当前位置:网站首页>How many of the 50 questions about network knowledge can you answer correctly?
How many of the 50 questions about network knowledge can you answer correctly?
2022-06-11 07:54:00 【GLAB-Mary】
1) What is a link ?
A link is a connection between two devices . It includes cable types and protocols for one device to communicate with another .
2)OSI What is the level of the reference model ?
Yes 7 individual OSI layer : The physical layer , Data link layer , The network layer , Transport layer , The session layer , Presentation layer and application layer .
3) What is backbone network ?
Backbone network is a centralized infrastructure , It aims to distribute different routes and data to various networks . It also deals with bandwidth management and various channels .
4) What is? LAN?
LAN Is the abbreviation of LAN . It refers to the connection between the computer and other network devices in small physical locations .
5) What is a node ?
A node is the point at which a connection takes place . It can be a computer or device that is part of a network . In order to form a network connection , You need two or more nodes .
6) What is a router ?
Router can connect two or more network segments . These are intelligent network devices that store information in their routing tables , For example, path , Hop count, etc . With this information , They can determine the best path for data transmission . Router in OSI Network layer operation .
7) What is point-to-point link ?
It refers to the direct connection between two computers on the network . In addition to connecting the cable to two computers NIC Outside the card , Point to point connections do not require any other network devices .
8) What is anonymity FTP?
FTP It's a way to give users access to files in a public server . Users who are allowed to access the data in these servers do not need to identify themselves , Instead, log in as an anonymous visitor .
9) What is a subnet mask ?
Subnet mask and IP Address combination , To identify two parts : Expand network address and host address . image IP The address is the same , Subnet mask by 32 A composition .
10)UTP What is the maximum length of cable allowed ?
UTP The single section of the cable has 90 To 100 The permissible length of meters . This limitation can be overcome by using repeaters and switches .
11) What is data encapsulation ?
Data encapsulation is the process of decomposing information into smaller manageable blocks before transmitting it over the network . In the process , Source and destination addresses are appended to the header along with parity .
12) Describe network topology
Network topology refers to the layout of computer network . It shows the physical layout of the equipment and cables , And how they connect to each other .
13) What is? VPN?
VPN It means virtual private network , This technology allows you to go through the network ( Such as Internet) Create a safe passage .
for example ,VPN Allows you to establish a secure dial-up connection to a remote server .
14) A brief description NAT.
NAT It's network address translation . It's an agreement , Provides a way for multiple computers on a public network to share to Internet A single connection .
15)OSI What is the work of the network layer under the reference model ?
The network layer is responsible for data routing , Packet switching and congestion control . Routers run under this layer .
16) How the network topology affects your decision to build a network ?
The network topology determines what media must be used for interconnection devices . It also serves as a material for setting , The foundation of connectors and terminals .
17) What is? RIP?
RIP, The short name of routing information protocol is used by routers to send data from one network to another network .
It effectively manages routing data by broadcasting its routing table to all other routers in the network . It determines the network distance in hops .
18) What are different ways to protect computer networks ?
There are several ways to do this . Install reliable and updated antivirus programs on all computers . Make sure the firewall is set up and configured correctly . User authentication will also help a lot . All of these combinations will form a highly secure network .
19) What is? NIC?
NIC It's a network interface card ( network card ) Abbreviation . This is connected to PC To connect to the network Shenbei . Every NIC All have their own MAC Address , Used to identify... On the network PC.
20) What is? WAN?
WAN On behalf of Wan . It's a geographically dispersed interconnection of computers and devices . It connects different regions and countries / Regional networks .
21)OSI What is the importance of the physical layer ?
The physical layer converts data bits to electrical signals , vice versa . This is network equipment and cable type considerations and settings .
22)TCP/IP How many floors are there under ?
There are four floors : The network layer , The Internet layer , Transport layer and application layer .
23) What is a proxy server , How do they protect computer networks ?
The proxy server mainly prevents external users from identifying the internal network IP Address . Don't know the right IP Address , It doesn't even recognize the physical location of the network . A proxy server can make the network almost invisible to external users .
24)OSI What is the function of the session layer ?
This layer provides protocols and methods for two devices on the network , Communicate with each other by holding a conversation . This includes setting up sessions , Manage the exchange of information during the session and the process of terminating the session .
25) What is the importance of implementing a fault-tolerant system ? Is it limited ?
Fault tolerant systems ensure continuous data availability . This is achieved by eliminating a single point of failure . however , In some cases , This type of system will not be able to protect data , For example, accidental deletion .
26)10Base-T What does that mean? ?
10 Data transfer rate , In this case it is 10Mbps.“Base” Baseband .T For twisted pair , This is the cable for this network .
27) What is private IP Address ?
special IP The address is assigned to the intranet . These addresses are used for internal networks , Cannot route on an external public network . These ensure that there is no conflict between the internal networks , At the same time private IP The address range can also be reused in multiple internal networks , Because they don't “ notice ” each other .
28) What is? NOS?
NOS Or network operating system is special software , Its main task is to provide computer with network connection , To be able to communicate with other computers and connected devices .
29) What is? DoS?
DoS Or a denial of service attack is an attempt to prevent users from accessing the Internet or any other network service . There may be different forms of attack , Made up of a group of permanents . A common way to do this is to overload the system server , So that it can no longer handle legitimate traffic , And will be forced to reset .
30) What is? OSI, What role does it play in the computer network ?
OSI( Open Systems Interconnection ) As a reference model for data communication . It consists of 7 layers , Each layer defines specific aspects of how network devices connect and communicate with each other . One layer can handle the physical media used , The other layer indicates how data is actually transmitted over the network .
31) What is the purpose of the cable being shielded and having twisted pairs ?
Its main purpose is to prevent crosstalk . Crosstalk is electromagnetic interference or noise , May affect the data transmitted through the cable .
32) What are the advantages of address sharing ?
By using address translation instead of routing , Address sharing provides an inherent security advantage . This is because the host on the Internet can only see the public interface of the external interface on the computer providing address translation IP Address , It's not private on the Internet IP Address .
33) What is? MAC Address ?
MAC Or media access control , Can uniquely identify devices on the network . It's also called a physical address or an Ethernet address .MAC Address by 6 Byte composition .
34) stay OSI In terms of reference model ,TCP/IP What is the equivalent layer or multilayer of application layer ?
TCP/IP The application layer is actually OSI There are three peers on the model : The session layer , Presentation layer and application layer .
35) How to identify a given IP Address of the IP class ?
By looking at any given IP The first octet of the address , You can identify it as A class ,B Class or C class . If the first octet is in 0 The beginning of a bit , The address is Class A. If you take a place 10 start , The address is B Class address . If from 110 Start , So it's C Class network .
36)OSPF What is the main purpose of ?
OSPF Or open shortest path first , Is a link state routing protocol that uses a routing table to determine the best path for data exchange .
37) What is a firewall ?
Firewalls are used to protect internal networks from external attacks . These external threats may be hackers who want to steal data or computer viruses , Data can be eliminated immediately . It also prevents other users from external networks from accessing the private network .
38) Describe the star topology
A star topology consists of a hub connected to a node . This is one of the simplest settings and maintenance .
39) What is a gateway ?
The gateway provides the connection between two or more network segments . It is usually a computer running gateway software and providing translation services . This translation is the key to allowing different systems to communicate over the network .
40) What are the disadvantages of star topology ?
One of the main disadvantages of star topology is , Once the central hub or switch is damaged , The whole network becomes unusable .
41) What is? SLIP?
SLIP Or serial line interface protocol is actually UNIX Old protocols from early development . This is one of the protocols for remote access .
42) Give some examples of private network addresses .
10.0.0.0, The subnet mask is 255.0.0.0
172.16.0.0, The subnet mask is 255.240.0.0
192.168.0.0, The subnet mask is 255.255.0.0
43) What is? tracert?
Tracert It's a Windows Utilities , It can be used to track the route of data collection from router to target network . It also shows the number of hops used throughout the transmission route .
44) What is the function of Network Administrator ?
Network administrators have a lot of responsibilities , It can be summarized as 3 Key features : Install the network , Configure network settings and network maintenance / Troubleshooting .
45) Describe a disadvantage of peer-to-peer networks .
When you are accessing resources shared by a workstation on the network , The performance of this workstation will be reduced .
46) What is a hybrid network ?
Hybrid networks are using clients - Network settings of server and peer-to-peer architecture .
47) What is? DHCP?
DHCP Is the abbreviation of Dynamic Host Configuration Protocol . Its main task is to automatically assign devices on the network IP Address . It first checks the next available address that is not occupied by any device , Then assign it to network devices .
48)ARP What is the main job of ?
ARP Or address resolution protocol's main task is to be known IP Address mapping to MAC Floor address .
49) What is? TCP/IP?
TCP/IP It's transmission control protocol / Abbreviation of internet protocol . This is a set of protocol layers , Designed for different types of computer networks ( Also known as heterogeneous networks ) Data exchange on .
50) How to use router to manage network ?
The router has a built-in console , Allows you to configure different settings , Like security and data logging . You can assign restrictions... To computers , For example, resources that are allowed to access , Or you can browse the Internet at a certain time of day .
You can even impose restrictions on sites that are not visible throughout the network .
边栏推荐
- Bladed入門教程(視頻)
- 签到体系设计:签到功能该怎么画
- TypeScript-命名空间
- 运筹学导论
- Database connection pool and bdutils tool
- [noip2016 d1t3] changing classrooms (expectation dp+floyd) (trap of extreme thinking!)
- 134. 加油站
- E regression test of this featured app
- String Simulation Implementation
- TiDB Cloud 上线 Google Cloud Marketplace,以全新一栈式实时 HTAP 数据库赋能全球开发者
猜你喜欢

放大镜子效果图

2021-11-05 definition of cache

学习《缠解论语》

Data visualization and Matplotlib

2022.6.7 特长生模拟
![[untitled] Weng_ C lesson 1](/img/4e/41876093ef6b6a38909832f89e1495.jpg)
[untitled] Weng_ C lesson 1

(transformation) tree, binary tree and forest transformation principle

TiDB Cloud 上线 Google Cloud Marketplace,以全新一栈式实时 HTAP 数据库赋能全球开发者

SOCKET【5】- struct linger 用法
![[atcoder1980] mystious light (mathematical simulation)](/img/c0/7de31b36e11ff71328d927c1d1c2d3.png)
[atcoder1980] mystious light (mathematical simulation)
随机推荐
TypeScript-键盘映射
[atcoder1983] BBQ hard (combination number + clever model transformation)
Simple use of string
远程办公经验 | 社区征文
Clipping and overlapping of YUV data
How to prepare for the new PMP syllabus exam?
After 4 years of naked resignation from the test, the test post of 15K interview was rubbed on the ground, and the result made me collapse and cry
远程办公经验分享 | 社区征文
Login and parameterization of interface test
【AtCoder2387】+/- Rectangle
Label the mask image not obtained through labelme
Bladed入门教程(视频)
学习《缠解论语》
VIM common commands
Sort - Swap sort
Database connection pool and bdutils tool
[noip2016 d1t3] changing classrooms (expectation dp+floyd) (trap of extreme thinking!)
Data visualization and Matplotlib
如何开始参与开源社区
mpi