网络管理员面试题(Network administrator interview questions)
网络管理员面试题(Network administrator interview questions)
1. write the line order of 568A and 568B
2. according to data access speed sorting: hard disk, CPU, CD-ROM, memory
3. write the default ports, POP3, SMTP, and FTP for the following services
4. NIC MAC is composed of 6 groups?
What is the 5.ISO/OSI 7 layer model?
The meaning of 6.C/S and B/S
What does 7.RFC950 define?
8. what does the generic cabling include?
9. routers and switches belong to several layers of equipment
10. how many ports are there in the computer?
11. what is Cache and what is Buffer? What's the difference?
12. what is MBR?
13., you want to get IP 192.168.1.2 MAC in LAN, how to operate at the command prompt of XP system?
14. see edit local policy, what can you enter at start / run?
15. what is the command to convert FAT32 to NTFS partition?
16. what is the IP address assigned by manually updating the DHCP?
17. XP each partition has a System Volume Information name of the hidden directory is to do what? And the pagefile.sys file?
18. default XP file sharing is not the way to set the user permissions, only one will allow network users to change my file options, but need to set permissions for users of different shared folders, how to do?
What is the basic network transport protocol adopted by 19. QQ and other instant messaging software?
20. just installed XP system under which C show only the folder?
21. Windows XP system disk C root directory which has a number of important documents (hidden files)
22. briefly describe the flow chart of the main board of the computer from the power up to the start of the system, and describe it in sequence according to the screen display sequence
23. when the computer is switched on, the beep beeps in the host, and the monitor doesn't have any signal. Which aspect can this phenomenon cause and how to deal with it?
24. if the computer system paralysis (XP system disk is C), the normal start can not enter the system, and C and important documents, will have several rescue methods, how to operate?
Reinstall the system before the 25. format should pay attention to what? (system executable premise)
26. how to set up broadband routers (basic steps)
27. simple talk about how to improve the computer is network security
28., in peer-to-peer networks, use ADSL shared connection Internet, how to limit large traffic, multi-threaded download software and P2P download software, so as to ensure that other users of the network work properly
Reference answer
1, 568B, orange, white, orange, green, white, blue, white, green, brown, white, brown
568A green, white, green, orange, white, blue, white, orange, brown, white, brown
2 CPU memory hard disk drive
3, POP3 110, SMTP 25, FTP 21 (20)
4, there are 16 hexadecimal data composition, the first three groups indicate vendors, there are IEEE to assign, and can be
subdivided, after three
The group represents the serial number of a network product (e.g., network card) manufactured by the manufacturer.
5 application layer, presentation layer, session layer, transport layer, network layer, data link layer, physical layer
6, C/S represents the client / server mode, C is client, and S is server. B/S is based on browsing
/server mode, B is browser, and S is server,
The C in the former requires additional client programs to be developed
The. The latter is implemented based on browsers, such as IE.
7 RFC950 defines IP policies (distribution policies), applications, and other specifications.
8 integrated wiring includes six subsystems:
Building group connection subsystem
Device connection subsystem
Trunk (vertical) subsystem
Management subsystem
Horizontal subsystem
Workspace subsystem
Network cabling system, monitoring system, closed circuit television system
9 routers belong to three layers of equipment, and switches (usually referred to as) belong to the two tier devices
10 TCP0-65535, UDP0-65535, that is, a total of 65536*2=131072 ports
11 cache, literally cache memory, has hardware to implement. Play a coordination between equipment processing speed
Use. For example, CPU's L2, L1, memory role, etc..
Buffer, the literal buffer, has software implemented in RAM. Play a role in speeding up the response speed. example
Such as: WEB cache, cache in each application, queue.
Common points are implemented in RAM, but implementations are not the same.
12, MBR, master, boot, record, master boot record. Guided by OS.
13, my method is to first Ping 192.168.1.2
You can get the ARP list by looking at the ARP -a command
14 gpedit.msc
15, convert, x:, /fs:ntfs, x:, which represents the partition to be converted
16 ipconfig /renew
17 System Volume Information, this directory is the XP automatic restore function to use, storage
Is the restore point file. Pagefile.sys is PF, virtual memory file.
18 open Explorer - tools folder options - View - use simple file sharing (recommended)
In front of the hook removed, or open the Group Policy Editor - ----windows - the computer configuration settings
Site policy - Security Options - network access: shared security mode for local accounts. Change this property to "via"
Dian mode is also possible.
19, using UDP and TCP protocol, QQ mainly uses UDP, in some cases TCP, instant messaging mostly use UDP protocol
20 only windows, program, files, documents, and, settings, System, Volume
Information (with hidden attributes), RECYCLER (with hidden properties).
21 NTLDR, ntdetect.com, boot.ini
The parameters of --CPU 22 power - self]---BIOS - information graphics parameters -- memory parameters of hard disk
Parameter --- the drive's parameters - - display the PCI and other parameters of the motherboard, such as I/O - if you have the RAID card
The step should show) ----BIOS will update ESCD, and finally give (Verifying, DMI, Poll)
DATA.....Update Success) - reads the MBR record - calls NTLDR to do a series
Operation (when the control is transferred from the BIOS to the hard disk /OS) reads the boot.ini file (displays the operating system)
Select a menu) enter a given operation - and so on, a series of operations are part of the operating system, not in
The scope of the problem - - finally see the desktop
23 may be caused by memory problems, generally loose memory, dust more. Dust cleaning can be done from the new plug
Good memory and other operations. Depending on the tweet, you can also judge other hardware issues
24 the easiest thing to do is to hang the hard disk onto another computer, and simply send out the important file copy, if the disk is divided
Zone is FAT, you can use the boot disk to enter DOS mode for file copy operations, if the disk partition is
NTFS, you can start using the tools disk, load NTFSDOS tools under DOS, and perform copy operations on the NTFS partition
For.
25 disk space allows the best backup of the entire windows directory. The main backup program files directory, I
The document directory, documents, and, settings directory. Another: backup some software installation information and so on.
26 broadband routing settings, not complicated, the key is a few steps
Set the dial-up properties, usually PPPOE, ISP provide user name, pass
word
word文档格式规范word作业纸小票打印word模板word简历模板免费word简历
, etc.
Set up the legal IP address of the Intranet
Firewall function is recommended.
27 regular periodic updates to the operating system and application software patches, antivirus, firewall
applications. These all
Is passive, the key is to have a set of feasible administrative means.
28, this question, as far as I know, can only be implemented using third party software, such as the P2P terminator, a series of networks
Tube software.
1., the basic functions of the router?
Clear the Internet because of me
{-] ~5T B+l#o#T7h F
2.. What are the two remote access methods for WIN2000?
.com'^ i1O N \0N
3. out of the English questions, such as: What, about, your, company, before, And, why, you, leave, that, company, or What, is, Big-5, and,, GB, Code, did, What, are, differences, their?
4. write the colors of the eight lines of the standard network line, the order of the lines, and the order of the Cross-Over lines (that is, the HUB connection without the UPlink
interface).
5., doubt a network card when there is a problem, how to detect? G+V
6. how to make a Windows NT4.0 emergency repair disk?
7. what is the VLAN, how to add a VLAN in the CISCO switch, and how to delete?
What does the 8. 10.201.40.0/23 stand for?
Altar, enterprise network management, Internet cafes, network management, Internet cafes, viruses, Download 7\, D, L, C (b
9., there are several levels of disk RAID, which are several? You know or use some of them, please write down their rough description and difference.
10. what are the differences between configuring the NT master domain controller and the 2000 domain controller? What needs to be noted when the NT domain controller is upgraded to 2000?.
11., if a company's servers need to keep working 24 hours a day, such as a hospital, how you can do it, and in several ways, please tell the basic principles.
12., router loop test through, is not necessarily indicating that the routing line is unblocked, why?
Enterprise network management, Internet cafes, network
management, Internet cafes, viruses, Download *l
D L0k ~3}5b}2c
13., a client connected to the 100M switch cannot go to 100M,
There are several reasons. Please name two.
Altar, enterprise network management, Internet cafes, network management, Internet cafes, viruses, Download #h, C, y, D0^5@
14. know the current popular SAN network platform? Is it primarily a solution for which area of the computer?
Industry network management
Internet cafes, network management, Internet cafes, viruses, Download
S C1f0C+` V I
The answer is below:
1. packet forwarding function.
Forums; \ h, z+g8u, L, O
2. dial-up remote access and VPN (virtual private network).
3.My, company, is, very, perfect, I'm, better, than, it?
X j+u B o _
4. standard network lines are arranged in the following order of colors:
568A standard: 1: white, green, 2: green, 3: white orange, 4: blue, 5: white, blue, 6: orange, 7: white brown, 8: Brown
568B standard: 1: white orange, 2: orange, 3: white, green, 4: blue, 5: white, blue, 6: green, 7: white brown, 8: heald Q, H, Q, w5A, F, x, D
The production of HUB level interface without uplink interface is that one end of the network adopts the 568A standard, and the other end uses the 568B standard wiring method
Through the network because of my "c-C" @ f1I&E C:n
5. it will be installed in a normal Internet access on the machine, the indicator light is flashing, normal access state indicator light is red or green, and then use the ping command to detect whether can ping through the network host, if the general is normal, if the card driver is installed correctly and the ping command can not. That the card is broken. "I am a network" J `6` D R | -\ forum h, K
Enterprise, network management, Internet network, Internet, virus, Download H k7n f5u$h Z J _.
7.VLAN is also called virtual local area network refers to the network layer on the LAN partition, a VLAN form a logical subnet,
which is an independent broadcast domain, broadcast network traffic of each subnet itself is limited within the subnet, reduce collision data frame rate, it can cover a plurality of network allow equipment in different geographic locations of Internet users to join a logical subnet. The switches in the CISCO add a VLAN 2 the following commands, Chinese largest network exchange camp! The heaven of enterprise management network, the paradise of Internet cafe network management! T'a K/u3n
Switch>enable
B#x
J [.` ^ forum, network management, enterprise network, Internet network, Internet, virus, download the Switch#vlan database bbs.54master.com, n&c L Z4[B f
X
^/Z W
Switch (VLAN) #vlan 2, China's largest network management exchange camp! The heaven of enterprise management network, the paradise of Internet cafe network management! '@ L
| b*{
China's largest network management exchange camp! The heaven of enterprise management network, the paradise of Internet cafe network management! I! E4d, h, M, D+\
Network management, forums, enterprise network management, Internet cafes, network management, Internet cafes, viruses, Download {I
J d%@ "n&F-d2Y"
.
7a*K, f4C3w (Q4[{), _bbs.54master.comSwitch (VLAN), #exit
A, q2o, p{+y ~ K3E
The following settings: VLAN / / port management, forum, enterprise network, Internet network, Internet, virus, download, r&S S (a Y.a
Switch (config) #int e0/6 / / VLAN 2 set port 6 subordinate
3E, OH, l ~ @+P
O- unblocked network because of my Switch1 (config-if) #vlan-membership static 2
/x {%s A.J; P&X
) y, P, Q, K7~, i.Z+gSwitch#vlan, database
P0C ` A w7~9g&E
R "M5n" (o hbbs.54master.comSwitch (VLAN) #no VLAN 2 2q D t&F
G Z [e l], H
Switch (VLAN) #exit
%
]-X%]
G M J) - network because I have Switch>no int VLAN 2T network communication China largest camp! The heaven of enterprise management network, the paradise of Internet cafe network management! H$N3i D H; Q ~2M#~
E0I8L D
M w- network because I have 8. 10.201.40.0/23 said a class IP address, subnet mask, it is the first 23 position 1, namely 11111111111111111111111000000000, 255.255.254.0 China decimal representation the largest network exchange camp! The heaven of enterprise management network, the paradise of Internet cafe network management! $t L
F y D*a
Network management, forums, enterprise network management, Internet cafes, network management, Internet cafes, viruses, Download R f; t K R; E \?
There are 9. levels of RAID: NRAID, JBOD, RAID0, RAID1, RAID0+1, RAID3, RAID5, and so on. Currently, RAID0, RAID1, RAID3, RAID5, and RAID (0+1) are often used. The difference is as follows:
1D0c%C$b A6Y M4vI [RAID 0 access the fastest, but no fault tolerance
H |6u Y H ^ t5z- unblocked network, because I have RAID 1 completely fault-tolerant, but the cost is relatively high, the disk utilization rate is 50%
W.G Q Y8F- smooth network, because I have RAID 3 writing performance is the best, but there are no multitasking functions, network management, forums, enterprise management, Internet cafes, network management, Internet cafes, viruses, Download
D, C, Z'u?
RAID 5 has multitasking and fault tolerance, with overhead written
RAID 0+1 is fast, fully fault-tolerant, but costly
The 10. Windows2000 Active Directory does not have a difference between the primary domain controller and the backup domain controller, and all domain controllers are the same in terms of user access and service provision! The heaven of enterprise management network, the paradise of Internet cafe network management! M/x; I (^) Q, ` `
When upgrading the NT4 domain to the Win2000 domain, you must pay attention to the following points:
The A. primary domain controller must be a file system using NTFS.
B. can not go back to NT4 after upgrading Win2000.
Z
_.D2K:], s @; n
The C. must first backup important data and pre - prepare the job. "I am the webmaster" forum "U g B I] B
D. first upgrade PDC, and then upgrade BDC.
The E. installer will have the Active Directory database, and the log file and the SysVol three directories will ask for the settings. The directory path must be in the NTFS file system.
Bbs.54master.com M o T8_ R) ^ _
11., use a master server and a standby server, usually work when the main server, when the main server problems, replace the standby server. In addition, you can use a large backup device to backup several copies of the data on the server and replace the backup storage device immediately when the storage device on the server is out of order. Bbs.54master.com K G
S s (U, M, _'W*zc4J1f)
China's largest network management exchange camp! The heaven of enterprise management network, the paradise of Internet cafe
network management! /f, N7], N, s, Y7p, H
12., not necessarily, if the router's local loop test passed, it can only represent the local line device without problems, and can not explain the access provider no problem
China's largest network management exchange camp! The heaven of enterprise management network, the paradise of Internet cafe network management! 8, l, l, m9p&p, B
Thirteen
A: if the connection between the switch and the network core switch is a cascade link, when the terminal is relatively large and the data transmission is large, the congestion may occur in the cascaded link, resulting in slow network speed of the client. The solution is to replace the cascaded link with an Ethernet channel.
B: when the client's network transport device does not reach the 100M, if only 10M, then the client can not go to 100M. - because I have _ network) d p T I5h5w k7U.Rt
"I am the webmaster" forum 5T
Q G+f o
14.SAN is a storage area network, a high-speed network or subnetwork that provides data transmission between a computer and a storage system. A SAN network consists of the communication structure responsible for network connection,
the management layer, storage components and computer system
responsible for organizing the connection, so as to ensure the
security and strength of data transmission.