单选题 (一共47题,共47分)

1.

一个由多个路由器相互连接构成的拓扑图如下所示,图中数字表示路由之间链路的费用,OSPF 路由协议将利用( ) 算法计算出路由器u到z的最短路径费用值为(此空作答)

高级网络规划设计师,历年真题,2020年下半年(上午)《网络规划设计师》真题

2.

管理员无法通过telnet来管理路由器,下列故障原因中不可能的是( )

3.

某数据中心中配备2台核心交换机CoreA和CoreB,并配置VRRP协议实现冗余,网络管理员例行巡查时,在核心交换机CoreA上发现内容为"The state of VRRPChanged form master to other state"的告警日志。经过分析,下列选项中不可能造成该告警的原因是()

4.

RIP路由协议规定在邻居之间每30秒进行一次路由更新,如果()仍未收到邻居的通告消息,则可以判断与其邻居路由器间的链路已经断开。

5.

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an ( ) network, Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH. The protocol works in the ( ) model, which means that the connection in established by-the SSH client connecting to the SSH server. The SSH client drives the connection setup process and uses public key cryptography to verify the ( ) of the SSH server.After the setup phase the SSH protocol uses strong (此空作答) encryption and hashing algorithms to ensure the privacy and integrity of the data that is exchanged between the client and server. There are several options that can be used for user authentication. The most common ones are passwords and ( ) key authentication.

6.

TCP可靠传输机制为确定超时计时器的值,首先要估算RTT,估算RTT采用如下公式,算RTTs=(估算RTTs) +aX (新的RTT样本),其中a的值取为()

7.

在IEEE 802.11 DRAN制k中,频率范围在5.15-5.35GHz的是()

8.

某大楼干线子系统采用多模光纤布线,施工完成后,发现设备间子系统到楼层配线间网络丢包严重,造成该故障可能的原因是( )

9.

6个速率为64Kb/s的用户按照同步时分多路复用技术(TDM)复用到一条干线上,若每个用户平均效率为80%,干线开销4%,干线速率为() Kb/s

10.

RAID 1中的数据冗余通过()技术实现的。

11.

MIM0技术在5G中起着关键作用,以下不属于MIMO功能的是()

12.

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an ( ) network, Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH. The protocol works in the (此空作答) model, which means that the connection in established by-the SSH client connecting to the SSH server. The SSH client drives the connection setup process and uses public key cryptography to verify the ( ) of the SSH server.After the setup phase the SSH protocol uses strong ( ) encryption and hashing algorithms to ensure the privacy and integrity of the data that is exchanged between the client and server. There are several options that can be used for user authentication. The most common ones are passwords and ( ) key authentication.

13.

在光纤通信中,VIDM 实际上是()(这里的VIDM应该是WDM)

14.

检查设备单板温度显示如下图所示,对单板温度正常的判断是(),如果单板温度异常,首先应该检查 (此空作答)

高级网络规划设计师,历年真题,2020年下半年(上午)《网络规划设计师》真题

15.

假设主机A通过Telnet连接了主机B.连接建立后。在命令行输入“C”。如图所示,主机B收到字符“C”后,用于运输回送消息的TCP段的序列号seq应为(此空作答),而确认号ack应为()

高级网络规划设计师,历年真题,2020年下半年(上午)《网络规划设计师》真题

16.

如图1所示,某网络中新技入交换机Switch B.交换机Switch B的各接口的接入网线后,SwitchA的GE1/0/3接口很快就会处于down状态,拔掉Switch B各接口的网线后(GE1/0/1除外),Switch A的GE1/0/3接口很快就会恢复到up状态,Switch A的GE1/0/3接口配置如图2所示,请判断造成该故障原因可能是()

高级网络规划设计师,历年真题,2020年下半年(上午)《网络规划设计师》真题

17.

假设主机A通过Telnet连接了主机B.连接建立后。在命令行输入“C”。如图所示,主机B收到字符“C”后,用于运输回送消息的TCP段的序列号seq应为(),而确认号ack应为(此空作答)

高级网络规划设计师,历年真题,2020年下半年(上午)《网络规划设计师》真题

18.

以下关于单模光纤与多模光纤区别的描述中,错误的是()

19.

Syn Flooding攻击的原理是()

20.

企业级路由器的初始配置文件通常保存在()上。

21.

假设CDMA发送方在连续两个时隙发出的编码为+1+1+1-1+1-1-1-1-1-1-1+1-1+1+1+1.发送方码片序列为+1+1+1-1+1-1-1-1.则接收方解码后的数据应为()

22.

以下关于RIP路由协议与0SPF路由协议的描述中,错误的是()

23.

在Linux中,DNS 的配置文件是( ),它包含了主机的域名搜索顺序和DNS服务器的地址。

24.

检查设备单板温度显示如下图所示,对单板温度正常的判断是(此空作答),如果单板温度异常,首先应该检查 ()

高级网络规划设计师,历年真题,2020年下半年(上午)《网络规划设计师》真题

25.

下面是100BASE-TX标准中MLT-3编码的波形,出错的是第()位,传送的信息编码为( 此空作答)

高级网络规划设计师,历年真题,2020年下半年(上午)《网络规划设计师》真题

26.

下面是100BASE-TX标准中MLT-3编码的波形,出错的是第(此空作答)位,传送的信息编码为( )

高级网络规划设计师,历年真题,2020年下半年(上午)《网络规划设计师》真题

27.

一个由多个路由器相互连接构成的拓扑图如下所示,图中数字表示路由之间链路的费用,OSPF 路由协议将利用(此空作答 ) 算法计算出路由器u到z的最短路径费用值为()

高级网络规划设计师,历年真题,2020年下半年(上午)《网络规划设计师》真题

28.

在华为VRP平台上。直连路由、0SPF、 RIP、静态路由按照优先级从高到低的排序是()

29.

每一个光纤通道节点至少包含一个硬件端口,按照端口支持的协议标准有不同类的端口,其中NL_PORT是

30.

以下关于HDLC协议的叙述史论错误的是( )

31.

网络管理员检测到局域网内计算机的传输速度变得很慢,可能边这该故障的原因有()①网络线路介质故障②计算机网卡故障③蠕虫病毒④WannaCry勒索病毒⑤运营商互联网接入故障⑥网络广播风暴

32.

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an ( ) network, Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH. The protocol works in the ( ) model, which means that the connection in established by-the SSH client connecting to the SSH server. The SSH client drives the connection setup process and uses public key cryptography to verify the ( ) of the SSH server.After the setup phase the SSH protocol uses strong ( ) encryption and hashing algorithms to ensure the privacy and integrity of the data that is exchanged between the client and server. There are several options that can be used for user authentication. The most common ones are passwords and (此空作答) key authentication.

33.

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an (此空作答) network, Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH. The protocol works in the ( ) model, which means that the connection in established by-the SSH client connecting to the SSH server. The SSH client drives the connection setup process and uses public key cryptography to verify the ( ) of the SSH server.After the setup phase the SSH protocol uses strong ( ) encryption and hashing algorithms to ensure the privacy and integrity of the data that is exchanged between the client and server. There are several options that can be used for user authentication. The most common ones are passwords and ( ) key authentication.

34.

以下关于区块链所用系统中“挖矿”行为的描述中,错误的是( )

35.

在Linux系统中,保存密码口令及其变动信息的文件是()

36.

下列哪种BGP属性不会随着BGP的Update报文通告给邻居? ()

37.

以下关于1000Base-T的叙述中,错误的是()

38.

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an ( ) network, Typical applications include remote command-line, login, and remote command execution, but any network service can be secured with SSH. The protocol works in the ( ) model, which means that the connection in established by-the SSH client connecting to the SSH server. The SSH client drives the connection setup process and uses public key cryptography to verify the (此空作答) of the SSH server.After the setup phase the SSH protocol uses strong ( ) encryption and hashing algorithms to ensure the privacy and integrity of the data that is exchanged between the client and server. There are several options that can be used for user authentication. The most common ones are passwords and ( ) key authentication.

39.

在进室外无线分布系统规划时,菲涅尔区的因素影响在()方面,是一个重要的指标。

40.

下图为某UDP报文的两个16比特,计算得到的Internet Checksum为 ()

高级网络规划设计师,历年真题,2020年下半年(上午)《网络规划设计师》真题

41.

PPP是一种数据链路层协议,其协商报文中用于检测链路是否发生自环的参数是()

42.

EPON可以利用( )定位OLT到ONU段的故障。

43.

光纤通信提供了三种不同的拓扑结构,在光纤交换拓扑中, N_PORT端口通过相关链路连接至

44.

假设一个IP数据段的长度为4000B,要经过一段MTU为1500B的链路,该IP数据报必须经过分片才能通过该链路,以下关于分片的播述中,正确的是()

45.

对下面4个回络: 110. 125. 129.0/24、 110. 125. 130.0/24、 110. 125.132.00和110.125.130.0/24进行路由汇聚,能覆盖这4个网络的地址是()

46.

以下关于OSPF协议路由聚合的描述中,正确的是()

47.

在Windows系绝中,默认权限最低的用户组是()

多选题 (一共1题,共1分)

48.

广城网可以提供面向连接和无连接两种服务模式,对应于两种服务模式,广城网有虚电路和数据报两种传输方式,以下关于虚电路和数据报的叙述中,正确的是()