当前位置:网站首页>How many of the 50 questions about network knowledge can you answer correctly?
How many of the 50 questions about network knowledge can you answer correctly?
2022-06-11 07:54:00 【GLAB-Mary】
1) What is a link ?
A link is a connection between two devices . It includes cable types and protocols for one device to communicate with another .
2)OSI What is the level of the reference model ?
Yes 7 individual OSI layer : The physical layer , Data link layer , The network layer , Transport layer , The session layer , Presentation layer and application layer .
3) What is backbone network ?
Backbone network is a centralized infrastructure , It aims to distribute different routes and data to various networks . It also deals with bandwidth management and various channels .
4) What is? LAN?
LAN Is the abbreviation of LAN . It refers to the connection between the computer and other network devices in small physical locations .
5) What is a node ?
A node is the point at which a connection takes place . It can be a computer or device that is part of a network . In order to form a network connection , You need two or more nodes .
6) What is a router ?
Router can connect two or more network segments . These are intelligent network devices that store information in their routing tables , For example, path , Hop count, etc . With this information , They can determine the best path for data transmission . Router in OSI Network layer operation .
7) What is point-to-point link ?
It refers to the direct connection between two computers on the network . In addition to connecting the cable to two computers NIC Outside the card , Point to point connections do not require any other network devices .
8) What is anonymity FTP?
FTP It's a way to give users access to files in a public server . Users who are allowed to access the data in these servers do not need to identify themselves , Instead, log in as an anonymous visitor .
9) What is a subnet mask ?
Subnet mask and IP Address combination , To identify two parts : Expand network address and host address . image IP The address is the same , Subnet mask by 32 A composition .
10)UTP What is the maximum length of cable allowed ?
UTP The single section of the cable has 90 To 100 The permissible length of meters . This limitation can be overcome by using repeaters and switches .
11) What is data encapsulation ?
Data encapsulation is the process of decomposing information into smaller manageable blocks before transmitting it over the network . In the process , Source and destination addresses are appended to the header along with parity .
12) Describe network topology
Network topology refers to the layout of computer network . It shows the physical layout of the equipment and cables , And how they connect to each other .
13) What is? VPN?
VPN It means virtual private network , This technology allows you to go through the network ( Such as Internet) Create a safe passage .
for example ,VPN Allows you to establish a secure dial-up connection to a remote server .
14) A brief description NAT.
NAT It's network address translation . It's an agreement , Provides a way for multiple computers on a public network to share to Internet A single connection .
15)OSI What is the work of the network layer under the reference model ?
The network layer is responsible for data routing , Packet switching and congestion control . Routers run under this layer .
16) How the network topology affects your decision to build a network ?
The network topology determines what media must be used for interconnection devices . It also serves as a material for setting , The foundation of connectors and terminals .
17) What is? RIP?
RIP, The short name of routing information protocol is used by routers to send data from one network to another network .
It effectively manages routing data by broadcasting its routing table to all other routers in the network . It determines the network distance in hops .
18) What are different ways to protect computer networks ?
There are several ways to do this . Install reliable and updated antivirus programs on all computers . Make sure the firewall is set up and configured correctly . User authentication will also help a lot . All of these combinations will form a highly secure network .
19) What is? NIC?
NIC It's a network interface card ( network card ) Abbreviation . This is connected to PC To connect to the network Shenbei . Every NIC All have their own MAC Address , Used to identify... On the network PC.
20) What is? WAN?
WAN On behalf of Wan . It's a geographically dispersed interconnection of computers and devices . It connects different regions and countries / Regional networks .
21)OSI What is the importance of the physical layer ?
The physical layer converts data bits to electrical signals , vice versa . This is network equipment and cable type considerations and settings .
22)TCP/IP How many floors are there under ?
There are four floors : The network layer , The Internet layer , Transport layer and application layer .
23) What is a proxy server , How do they protect computer networks ?
The proxy server mainly prevents external users from identifying the internal network IP Address . Don't know the right IP Address , It doesn't even recognize the physical location of the network . A proxy server can make the network almost invisible to external users .
24)OSI What is the function of the session layer ?
This layer provides protocols and methods for two devices on the network , Communicate with each other by holding a conversation . This includes setting up sessions , Manage the exchange of information during the session and the process of terminating the session .
25) What is the importance of implementing a fault-tolerant system ? Is it limited ?
Fault tolerant systems ensure continuous data availability . This is achieved by eliminating a single point of failure . however , In some cases , This type of system will not be able to protect data , For example, accidental deletion .
26)10Base-T What does that mean? ?
10 Data transfer rate , In this case it is 10Mbps.“Base” Baseband .T For twisted pair , This is the cable for this network .
27) What is private IP Address ?
special IP The address is assigned to the intranet . These addresses are used for internal networks , Cannot route on an external public network . These ensure that there is no conflict between the internal networks , At the same time private IP The address range can also be reused in multiple internal networks , Because they don't “ notice ” each other .
28) What is? NOS?
NOS Or network operating system is special software , Its main task is to provide computer with network connection , To be able to communicate with other computers and connected devices .
29) What is? DoS?
DoS Or a denial of service attack is an attempt to prevent users from accessing the Internet or any other network service . There may be different forms of attack , Made up of a group of permanents . A common way to do this is to overload the system server , So that it can no longer handle legitimate traffic , And will be forced to reset .
30) What is? OSI, What role does it play in the computer network ?
OSI( Open Systems Interconnection ) As a reference model for data communication . It consists of 7 layers , Each layer defines specific aspects of how network devices connect and communicate with each other . One layer can handle the physical media used , The other layer indicates how data is actually transmitted over the network .
31) What is the purpose of the cable being shielded and having twisted pairs ?
Its main purpose is to prevent crosstalk . Crosstalk is electromagnetic interference or noise , May affect the data transmitted through the cable .
32) What are the advantages of address sharing ?
By using address translation instead of routing , Address sharing provides an inherent security advantage . This is because the host on the Internet can only see the public interface of the external interface on the computer providing address translation IP Address , It's not private on the Internet IP Address .
33) What is? MAC Address ?
MAC Or media access control , Can uniquely identify devices on the network . It's also called a physical address or an Ethernet address .MAC Address by 6 Byte composition .
34) stay OSI In terms of reference model ,TCP/IP What is the equivalent layer or multilayer of application layer ?
TCP/IP The application layer is actually OSI There are three peers on the model : The session layer , Presentation layer and application layer .
35) How to identify a given IP Address of the IP class ?
By looking at any given IP The first octet of the address , You can identify it as A class ,B Class or C class . If the first octet is in 0 The beginning of a bit , The address is Class A. If you take a place 10 start , The address is B Class address . If from 110 Start , So it's C Class network .
36)OSPF What is the main purpose of ?
OSPF Or open shortest path first , Is a link state routing protocol that uses a routing table to determine the best path for data exchange .
37) What is a firewall ?
Firewalls are used to protect internal networks from external attacks . These external threats may be hackers who want to steal data or computer viruses , Data can be eliminated immediately . It also prevents other users from external networks from accessing the private network .
38) Describe the star topology
A star topology consists of a hub connected to a node . This is one of the simplest settings and maintenance .
39) What is a gateway ?
The gateway provides the connection between two or more network segments . It is usually a computer running gateway software and providing translation services . This translation is the key to allowing different systems to communicate over the network .
40) What are the disadvantages of star topology ?
One of the main disadvantages of star topology is , Once the central hub or switch is damaged , The whole network becomes unusable .
41) What is? SLIP?
SLIP Or serial line interface protocol is actually UNIX Old protocols from early development . This is one of the protocols for remote access .
42) Give some examples of private network addresses .
10.0.0.0, The subnet mask is 255.0.0.0
172.16.0.0, The subnet mask is 255.240.0.0
192.168.0.0, The subnet mask is 255.255.0.0
43) What is? tracert?
Tracert It's a Windows Utilities , It can be used to track the route of data collection from router to target network . It also shows the number of hops used throughout the transmission route .
44) What is the function of Network Administrator ?
Network administrators have a lot of responsibilities , It can be summarized as 3 Key features : Install the network , Configure network settings and network maintenance / Troubleshooting .
45) Describe a disadvantage of peer-to-peer networks .
When you are accessing resources shared by a workstation on the network , The performance of this workstation will be reduced .
46) What is a hybrid network ?
Hybrid networks are using clients - Network settings of server and peer-to-peer architecture .
47) What is? DHCP?
DHCP Is the abbreviation of Dynamic Host Configuration Protocol . Its main task is to automatically assign devices on the network IP Address . It first checks the next available address that is not occupied by any device , Then assign it to network devices .
48)ARP What is the main job of ?
ARP Or address resolution protocol's main task is to be known IP Address mapping to MAC Floor address .
49) What is? TCP/IP?
TCP/IP It's transmission control protocol / Abbreviation of internet protocol . This is a set of protocol layers , Designed for different types of computer networks ( Also known as heterogeneous networks ) Data exchange on .
50) How to use router to manage network ?
The router has a built-in console , Allows you to configure different settings , Like security and data logging . You can assign restrictions... To computers , For example, resources that are allowed to access , Or you can browse the Internet at a certain time of day .
You can even impose restrictions on sites that are not visible throughout the network .
边栏推荐
- Bladed入門教程(視頻)
- multi-sig SC
- C- print 99 multiplication table
- 空间几何
- You got 8K in the 3-year function test, but you were actually pretending to work hard
- Long dialogue in June 2017
- Logical implication of functional dependence
- Understanding of Poisson distribution and Poisson process and Erlang distribution and their relations (important theories in queuing theory and operational research)
- TiDB Cloud 上線 Google Cloud Marketplace,以全新一棧式實時 HTAP 數據庫賦能全球開發者
- Bubble sorting with C language
猜你喜欢

使用 COCO 数据集训练 YOLOv4-CSP 模型

(transformation) tree, binary tree and forest transformation principle

Tidb Cloud est en ligne sur le marché Google Cloud pour permettre aux développeurs du monde entier d'utiliser une nouvelle pile de bases de données htap en temps réel

空间几何

Detailed explanation of character function and string function (including simulation implementation)

2022.6.7 特长生模拟

mpi

2022.6.7 special student simulation

如何做好空状态设计?来看这份全面总结

图数据库无缝集成Tushare接口
随机推荐
自定义ViewGroup的知识点总结-持续更新
[atcoder1983] BBQ hard (combination number + clever model transformation)
C. Manipulating History(贪心/哈希/思维/好题)
. Net C Foundation (6): namespace - scope with name
Zero foundation self-study SQL course | outer join external connection
Using Tkinter to realize guessing numbers game
About static keyword
Database connection pool and bdutils tool
[atcoder1984] wide swap
Summary of force deduction questions
【HDU6357】Hills And Valleys(DP)
TypeScript-unknown类型
E regression test of this featured app
TiDB Cloud 上线 Google Cloud Marketplace,以全新一栈式实时 HTAP 数据库赋能全球开发者
C- print 99 multiplication table
Detailed explanation of shift operator and bit operator in C language
Paging of the flask page
JSP development model
Understanding of Poisson distribution and Poisson process and Erlang distribution and their relations (important theories in queuing theory and operational research)
The solution of "no startup device" after running Bochs