理机制是针对第2层设计的
    D.IGMP监听可解决第2层环境中的组播报文泛滥问题

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=8&day=2024/5/8

  • 试题4

    以下IP地址中,既能作为目标地址又能作为源地址,且以该地址为目的地址的报文在Internet上通过路由器进行转发的是(   )。

    A.0.0.0.0
    B.127.0.0.1
    C.100.10.255.255/16
    D.202.117.112.5/24

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=8&day=2024/5/8

  • 试题5

    公钥体系中,私钥用于 (1) ,公钥用于 (2) 。
    (1)A、解密和签名
    B、加密和签名
    C、解密和认证
    D、加密和认证
    (2)A、解密和签名
    B、加密和签名
    C、解密和认证
    D、加密和认证

    查看答案

    试题参考答案:A、D

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=8&day=2024/5/8

  • 试题6

    DHCP()报文的目的IP地址为255.255.255.255。
    A.DhcpDisover
    B.DhcpOffer
    C.DhcpNack
    D.DhcpAck

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=8&day=2024/5/8

  • 试题7

    IPv6地址分为3种类型,它们是( )。
    A、A类地址、B类地址、 C类地址
    B、单播地址、组播地址、任意播地址
    C、单播地址、组播地址、广播地址
    D、公共地址、站点地址、接口地址

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=8&day=2024/5/8

  • 试题8

    The usual way to ensure reliable delivery is to provide the  (1)  with some feedback about what is happening at the other end of the line. Typically, the protocol calls for the receiver to send back special  (2)  frame bearing positive or negative  (3)  about the incoming frames. If the sender receives a positive acknowledgement about a frame, it knows the the frame has arrived safely. On the other hand, a negative acknowledgement means that something has gone wrong, and the frame must be transmitted again.
    An additional complication comes from the possibility that hardware troubles may cause a frame to  (4)  completely. In this case, the receiver will not react at all, since it has no any reason to react. It should be clear that a protocol in which the sender transmits a frame and then waits for an acknowledgement, positive or negative, will hang forever if a frame is ever lost due to, for example,  (5)  hardware.。
    (1)A、receiver
    B、controller
    C、sender
    D、customer
    (2)A、data
    B、controll
    C、request
    D、session
    (3)A、application
    B、connection
    C、stream
    D、acknowledgement
    (4)A、vanish
    B、vary
    C、appear
    D、incline
    (5)A、acting
    B、working
    C、malfunctioning
    D、functioning

    查看答案

    试题参考答案:C、B、D、A、C

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=8&day=2024/5/8

  • 试题9

    关于Internet域名服务系统的描述中,正确的是:
    A.域名解析的两种方式为重复解析和反复解析
    B.域名解析可以从根域名服务器开始
    C.“非权威”的解析结果是由解析器造成的
    D.使用高速缓冲技术可提高域名解析的准确性

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=8&day=2024/5/8

  • 试题10

    Network firewalls are security devices used to stop or mitigate() access to private networks connected to the lnternet, especially intranets. The only traffic allowed on the network is defined via firewall ()-any other traffic attempting to access the network is blocked. Network firewalls sit at the () line of a network, acting as a communications liaison between internal and external devices, When properly configured, a firewall allows users to access any of the resources they need while simultaneously keeping out unwanted accesses. In addition to limiting access to a protected computer and network, a firewall can () all traffic coming into or leaving a network, and manage remote access to a private network through secure authentication certificates and logins. () firewalls examine every packet that passes through the network and then accept or deny it as defined by rules set by the user.
    A.Unauthorized
    B.authorized
    C.normal
    D.frequent



    A.Ports

    B.policies
    C.commands
    D.status



    A.Front

    B.back
    C.second
    D.last



    A.Reply

    B.block
    C.log
    D.encrypt



    A.Application-layer

    B.Packet filtering
    C.Circuit-level
    D.Proxy server

    查看答案

    试题参考答案:A、B、A、A、B

    试题解析与讨论:www.cnitpm.com/exam/ExamDay.aspx?t1=8&day=2024/5/8

信管网订阅号

信管网视频号

信管网抖音号

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,教材和资料参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

相关内容

发表评论  查看完整评论  

推荐文章

精选

课程

提问

评论

收藏