发信人: suppy()
整理人: reynolds(1999-09-29 23:23:41), 站内信件
|
今天去交大南洋考70-58,966/766,十分easy,(sylvan的题目也有乱码)
在此,我衷心感谢那些帮助过我的朋友们!发自内心的感谢!!!
题目几乎全都见过!
最值得推荐的就是RAMPAGE,命中率极高!
开始我手直斗,后来见了题目都见过也放松了:)
DRAG&DROP两题
1.有3个网,要互联,其中A,B(哪个是A哪个是B我忘了)个在同一子网内,都用 TCP/IP,还有A,C也都用TCP/IP,但不在同一子网内,B,C协议不同,TCP/IP和 NWLINK,要在BRIDGER,BRIDGE,GATEWAY,RPEATER等中选三个,前3个为正确答 案。
2。新添了一台95的client,要和UNIX和NETWARE互连,要从4个协议中选三个,
但图中好象没指出哪个框是连UNIX,哪个是连NW,我随便放了上去,从得分看好 象没关系!
有一题问用什么方法是机器在硬盘和硬盘控制器坏掉的情况下仍能工作,
应选——磁盘复制
还有一题关于RAID5,在最小花费下达到磁盘容错
What must you specify when you want to copy a file from 1 computer to another by using a UNC name? (Choose 2.)
A. share name
B. domain name
C. computer name
D. workgroup name
What is a characteristic of a client/server networks?
A. Any computer can make its resources available to any other comp uter on the network.
B. Dumb terminals are connected to a central host computer that pe rforms all processing.
C. Any computer on the network can be both a client and a server.
D. Client computers access a server that performs back-end service s
. Barbara's remote computer can be accessed via dial-up telephone line s. The computer is 5 years old and uses TCP/IP as its only transport p rotocol. The data link communications protocol used by the computer ca nnot provide automatic IP addressing.
Which data link communications protocol is Barbara's computer using?
A. DLC
B. SLIP
C. PPP
What is a characteristic of the IEEE 802.3 10BaseT standard?
A. It specifies RJ-11 connectors at the ends of each cable.
B. It specifies UTP cable.
C. It specifies BNC T-connectors for connecting computers to cable s.
D. It specifies 50-ohm terminators at the ends of each cable.
What is a benefit of both NDIS and ODI?
(选项不是这样的,但也就这意思)
答案应选interface……
A. They allow network adapters to be used in any compliant compute r.
B. They allow network adapters to transmit information over a grea ter distance than noncompliant network adapters can.
C. They allow network adapters to communicate with other compliant network adapters.
D. They allow network adapters to be independent of any particular transport protocol.
You want to install a 100-Mbps backbone network that will connect 5 ex isting networks. Which media should you use?
A. Category 3 UP cable
B. Category 4 UTP cable
C. Fiber-optic cable
D. RG-58 A/U coaxial cable
. You are designing a peer-to-peer network that consists of 5 Microsof t Windows 95 computers. Which protocol should you use?
A. DLC
B. NFS
C. NWLink IPX
D. XNS
You want to connect your Ethernet and token-ring networks. Both networ ks use NWLink IPX. You want to use IPX addressing to limit the amount of traffic between the 2 networks.
Which device should you use?
A. repeater
B. bridge
C. router
D. gateway
Your l0BaseT Ethernet network uses NetBEUI. Users of your client compu ters need to access an IBM 3090 mainframe computer by using a 3270 ter minal-emulation program.
Which device must you install?
A. bridge
B. gateway
C. router
D. brouter
Your company has an Ethernet network with 750 computers. The company i s migrating to servers that run Microsoft Windows NT Server and to cli ent computers that run Microsoft Windows 95. You want to protect sensi tive network data, with a minimal amount of administration.
What should you include in your security plan?
A. peer-to-peer file sharing, with user-level security on all shar ed resources
B. peer-to-peer file sharing, with resource-password security on a ll shared resources
C. centralized administration of user accounts, with user-level se curity on all shared resources
D. centralized administration of user accounts, with resource-pass word security on all shared resources
Situation
You are designing a security plan for your network. The following tabl e summarizes the current network configuration.
Server 2 total - both run Microsoft Windows NT server, 1 is the PDC and 1 is the BDC
Client Computers 100, which run Microsoft Windows 95
Network Type 10BaseT Ethernet
Required result:
You must have centralized control of access to shared resources.
Optional desired results:
You want to track all access and attempted access to shared resources.
You want to track attempts to guess user passwords.
You want to implement a method to protect user accounts from passwor d-breaking programs.
Proposed solution:
Implement NTFS with user-level security on all servers. Set appropriat e access-control security on all shared resources. Require users to ch ange their passwords every 40 days. Implement disk striping with parit y on all servers. Perform daily tape backups, and store tapes in a sec ure off-site location.
Which results does the proposed solution produce?
A. the proposed solution produces the required result and produces all of the optional
desired results.
B. the proposed solution produces the required result and produces only 1 of the optional
desired results.
C. The proposed solution produces the required result but does not produce any of the optional desired results.
D. the proposed solution does not produce the required result.
Situation:
You are designing a WAN that will connect 3 existing networks in Dalla s, Denver, and New Orleans.
Required result:
All of the computers on each of the 3 networks must be able to communi cate with any other computer on the 3 networks.
The WAN links must be capable of transmitting data at a minimum speed of 1 Mbps.
Optional desired results:
You want to provide continued communications in the event of a single- link failure.
You want to provide continued communications at a minimum speed of 1 M bps in the event of a single-link failure.
Proposed solution:
Connect the 3 networks by using 3 28.8 MODEM(*)
Diagram of the proposed WAN.
Which results does the proposed solution produce?
A. The proposed solution produces the required results and produc es both of the optional desired results.
B. The proposed solution produces the required results and produce s only 1 of the optional desired results.
C. The proposed solution produces the required results but does no t produce any of the optional desired results.
D. The proposed solution does not produce the required results.
. Configuration of your client computer:
· SVGA card
· SCSI card, set at IRQ 15
· LPT1
· LPT2
· COM1
· COM2
. PS/2 mouse port
The computer runs Microsoft Windows NT Workstation.
You are installing a token-ring network adapter in the computer. You s et it to use IRQ 3.
Which device could cause IRQ conflicts in the computer?
A. COM1
B. COM2
C. LPT1
D. LPT2
Which device should you use to monitor the amount of network traffic o ver time?
A. time domain reflectometer (TDR)
B. cable tracer
C. protocol analyzer
D. medium attachment unit
Your network uses NWLink IPX. Initialization of your client computer's network software appears to be successful, but your client computer i s not able to access the server. All of the other computers are able t o access the server. What is the most likely cause of the problem?
A. the wrong network-adapter driver is installed in your client co mputer.
B. your client computer has insufficient extended memory.
C. the network adapter in your client computer is configured to us e the wrong I/O port
address.
D. the network adapter in your client computer is configured to us e the wrong frame type.
Configuration of 2 of the client computers on your 10BaseT Ethernet ne twork:
VGA adapter: Default settings
IDE controller: Default settings
Floppy disk drive controller: Default settings
LPT1: Default settings
COM1: Default settings
COM2: Default settings
Ethernet network adapter See settings below:
MAC hardware address: 1 0C805000000
IRQ: 5
IO port address: 300
Transceiver: RJ-45
DMA None
Memory address: None
Neither computer is able to access the network. You run diagnostic tes ts on the network adapters in both computers. Configuration of both ad apters is identical:
Which change must you make on both Ethernet network adapters to allow the 2 client computers to access the network?
A. Change the MAC (hardware) addresses to factory settings.
B. Change the IRQ settings to 3.
C. Change the IO port addresses to 320.
D. Change the transceiver types to BNC.
Situation: 这题我错了,没看清:(
Your company's rapid growth has caused an increase in the number of co mputers on your network. There were 300 computers at the beginning of the year, and there are 1,000 now. Broadcast storms are occurring with increasing frequency on the network. You want to reduce the number of broadcast storms. The following table summarizes your current network configuration.
Server 25, Which run Microsoft Windows NT Server
Client Computers 600 which run Microsoft Windows 95, and
300 Macintosh Computer that run System 7.x
75 UNIX computer
Network Types 10BaseT Ethernet
Protocols NetBEUI, TCP/IP with DHCP and WINS, NWLink IPX, AppleTalk
Cable Category 3 UTP
Brouters 4, with bridging enabled
Required result:
You must reduce the number of broadcast storms by at least 50 percent while minimizing changes in functionality for the client computers.
Optional desired results:
Minimize hardware costs needed to produce the reduction in broadcast s torms.
Minimize ongoing administrative costs after the changes are made.
Allow for continued expansion of the network.
Proposed solution:
Turn off bridging on all of the brouters. Configure all of the compute rs and brouters to use only NWLink IPX.
Which results does the proposed solution produce?
A. The proposed solution produces the required result and produces all of the optional desired results.
B. The proposed solution produces the required result and produces only 1 of the optional desired results.
C. The proposed solution produces the required result but does not produce any of the optional desired results.
D. The proposed solution does not produce the required result.
其他记的不是最清楚了:(
再次感谢帮助过我的朋友!!!
祝大家节日快乐!!!!!!
-- ==我永远都不会一无所有,失去了爱,至少我还有网易的朋友们==
[email protected]
※ 来源:.月光软件站 http://www.moon-soft.com.[FROM: 202.109.41.68]
|
|