Current location - Education and Training Encyclopedia - Education and training - Chip decryption training
Chip decryption training
I have four questions.

can't send out

In September, 2006, the third-level written examination paper of network technology in the national computer rank examination.

First, multiple-choice questions (65438+ 0 points for each small question, *** 60 points)

Only one of the following four options (a), (b), (c) and (d) is correct. Please write down the correct options.

In the corresponding position on the answer sheet, don't grade the test paper.

(1) microprocessor has entered the era of dual-core 64-bit. At present, _ _ _ _ _ _ _ _ _ _

A)AMD company

B) hewlett-packard company

C) sun company

D)IBM company

(2) 1983, ARPAN formally adopted TCP/IP protocol, which marked the emergence of Internet. China's earliest formal contact with the Internet was _ _ _ _.

A) 1984

B) 1988

C) 1994

D) 1998

(3) Which of the following descriptions about Pentium processor architecture is wrong?

A) Harvard structure is a mixed storage of instructions and data.

B) Super pipeline technology is characterized by increasing the main frequency and refining the pipeline.

C) Superscalar technology is characterized by setting up multiple pipelines and executing multiple processes at the same time.

D) Branch prediction can dynamically predict the branch transfer of the program.

(4) Which of the following descriptions about PCI local bus is wrong?

A)PCI refers to the peripheral interface.

B)PCI refers to the personal computer interface.

C)PCI has obvious advantages over EISA.

D)PCI has obvious advantages over VESA.

(5) Which of the following descriptions about the motherboard is wrong?

A) according to the CPU socket, there are socket mainboards and socket mainboards.

B) According to motherboard specifications, there are TX motherboards and DX motherboards.

C) according to the data port classification for SCSI motherboard, EDO motherboard.

D) PCI motherboards and USB motherboards are classified by slots.

(6) Which of the following descriptions about application software is correct?

A) Microsoft's browsing software is Internet Explorer.

B) Desktop publishing software includes Publisher and Powerpoint.

C) Spreadsheet software includes Excel and Access.

D) The word processing of Jinshan Company is WPS 2000.

(7) Which of the following descriptions about the characteristics of computer networks is wrong?

A) The main purpose of establishing a computer network is to share computer resources.

B) Network users can call multiple computers in the network to complete a certain task.

C) networked computers can work online and offline.

D) networked computers must run as a unified operating system.

(8) Which WAN technology is developed on the basis of X.25 public packet switched network?

A) ATM

B) frame relay

C)ADSL

D) optical fiber distributed data interface

(9) In the actual computer network construction process, what should be done first?

A) network topology design

B) equipment selection

C) application program structure design

D) network protocol selection

(10) The goal of ISDN design is to provide a global coordinated digital communication network that supports various communication services, and different countries adopt the same _ _ _ _ _.

A) standard

B) structure

C) equipment

D) application

(1 1) The transmission medium adopted by the metropolitan backbone network is mainly _ _ _ _ _ _.

A) coaxial cable b) optical fiber

C) shielded double glue line

D) wireless channel

(12) The commonly used data transmission rates are kbps, Mbps and Gips. If the transmission rate of the local area network is 100Mbps, the time required to send 1bit data is _ _ _ _.

A) 1× 10-6s

1× 10-7s

C) 1× 10-8s

1× 10-9s

(13) The bit error rate of binary symbols in data transmission system refers to _ _ _ _.

A) number of digits

B) number of bytes

probability;likelihood

D) speed

(14)T 1 The carrying rate is _ _ _ _ _.

A) 1.544Mbps

2.048 Mbit/sec

64 kilobits per second

D) 128kbps

(15) Which of the following statements about the OSI reference model is false?

A) The A)OSI reference model defines the hierarchy of an open system.

B) b) The OSI reference model defines the services that may be included in each layer.

C) c) The OSI reference model defines the implementation method of each layer interface.

D)D) On-site inspection reference model as a framework to coordinate the formulation of agreements at all levels of the organization.

(16) Which layer of TCP/IP does ARP belong to?

A) host network layer

B) interconnect layer

C) transport layer

D) application layer

(17) What does the IEEE 802.1standard mainly include?

I. LAN architecture

Two. Network interconnection

Three. administration of networks

Four. performance trial

A) only Ⅰ and Ⅱ

B) only Ⅰ, Ⅱ and Ⅲ

C) only Ⅱ and Ⅲ

all

(18)IEEE 802.3z standard defines a gigabit media interface GMI, which is used to separate the MAC sublayer from _ _ _ _.

A) physical layer

B)LLC sublayer

C) signal coding mode

D) transmission medium

(19) Ethernet switch is essentially a multi-port _ _ _ _.

A) repeater

B) hub

C) bridges

D) router

(20) Ethernet switch with direct switching mode has the advantage of short switching delay time and the disadvantage of lack of _ _ _ _ _.

A) concurrent switching capability

B) error detection capability

C) routing ability

D) address resolution ability

(2 1) If four hubs conforming to the 10BASET standard are connected, the two hubs are the farthest apart in this LAN.

The maximum distance between computers is _ _ _ _.

A)200 meters

B)300 meters

C)400 meters

500 meters

(22) Which of the following descriptions about Ethernet addresses is wrong?

A) Ethernet address is commonly known as MAC address.

B)MAC address is also called LAN hardware address.

C) domain name resolution will inevitably use MAC addresses.

D) LAN hardware address is stored in the network card.

(23) Which of the following addresses is a MAC address?

A)0D-0 1-22-AA

b)00-0 1-22-0A-AD-0 1

C)A0.0 1.00

139.2 16 . 000 . 0 12.002

(24) In Ethernet, there are four hosts, A, B, C and D. If A sends data to B, then _ _ _ _.

A) Only B can receive data.

B) Four hosts can receive data.

C) Only B, C and D can receive data.

D) None of the four hosts can receive data.

(25) Which of the following descriptions about virtual local features is wrong?

A) Virtual local area network is set up on lan switches or ATM switch.

B) Virtual local area network can divide the nodes on the network into several logical working groups according to the nature and needs of work.

C) Virtual local area network realizes the division and management of logical working groups through software.

D) Members of the same logical workgroup must be connected to the same physical network segment.

(26) Which of the following statements about the operating system is wrong?

A)DOS is a single-task graphical interface operating system.

B)DOS looks for disk files through FAT files.

C)Windows is a multi-task graphical interface operating system.

D)Windows looks for disk files through the virtual file table VFAT.

(27) Which of the following statements about the network operating system is wrong?

A) shielding the difference between local resources and network resources

B) Hardware independence and multi-platform support.

C) provide file service and print management

D) The software of client and server can be interchanged.

(28) Which of the following statements about Windows2000 is wrong?

A) One of the new functions of the server is the Active Directory Service.

B) Domain is the basic management unit.

C) The domain controller no longer distinguishes the master-slave structure.

D) The data center version is suitable for digital home use.

(29) Which of the following descriptions about NetWare is wrong?

A) Powerful file and print service functions

B) TCP/IP protocol is not supported.

C) Good compatibility and system fault tolerance.

D) complete safety measures

(30) For Linux, which of the following statements is false?

A)Linux is an open source operating system.

B)Linux provides a powerful application development environment.

C)Linux can be used for free.

D)Linux does not support Sparc hardware platform.

(3 1) Which of the following statements is wrong about the characteristics of Unix operating system?

A)Unix is an operating system that supports multi-tasking and multi-users.

B)Unix itself is written in Pascal language, guided and easy to transplant.

C)Unix provides a powerful shell programming language.

D)Unix tree file system has good security and maintainability.

(32) the bandwidth of the communication line is _ _ _ _ describing the communication line.

A) error correction ability

B) physical dimensions

C) connectivity

D) transmission capacity

(33) In the Internet, which of the following protocols is mainly used to shield the differences between physical networks?

A) wangbeiwu

B) intellectual property rights

C)TCP

D)SNMP

(34) Which of the following is a private IP address that users can only use in the local internal network?

a) 192. 168. 1. 1

B)20. 10. 1. 1

c)202. 1 13. 1. 1

D)203.5. 1. 1

(35) Which of the following statements is wrong about the header of an IP datagram?

A) The version field indicates the version number of the IP protocol corresponding to the datagram.

B) The header checksum field is used to protect the integrity of the IP header.

C) the service type field describes the form of data in the data area.

D) The lifetime field indicates the lifetime of the datagram in the Internet.

(36) Which of the following statements is wrong about static routing?

A) Static routes are usually established manually by administrators.

B) Static routing can be used for subnet-addressed Internet.

C) Static routes cannot be changed automatically with the change of Internet structure.

D) Static routing is outdated and rarely used at present.

(37) In the Internet, the network protocol that the router must execute is

A) intellectual property rights

B)IP and HTTP

C)IP and FTP

D)HTTP and FTP

(38) Which of the following statements is wrong about the Internet domain name system?

A) Domain name resolution needs the help of a group of independent and cooperative domain name servers.

B) Domain name servers logically form a certain hierarchical structure.

C) Domain name resolution always starts from the root domain name server.

D) Domain name resolution includes recursive resolution and repeated resolution.

(39)IP datagrams may be segmented in the process of crossing the Internet. After IP datagrams are fragmented, which of the following devices usually reassembles them?

A) source host

B) destination host

C) forwarding router

D) forwarding switch

(40) Which of the following software is different from FTP client software?

A) domain name system

B)IE

C)CuteFtp

D) netants

(4 1) Which of the following descriptions about the WWW service system is wrong?

A)WWW service system adopts client/server working mode.

B)WWW service system locates resources in the system through URL.

C) The transmission protocol used by the C)WWW service system is HTML.

D) The resources in the D)WWW service system are stored in the form of pages.

(42) If a user connects his host to the Internet through a telephone network to access websites on the Internet, the user does not need to install and configure _ _ _ _ _ on the host.

A) modem

B) network card

C)TCP/IP protocol

D) web browser

(43) Which of the following descriptions about network management functions is wrong?

A) Configuration management is to master and control the configuration information of the network.

B) Fault management is to locate faults in the network.

C) Performance management Monitor and adjust working parameters to improve network performance.

D) Security management is to keep the network performance at a good level.

(44) Which of the following operating systems can reach C2 security level?

Ⅰ.Windows 3.x

Ⅱ. Apple system 7.x

Ⅲ.windows operating system

Ⅳ.NetWare 3.x

A) Ⅰ and Ⅲ

B) Ⅱ and Ⅲ

C) ⅱ and ⅳ

D) ⅲ and ⅳ

(45) Which of the following attacks is a passive attack?

A) denial of service attack

B) replay attack

C) traffic analysis attack

D) impersonation attack

(46) Which of the following attacks is a non-service attack?

I. Mail bomb attack

Ⅱ. Source routing attack

Ⅲ. Address spoofing attack

A) only Ⅰ

B) Ⅰ and Ⅱ

C) Ⅱ and Ⅲ

D) Ⅰ and Ⅲ

(47) End-to-end encryption is an important way to encrypt data in the network. Where is the encryption and decryption?

A) source node and intermediate node

B) intermediate nodes and destination nodes

C) intermediate node, intermediate node

D) source node and destination node

(48)DES is a commonly used symmetric encryption algorithm, and its general packet length is

A)32 bits

B)56 bits

C)64-bit

D) 128 bit

(49) Which of the following is not a characteristic of RSA cryptosystem?

A) Its security is based on factorization of large integers.

B) It is a public key cryptosystem.

C) Its encryption speed is faster than DES.

D) It is usually used for digital signature and authentication.

(50) Which of the following methods cannot be used to detect computer viruses?

A) self-inspection

B) Encrypt the executable program.

C) keyword detection

D) judging the length of the file

(5 1) Which of the following descriptions about firewall technology is wrong?

A) Firewalls are divided into two categories: packet filtering and application gateway.

B) Firewall can control external users' access to internal systems.

C) Firewalls can prevent internal personnel from attacking the outside.

D) Firewall can analyze and manage network usage.

(52) Which of the following statements about IPSec is wrong?

A) It is a set of protocols for network layer security.

B) Data source authentication service can be provided.

C) Being able to provide traffic safety services.

D) It can only be used in the Ipv4 environment.

(53) Which of the following statements is correct about SSL and SET protocols?

A) A) Both SSL and SET can isolate order information and personal account information.

B) b) Neither SSL nor SET can separate the order information from the personal account information.

C)SSL can isolate order information from personal account information, but SET cannot.

D)SET can isolate order information from personal account information, but SSL cannot.

(54) What platform do EDI users usually use to complete data exchange?

A) dedicated EDI exchange platform

B) general e-mail exchange platform

C) private virtual local area network switching platform

D) general telephone switching platform

(55) Which of the following statements is wrong about the description of the security basic layer in the structure of e-commerce system?

A) The security base layer is located at the bottom of the e-commerce system structure.

B) The security base layer is used to ensure the security of data transmission.

C) The security base layer can realize the identity authentication of the parties to the transaction.

D) The security base layer is used to prevent rejection in the transaction.

(56) The three levels of e-government application system construction are _ _ _ _ _.

A) network construction, information collection and business processing

B) Information collection, business processing and decision support

C) business processing, network construction and decision support

D) information collection, decision support and network construction

(57) e-government intranet mainly includes _ _ _ _.

A) public service business network, non-confidential government office network and confidential government office network

B) Internet, public service network and unclassified government office network.

The largest IT technology /IT management /IT education /IT training /IT consulting resource website in China.

C) Internet, public service network and government secret office network

D) Internet, unclassified government office network and confidential government office network

(58) Which of the following is not the main feature of ATM technology?

A) cell transmission

B) connectionless-oriented

C) statistical multiplexing

D) service quality assurance

(59) Which of the following statements about ADSL technology is wrong?

A)ADSL can have different uplink and downlink transmission rates.

B)ADSL can transmit data, video and other information.

C)ADSL signal and voice signal can be transmitted on the same pair of telephone lines.

D)ADSL can provide 8Mbps downlink channel for users with a distance of 10km.

(60) A wireless local area network usually consists of which of the following devices?

Ⅰ. Wireless network card

Ⅱ. Wireless access point

Ⅲ. Ethernet switch

ⅳ. Computer

A) Ⅰ, Ⅱ and Ⅲ

B) Phase II, III and IV

C) ⅰ, ⅱ and ⅳ

D) ⅰ, ⅲ and ⅳ

II. Fill in the blanks (2 points for each blank, *** 40 points)

Please write the answer on the horizontal line with the serial number 1 to 20 in the question card, and the answer will not be scored on the test paper.

(1) An Teng is a 1 bit chip.

(2) The international standard for video and audio compression forms conforming to TV quality is 2.

(3) The computer network uses communication lines to connect multiple computer systems in different geographical locations to realize resource sharing.

(4) Computer network topology reflects four kinds of relationships among entities in the network.

(5) ARPANET belongs to five switching networks.

(6) In the TCP/IP protocol, the transport layer is responsible for providing services for these six layers.

(7) In the network, in order to transmit sound signals together with data, characters, graphics and images, it is necessary to use 7 technology to digitize sound signals.

(8)IEEE 802. 1 1b defines the wireless LAN standard with frequency hopping technology, and its highest transmission rate can reach 8Mbps.

(9) The early network operating system experienced the transition from 9-structure to master-slave structure.

(10) The protocol used by the next generation Internet interconnection layer is IPv 10.

(1 1) The IP address of the host is10.1.100, and the mask is 255.0.0.0. Now, users need to configure a default route for this host. If the only router directly connected to the host has two IP addresses, one is10.2.1.100, and the other is1.1.

(12) The four-level access control of the website established by IIS is IP address restriction, user authentication,12 permission and NTFS permission.

(13) Mail servers usually use the 13 protocol to transmit mail.

(14) In the general network management mode, one manager can exchange information with multiple 14 to realize networking.

Network management.

(15)SNMP is the most commonly used computer network management protocol. SNMPv3 adds and perfects 15 and management mechanism on the basis of SNMPv2.

(16) The most common implementation methods of digital signature are based on public key cryptosystem and secure one-way 16 function.

(17) One of the measures to prevent password guessing is to strictly limit the unsuccessful continuous login from the terminal 17.

(18) e-commerce application system includes CA system, 18 system, business application system and user terminal system.

(19) According to the relevant regulations of national e-government, classified networks must be isolated from non-classified networks through 19.

(20) Bluetooth technology is generally used for wireless connection of mobile phones, PCs, handheld terminals and other devices within 20 meters.

In September 2006, the answers to the three-level written test of network technology.

Answer:

1-30 ACABB DD baa BCCAC BBABB DCBAD ADDBD

CDAAA BABDC

1)64,

2)MPEG,

3) autonomy,

4) structure,

5) Virtual,

6) application,

7) Modem,

8) 1 1,

9) Point-to-point,

10)6

1 1) 10.2. 1. 100

12) network access

13)SMTP

14) proxy node

15) security

16) hash

17) times

18) payment gateway

19) physics

20) 10