计算机类
公务员类
工程类
语言类
金融会计类
计算机类
医学类
研究生类
专业技术资格
职业技能资格
学历类
党建思政类
计算机软件水平考试
全国计算机应用水平考试(NIT)
计算机软件水平考试
计算机等级考试(NCRE)
全国高校计算机等级考试CCT
行业认证
信息素养
网络工程师(中级)
信息系统项目管理师(高级)
系统分析师(高级)
系统架构设计师(高级)
网络规划设计师(高级)
系统规划与管理师(高级)
软件评测师(中级)
软件设计师(中级)
网络工程师(中级)
多媒体应用设计师(中级)
嵌入式系统设计师(中级)
电子商务设计师(中级)
系统集成项目管理工程师(中级)
信息系统监理师(中级)
信息安全工程师(中级)
数据库系统工程师(中级)
信息系统管理工程师(中级)
软件过程能力评估师(中级)
计算机辅助设计师(中级)
计算机硬件工程师(中级)
信息技术支持工程师(中级)
程序员(初级)
网络管理员(初级)
信息处理技术员(初级)
电子商务技术员(初级)
信息系统运行管理员(初级)
网页制作员(初级)
多媒体应用制作技术员(初级)
PMP项目管理员资格认证
计算机与网络知识
计算机与网络知识
网络系统设计与管理
单选题
进入题库练习
单选题下图所示的网络拓扑中配置了 RIP 协议,且 RIP 协议已更新完成
进入题库练习
单选题在VOIP 系统中,通过__( )__对声音信号进行压缩编码。
进入题库练习
单选题 (66) is used to ensure the confidentiality, integrity and authenticity of the two end points in the private network. (67) , an application-layer protocol, authenticates each peer in an IPsec transaction. IKE negotiates security policy, determining which algorithm may be used to set up the tunnel. It also handles the exchange of session keys used for that one transaction. Networks that use (68) to secure data traffic can automatically authenticate devices by using (69) , which verify the identities of the two users who are sending information back and forth. IPsec can be ideal way to secure data in large networks that require secure connections among many devices. Users deploying IPsec can (70) their network infrastructure without affecting the applications on individual computer. The protocol suite is available as a software-only upgrade to the network infrastructure. This alows security to be implemented without costly changes to each computer. Most important, IPsec allows interoperability among different network devices, PCs and other computing systems.
进入题库练习
单选题关于虚拟专用网,下面正确的语句是 ( ) 。
进入题库练习
单选题Most IP layer-based proxy mechanisms, such as network address translation (NAT), only support uni-directional proxy, from the internal network to external network (the Internet). The proxy establishes the communication channel by (66) IP addresses. The IP addresses must be (67) . These proxy mechanisms prevent applications that must establish return data channels from establishing their data channels, such as, multimedia applications. IP layer-based proxy mechanisms need additional software (68) for each application that uses (69) channels. SOCKS identifies communication targets through domain names, overcoming the restriction of using private IP addresses. SOCKS can use domain names to establish communication between separate LANs, with (70) IP addresses.
进入题库练习
单选题一名攻击者向一台远程主机发送特定的数据包,但是不想远程主机响应这个数据包。它采用的攻击手段可能是 (63) 。
进入题库练习
单选题
进入题库练习
单选题按照网络分级设计模型,通常把网络设计为3 层,即核心层、汇聚层和接入层,以下关于分级网络的描述中,不正确的是 ( ) 。
进入题库练习
单选题活动目录(Active Directory)是由组织单元、域、 (39) 和域林构成的层次结构,安装活动目录要求分区的文件系统为 (40) 。
进入题库练习
单选题Routing protocols use different techniques for assigning (71) to individual networks. Further, each routing protocol forms a metric aggregation in a different way. Most routing protocols can use multiple paths if the paths have an equal (72) Some routing protocols can even use multiple paths when paths have an unequal cost. In either case, load (73) can improve overall allocation of network bandwidth. When multiple paths are used, there are several ways to distribute the packets. The two most common mechanisms are per-packet load balancing and per-destination load balancing. Per-packet load balancing distributes the (74) across the possible routes in a manner proportional to the route metrics. Per-destination load balancing distributes packets across the possible routes based on (75)
进入题库练习
单选题以下对几种网络管理工具/命令的描述中,错误的是______。 A.常见的网络数据监听工具有Sniffer Pro、Iris、TCPdump、Wireshark等 B.常用的漏洞扫描工具有ISS、MBSA、WSUS、X-Scanner等 C.tracert可以发现数据包到达目标主机所经过的路由器和到达时间 D.sniffer软件能够使网络接口处于杂收模式,从而可截获网络上传输的分组
进入题库练习
单选题设信道带宽为3400Hz,采用PCM编码,采样周期为125μs,每个样本量化为256个等级,则信道的数据速率为______。
进入题库练习
单选题一个主机的IP地址是172.16.2.12/24,该主机所属的网络地址是______。 A.172.0.0.0 B.172.16.0.0 C.172.16.2.0 D.172.16.1.0
进入题库练习
单选题Microsoft's COM is a software architecture that allows applications to be built from binary software components. COM is the underlying (71) that forms the foundation for higher-level software services, like those provided by OLE. COM defines a binary standard for function calling between components, a way for components to dynamically discover the interfaces implemented by other components, and a mechanism to identify components and their interfaces uniquely. OLE is a compound (72) standard developed by Microsoft. OLE makes it possible to create (73) with one application and link or embed them in a second application. Embedded objects retain their original format and (74) to the application that created them. Support for OLE is built into the Windows and MacOS Operating Systems. A (75) compound document standard developed mainly by Apple and IBM is called OpenDoc.
进入题库练习
单选题以下程序段违反了算法的{{U}} {{/U}}原则。 void sam() int n=2; while(!odd(n)) n+=2; printf(n); A.确定性 B.健壮性 C.有穷性 D.可靠性
进入题库练习
单选题若一个单处理器的计算机系统中同时存在3个并发进程,则同一时刻允许占用处理器的进程数{{U}} (12) {{/U}};如果这3个进程都要求使用2个互斥资源R,那么系统不产生死锁的最少的R资源数为{{U}} (13) {{/U}}个。
进入题库练习
单选题要使Samba服务器在网上邻居中出现的主机名为smbserver,其配置文件smb.conf中应包含______。 A.workgroup=smbserver B.netbios name=smbserver C.server string=smbserver D.guest account=-smbserver
进入题库练习
单选题为满足公司业务发展的需要,要求楼内综合布线系统为客户机提供数据速率为100Mb/s的数据、图像及语音传输服务,信息插座通常选用 (24) 。当布线结构需要调整时,可通过布线配线系统来重新配置,具体调整手段是通过 (25) 来实现的。
进入题库练习