首页>计算机>软件水平考试>模拟试题>正文
网络工程师考前冲刺题(二)

www.zige365.com 2010-7-14 11:01:23 点击:发送给好友 和学友门交流一下 收藏到我的会员中心

(3). A.D channel B.A channel C.B channel D.C channel

(4). A.the method B.the number C.the service type D.the user type

(5). A.100000(10^5) B.1000(10^3) C.10000(10^4) D.100(10^2)

答案:

1:D,2:C,3:A,4:C,5:B

                   2

     Bluetooth is a universal radio interface in the (1) frequency band that enables portable celectronic devices (2) connect and communicate (3) via short range,ad hoc networks.Each unit can simultaneously communicate with up to (4) other units per piconet. Moreover,each unit can simultaneously (5) to several piconets,Bluetooth technology which apart from Ericsson,has gained the support of Nokia,IBM,Toshiba,Intel and many other manufactures,eliminates the need for wires,cables and connectors for and between cordless or mobile phones,modems,headsets,PDAs, Computes,printers,progjectors,local ares networks,and so on ,and paves the way for new and completely different devices and applications.

 (1). A.2.45GHz B. 4.45GHz C. 2.95GHz D. 3.45GHz

(2). A.in B. on C. to D. with

(3). A.narrowly B.wirelessly C.freely D.widely

(4). A.use B.sever C.host D.base

(5). A.relate B.add C.close D.belong

答案:1:A,2:C,3:B,4:B,5:D

                3

     (1)is used to ensure the confidentiality,integrity and authenticity of the two end points in the private network .the(2),an application layer protocol,authenticates each peer in an IPsec transaction ,IKE negotiates security policy,determining which algorithm may be used to set up theRunnel .It also handles the exchang of session keys used for that one transaction.Networks that use (3)to secure data traffic can automatically authenticate devices by using (4)whichVerify the identities of the two users who are sending information back and forth .IPsec can be ideal way to secure data in large networks that require (5) connections among many devices

 (1) A.Encryption B.Code C.Certificate D. Tunnel

(2) A.associated links B.Internet Key Exchange C IPsec D. encryption

(3) A authenticity B.password C.IPsec D. Internet Key Exchange

(4) A.protocols B.keywords C.IKE D. digital certificates

(5) A.free B.strict C.secure D.remote

答案:1:A,2:B,3:C,4:D,5:C

                    4

     LAPB is a (1) protocol that provides complete data transparency in a (2)operation. It supports a peer-to-peer link in that neither end of the link plays the role of the permanent master station. HDLC LAPB is the (3)that is usually used by(4), the (5)standard for Packet Switched Networks.

 (1)Abit-oriented synchronous Bbyte-oriented synchronous

Cbit-oriented asynchronous Dbyte-oriented asynchronous

(2)Ahalf-duplex point-to-point Bhalf-duplex point-to-points

本新闻共7页,当前在第4页  1  2  3  4  5  6  7  

我要投稿 新闻来源: 编辑: 作者:
相关新闻