当前位置:网站首页>How many of the 50 questions about network knowledge can you answer correctly?

How many of the 50 questions about network knowledge can you answer correctly?

2022-06-11 07:54:00 GLAB-Mary

1) What is a link ?

A link is a connection between two devices . It includes cable types and protocols for one device to communicate with another .

2)OSI What is the level of the reference model ?

Yes 7 individual OSI layer : The physical layer , Data link layer , The network layer , Transport layer , The session layer , Presentation layer and application layer .

3) What is backbone network ?

Backbone network is a centralized infrastructure , It aims to distribute different routes and data to various networks . It also deals with bandwidth management and various channels .

4) What is? LAN?

LAN Is the abbreviation of LAN . It refers to the connection between the computer and other network devices in small physical locations .

5) What is a node ?

A node is the point at which a connection takes place . It can be a computer or device that is part of a network . In order to form a network connection , You need two or more nodes .

6) What is a router ?

Router can connect two or more network segments . These are intelligent network devices that store information in their routing tables , For example, path , Hop count, etc . With this information , They can determine the best path for data transmission . Router in OSI Network layer operation .

7) What is point-to-point link ?

It refers to the direct connection between two computers on the network . In addition to connecting the cable to two computers NIC Outside the card , Point to point connections do not require any other network devices .

8) What is anonymity FTP?

FTP It's a way to give users access to files in a public server . Users who are allowed to access the data in these servers do not need to identify themselves , Instead, log in as an anonymous visitor .

9) What is a subnet mask ?

Subnet mask and IP Address combination , To identify two parts : Expand network address and host address . image IP The address is the same , Subnet mask by 32 A composition .

10)UTP What is the maximum length of cable allowed ?

UTP The single section of the cable has 90 To 100 The permissible length of meters . This limitation can be overcome by using repeaters and switches .

11) What is data encapsulation ?

Data encapsulation is the process of decomposing information into smaller manageable blocks before transmitting it over the network . In the process , Source and destination addresses are appended to the header along with parity .

12) Describe network topology

Network topology refers to the layout of computer network . It shows the physical layout of the equipment and cables , And how they connect to each other .

13) What is? VPN?

VPN It means virtual private network , This technology allows you to go through the network ( Such as Internet) Create a safe passage .

for example ,VPN Allows you to establish a secure dial-up connection to a remote server .

14) A brief description NAT.

NAT It's network address translation . It's an agreement , Provides a way for multiple computers on a public network to share to Internet A single connection .

15)OSI What is the work of the network layer under the reference model ?

The network layer is responsible for data routing , Packet switching and congestion control . Routers run under this layer .

16) How the network topology affects your decision to build a network ?

The network topology determines what media must be used for interconnection devices . It also serves as a material for setting , The foundation of connectors and terminals .

17) What is? RIP?

RIP, The short name of routing information protocol is used by routers to send data from one network to another network .

It effectively manages routing data by broadcasting its routing table to all other routers in the network . It determines the network distance in hops .

18) What are different ways to protect computer networks ?

There are several ways to do this . Install reliable and updated antivirus programs on all computers . Make sure the firewall is set up and configured correctly . User authentication will also help a lot . All of these combinations will form a highly secure network .

19) What is? NIC?

NIC It's a network interface card ( network card ) Abbreviation . This is connected to PC To connect to the network Shenbei . Every NIC All have their own MAC Address , Used to identify... On the network PC.

20) What is? WAN?

WAN On behalf of Wan . It's a geographically dispersed interconnection of computers and devices . It connects different regions and countries / Regional networks .

21)OSI What is the importance of the physical layer ?

The physical layer converts data bits to electrical signals , vice versa . This is network equipment and cable type considerations and settings .

22)TCP/IP How many floors are there under ?

There are four floors : The network layer , The Internet layer , Transport layer and application layer .

23) What is a proxy server , How do they protect computer networks ?

The proxy server mainly prevents external users from identifying the internal network IP Address . Don't know the right IP Address , It doesn't even recognize the physical location of the network . A proxy server can make the network almost invisible to external users .

24)OSI What is the function of the session layer ?

This layer provides protocols and methods for two devices on the network , Communicate with each other by holding a conversation . This includes setting up sessions , Manage the exchange of information during the session and the process of terminating the session .

25) What is the importance of implementing a fault-tolerant system ? Is it limited ?

Fault tolerant systems ensure continuous data availability . This is achieved by eliminating a single point of failure . however , In some cases , This type of system will not be able to protect data , For example, accidental deletion .

26)10Base-T What does that mean? ?

10 Data transfer rate , In this case it is 10Mbps.“Base” Baseband .T For twisted pair , This is the cable for this network .

27) What is private IP Address ?

special IP The address is assigned to the intranet . These addresses are used for internal networks , Cannot route on an external public network . These ensure that there is no conflict between the internal networks , At the same time private IP The address range can also be reused in multiple internal networks , Because they don't “ notice ” each other .

28) What is? NOS?

NOS Or network operating system is special software , Its main task is to provide computer with network connection , To be able to communicate with other computers and connected devices .

29) What is? DoS?

DoS Or a denial of service attack is an attempt to prevent users from accessing the Internet or any other network service . There may be different forms of attack , Made up of a group of permanents . A common way to do this is to overload the system server , So that it can no longer handle legitimate traffic , And will be forced to reset .

30) What is? OSI, What role does it play in the computer network ?

OSI( Open Systems Interconnection ) As a reference model for data communication . It consists of 7 layers , Each layer defines specific aspects of how network devices connect and communicate with each other . One layer can handle the physical media used , The other layer indicates how data is actually transmitted over the network .

31) What is the purpose of the cable being shielded and having twisted pairs ?

Its main purpose is to prevent crosstalk . Crosstalk is electromagnetic interference or noise , May affect the data transmitted through the cable .

32) What are the advantages of address sharing ?

By using address translation instead of routing , Address sharing provides an inherent security advantage . This is because the host on the Internet can only see the public interface of the external interface on the computer providing address translation IP Address , It's not private on the Internet IP Address .

33) What is? MAC Address ?

MAC Or media access control , Can uniquely identify devices on the network . It's also called a physical address or an Ethernet address .MAC Address by 6 Byte composition .

34) stay OSI In terms of reference model ,TCP/IP What is the equivalent layer or multilayer of application layer ?

TCP/IP The application layer is actually OSI There are three peers on the model : The session layer , Presentation layer and application layer .

35) How to identify a given IP Address of the IP class ?

By looking at any given IP The first octet of the address , You can identify it as A class ,B Class or C class . If the first octet is in 0 The beginning of a bit , The address is Class A. If you take a place 10 start , The address is B Class address . If from 110 Start , So it's C Class network .

36)OSPF What is the main purpose of ?

OSPF Or open shortest path first , Is a link state routing protocol that uses a routing table to determine the best path for data exchange .

37) What is a firewall ?

Firewalls are used to protect internal networks from external attacks . These external threats may be hackers who want to steal data or computer viruses , Data can be eliminated immediately . It also prevents other users from external networks from accessing the private network .

38) Describe the star topology

A star topology consists of a hub connected to a node . This is one of the simplest settings and maintenance .

39) What is a gateway ?

The gateway provides the connection between two or more network segments . It is usually a computer running gateway software and providing translation services . This translation is the key to allowing different systems to communicate over the network .

40) What are the disadvantages of star topology ?

One of the main disadvantages of star topology is , Once the central hub or switch is damaged , The whole network becomes unusable .

41) What is? SLIP?

SLIP Or serial line interface protocol is actually UNIX Old protocols from early development . This is one of the protocols for remote access .

42) Give some examples of private network addresses .

10.0.0.0, The subnet mask is 255.0.0.0

172.16.0.0, The subnet mask is 255.240.0.0

192.168.0.0, The subnet mask is 255.255.0.0

43) What is? tracert?

Tracert It's a Windows Utilities , It can be used to track the route of data collection from router to target network . It also shows the number of hops used throughout the transmission route .

44) What is the function of Network Administrator ?

Network administrators have a lot of responsibilities , It can be summarized as 3 Key features : Install the network , Configure network settings and network maintenance / Troubleshooting .

45) Describe a disadvantage of peer-to-peer networks .

When you are accessing resources shared by a workstation on the network , The performance of this workstation will be reduced .

46) What is a hybrid network ?

Hybrid networks are using clients - Network settings of server and peer-to-peer architecture .

47) What is? DHCP?

DHCP Is the abbreviation of Dynamic Host Configuration Protocol . Its main task is to automatically assign devices on the network IP Address . It first checks the next available address that is not occupied by any device , Then assign it to network devices .

48)ARP What is the main job of ?

ARP Or address resolution protocol's main task is to be known IP Address mapping to MAC Floor address .

49) What is? TCP/IP?

TCP/IP It's transmission control protocol / Abbreviation of internet protocol . This is a set of protocol layers , Designed for different types of computer networks ( Also known as heterogeneous networks ) Data exchange on .

50) How to use router to manage network ?

The router has a built-in console , Allows you to configure different settings , Like security and data logging . You can assign restrictions... To computers , For example, resources that are allowed to access , Or you can browse the Internet at a certain time of day .

You can even impose restrictions on sites that are not visible throughout the network .

原网站

版权声明
本文为[GLAB-Mary]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/162/202206110750379714.html