Đề thi chuyên môn về Hỗ trợ Hệ thống - FPT

1) The maximum distance of a 10BaseT network is which of the following? A. 100 meters B. 500 meters C. 1000 meters D. 1500 meters 2) Which of the following would be used to connect a router to an Ethernet switch? A. A B. B C. C D. None of the figures

doc10 trang | Chia sẻ: maiphuongtt | Lượt xem: 2179 | Lượt tải: 2download
Bạn đang xem nội dung tài liệu Đề thi chuyên môn về Hỗ trợ Hệ thống - FPT, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
BÀI KIỂM TRA CHUYÊN MÔN VỀ HỖ TRỢ HỆ THỐNG ****************************************** Kỳ thi: 8/8/2005 Thời gian: 60 phút (không dùng tài liệu) Tổng số 40 câu (mỗi câu 0.25 điểm) Họ và tên: Điểm đạt được Đơn vị công tác: ************************************************ Đánh dấu các tuỳ chọn bằng cách khoang tròn Phần I: Mạng 1) The maximum distance of a 10BaseT network is which of the following?     A. 100 meters     B. 500 meters     C. 1000 meters     D. 1500 meters 2) Which of the following would be used to connect a router to an Ethernet switch? A. A B. B C. C D. None of the figures 3) Which layer is responsible for routing through an internetwork?     A. Physical     B. Session     C. Transport     D. Application     E. Network     F. Data Link 4) What is required to support full-duplex Ethernet? (choose 2)     A. Full-duplex NIC cards     B. Multiple paths between multiple stations on a link     C. Loopback and collision detection disabled     D. Automatic sensing operation by all connected stations 5) The IP address 131.107.0.0 is a class B address. What is the range of binary values for the first octet in this address class? A. 10000000-11111111 B. 00000000-10111111 C. 10000000-10111111 D. 10000000-11011111 E. 11000000-11101111 6) Which of the following describe SMTP? (choose 2) A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices. 7) Which of the following are Application layer protocols that use TCP/IP? (Choose three) A. ARP B. HTTP C. SMTP D. FTP E. ICMP 8) Which two protocol tools use ICMP? (Choose 2) A. Telnet B. Ping C. ARP D. Traceroute 9) You company uses a switch in the training department. You need to be able to make changes to this switch remotely so that you can allow different classrooms to have access to the Internet as needed. What do you have to configure on this switch so that you can remotely make these changes? (Choose two.) A. The switch name must match the workgroup name of the local network. B. The switch must be configured with an IP address and default gateway. C. The remote workstations must have access to the VSM of the switch. D. CDP must be enabled on the switch so that other devices on the network can locate it. 10) What are good reasons for using layer two switches? (Choose two) A. To reduce collisions. B. To increase collisions. C. To increase the number of collision domains. D. To decrease the number of collision domains. E. To decrease the number of broadcast domains. 11) Full-duplex gives you the ability to send and receive data at the same time. Which of the following Ethernet standards can operate in full-duplex mode? (Choose two.) A. 10Base2 B. 10Base5 C. 10BaseT D. 100BaseT 12) Which of the following devices support Full Duplex Ethernet ? (Choose two.) A. Switch to host. B. Switch to switch. C. Hub to hub. D. Switch to hub. E. Hub to host. 13) If you take a dotted-decimal class A IP address such as 10.0.0.1 and convert the first octet to binary. Which of the following is the correct bit pattern for the first octet? A. 0xxxxxxx B. 10xxxxxx C. 110xxxxx D. 1110xxxx E. 11110xxx 14) You have the network 172.16.10.0/24. How many subnets and hosts are available? A. 1 subnet with 10 hosts B. 1 subnet with 254 hosts C. 192 subnets with 10 hosts D. 254 subnets with 254 hosts 15) How does a layer two device such as a bridge or switch function? A. It maintains a table of the IP address of the host connected to its internet segment B. It passes packets outside of its network segment if its IP address cannot be found on its table. C. It looks up the frames destination in its address table and sends the frame towards the destination. D. It maintains the table of the data link layer and network layer addresses for the host connected to its network segment. 16) Which of the following are reasons to use VLANs? (Choose three.) A. They increase the size of collision domains. B. They allow logical grouping of users by function. C. They enhance network security. D. They increase the size of broadcast domains while decreasing the number of broadcast domains. E. They increase the number of broadcasts domain while decreasing their size. 17) You need to segment your network which of the following hardware devices can you use to segment your network? (Choose three.) A. Hub B. Repeater C. Switch D. Bridge E. Router F. Media converter 18) How does inter-VLAN communication take place? A. Using a layer-2 switch B. Using a router C. Using a hub D. Using a repeater 19) Which hardware device enables high-speed data exchange on a LAN? A. Hub B. Bridge C. Switch D. Repeater 20) What is an advantage of segmenting your LAN with a switch? A. Smaller collision domains. B. Elimination of broadcast. C. Decrease cost of implementation. D. Larger number of users within the same domain. Phần II: Hệ điều hành Windows Your Windows 2000 Server computer includes an integrated 10-MB Ethernet adapter. You are replacing the integrated adapter with a new 100-MB Ethernet adapter. You install the new adapter in an available PCI slot. When you restart the computer, you receive error messages in the system log stating that the new adapter is missing or is not working. What should you do to resolve the problem? Create a new hardware profile. Use Device Manager to remove the integrated 10-MB adapter. Use a Device Manager to disable the integrated 10-MB Ethernet adapter. Delete the device driver for the integrated 10-MB Ethernet adapter from the Systemroot\system32\Driver Cache folder. Your workgroup consists of two Win2K server and 10 Win2k Pro. Each Win2K Pro dials up to Internet separately and has own dialup settings. You purchase a DSL line. You install ICS on a Windows 2000 server and disconnect all win2kPro connections. The Win2Kpro users can not connect to Internet when they dial up. You should not change (many) dialup settings on Win2K Pro. What should you do on each Win2K Pro? In LAN settings: select automatic configuration script In LAN settings, select use a Proxy server In Internet options, select Never dial a connection In LAN settings: select automatically detect settings You are the administrator of a Windows 2000 network. You have installed two shared printers for a print device on a Windows 2000 Server. Both printers are available to all users. They are shared as Admin and Executive. Admin is configured with a priority of 90, Executive is configured with a priority of 50. Now, you are advised to prevent the printer Executive to be visible to all users. Only members of the Executive group should be able to print to Executive. What should you do? Deny print permission to the Everyone Group Change the priority of Executive to 99 Install a second printer driver for the print device. Set NTFS permissions to the new driver files so that only the Executive Group is allowed to access the files. Allow the Executive Group print permission only. Remove the sharename Executive and add the sharename Executive$. Reconnect all members of the Executive Group to the new sharename. You have a local Win 2000 network setup as a Workgroup. There are several Win 2000 remote sites also setup as a Workgroup. The remote sites connect to local resources by direct dial modems. Member1 is a server on the local network, it has two adapters, adapter1 is an NIC to the local network and Adapter2 is an NIC connected to a DSL modem which is connected to the Internet. You install ICS on Member1 to allow local network to have Internet access. After install, remote sites are unable to view local resources and local users are still not able to connect to the Internet. Choose one to correct problem: Install NAT Install ICS on Adapter1 Install Proxy Server on local network Install ICS on Adapter2 You must back up the Registry, the COM+ Class Registration database, the system boot files, the Certificate Server database, the Active Directory Services database, and the SYSVOL directory on a Windows 2000 Active Directory domain controller. The domain controller is a Pentium 200 MHz with a RAID 5 array composed of ten 3-GB partitions. How can you back up the appropriate files while minimizing the time the backup takes? Use Windows Backup to create a backup of specified folders Use Windows Backup to create a differential backup Use Windows Backup to perform a full system backup Use Windows Backup to back up the System State Data Due to strict security limitations of your Windows 2000 production environment, you must prevent any unsigned drivers from being installed on any computer in your Windows 2000 network. The network consists of Windows 2000 domain controllers, Windows 2000 file and print servers, and Windows 2000 Professional computers. How can you prevent the installation of any unsigned drivers on all the computers on your network? Configure the domain controllers, file and print servers, and client computers to Ignore unsigned drivers Configure the domain controllers, file and print servers, and client computers to Block unsigned drivers Implement a Group Policy to Ignore signature verification Configure a Local Policy on the main Windows 2000 domain controller You are the administrator for a Windows 2000 network. The network consists of Windows 2000 Server computers and Windows 2000 Professional client computers. The network is configured to use Active Directory and auditing. You perform regular maintenance on the network. You like to periodically use the Event Viewer to check the success or failure of events that have auditing enabled. What do you use to monitor these events? DNS Server Application log System log Security log You are installing a new network adapter for a Windows 2000 Server computer on the Windows 2000 network you administer. You complete the installation and install the device drivers. Which function will notify you whether the driver you are installing passes the Microsoft certification process? Event Logs Driver Signing Service Pack Slipstreaming Device Manager You install a Windows 2000 Server computer on your network. You place several shared folders on a 12-GB primary partition formatted as FAT32. During nine months of continuous operation, the number of users who access the server and their access frequency remains constant. The average size of the files on the server remains approximately constant. After the server runs continuously for nine months, users report that the server does not retrieve files from the shared folders as fast as when you first installed the server. What should you do to resolve the problem? Convert the disk that contains the shared folders to a dynamic disk. Convert the partition that contains the shared folders to NTFS. Defragment the disk that contains the shared folders. Move the paging file to the partition that contains the shared folders. Drive C: on your Windows 2000 server has a compressed folder on it named C:\Server_Files. You must move this folder to Drive D: and encrypt this folder. Drive D: is a 5-GB FAT32 volume and Drive C: is a 3-GB NTFS partition. How can you move the file to the D: volume and encrypt it? You convert drive D: to an NTFS partition, move the C:\Server_Files folder to the D: drive, right-click on the folder's Properties, select Advanced from the General Tab, and select the check box to "Encrypt contents to secure data". You move the C:\Server_Files folder to the D: drive, right-click on the folder's Properties, select Advanced from the General Tab, and select the check box to "Encrypt contents to secure data". You convert drive D: to an NTFS partition, move the C:\Server_Files folder to the D: drive, right-click on the folder's Properties, select Advanced from the General Tab, remove the compression setting from the folder, and select the check box to "Encrypt contents to secure data". You move the C:\Server_Files folder to the D: drive, right-click on the folder's Properties, select Advanced from the General Tab, remove the compression settings from the folder, and select the check box to "Encrypt contents to secure data". You are the administrator of a Windows 2000 Server computer. A folder named HR-Data on the system partition of the server is shared on the network as HR-Data. The owner of the HR-Data folder is Administrators. The shared permissions and NTFS permissions are shown in the following table. Katrin creates a file in the HR-Data folder. She sets the NTFS permissions for the file to list only herself on the access control list, with Full Control permission. Katrin then leaves on vacation and cannot be contacted. Later, you discover that the file contains sensitive information and must be removed from the server as soon as possible. You want to delete the file without modifying any of the permissions for other files in the HR-Data folder. You want your actions to have least possible impact on users who may be using other files in the HR-Data folder. You want to use the minimum amount of authority necessary to delete the file. What should you do? Grant yourself Full Control permission for only the HR-data folder and not its subobjects. Delete the file. Then remove Full Control permission for HR-Data folder. Take ownership of the HR-Data folder. When prompted, take ownership of the existing files. Grant yourself Full Control permission for the file. Delete the file. Take ownership of the file. Grant yourself Modify permission for the file. Delete the file. Grant yourself Modify permission for the HR-Data folder and its subobjects. Delete the file. Then remove Modify permission for the HR-Data folder. You installed an updated SCSI driver on your Windows 2000 server and now the computer will not boot. How should you proceed to resolve the problem? Boot the computer using the Last Known Good Configuration Boot the computer using the Emergency Repair Disk Boot the computer using Recovery Console Boot the computer using Safe Mode You are installing Windows 2000 Server on a new computer that has a single 10-GB SCSI disk. The disk controller is not included on the current Hardware Compatibility List (HCL). You start the computer by using the Windows 2000 Server CD-ROM. When the computer restarts at the end of the text mode portion of Windows 2000 setup, you receive the following STOP error: “INACCESSIBLE_BOOT_DEVICE.” Which two actions should you take to eliminate the STOP error? (Choose Two) Restart the Windows 2000 Setup by using the Windows 2000 Server CD-ROM. Select Safe Mode from the Windows 2000 boot menu. Remove the Windows 2000 Server CD-ROM from the CD-ROM drive. Install a driver for the SCSI controller from a floppy disk. Use Device Manager to update the driver for the SCSI controller. You log on from a computer in the MKTG domain to one in the CORP domain. The MKTG domain trusts the Corp Domain. Which resources can you access? in MKTG, MKTG/DOMUSERS access in CORP, CORP/DOMGUESTS access in CORP, MKTG/DOMGUESTS in CORP, CORP/DOMUSERS access You are the administrator of a Windows 2000 Server computer. The server has a single hard disk with a single NTFS partition. You use a third-party tool to add a new partition to the disk. When you restart the server, you received the following error message: "Windows 2000 could not start because the following file is missing or corrupt: \system32\ntoskrnl.exe. Please re-install a copy of the above file." What should you do to resolve the problem? Start the emergency repair process. Choose the option to repair system files Start the computer by using the Recovery Console. Run System File Checker. Start the computer by using the Recovery Console. Modify the Partition parameter in the operating system path in C:\Boot.ini Start the computer in safe mode with command prompt. Modify the Partition parameter in the operating system path in C:\boot.ini. Phần III: Hệ điều hành UNIX (AIX) When using relative path names to move through the file tree, which command could you run to verify your location, before executing other commands? cd ls pwd ls -al What information is displayed when a non-root user executes the command: ls -l the directories hidden files the permissions of the files in the current directory the current directory's parent directory all the files in a user's home directory A user who is a member of the group salary wants to access a file belonging another user in the salary group. This file has permissions of 706. The user can: only read the file. not access the file. access the file without any restrictions. read and write to the file, but not execute the file. Which command displays the value of the HOME variable? echo HOME echo '$HOME' echo `$HOME` echo $HOME Use the following file contents to answer the following question: #!/usr/bin/ksh tctl -f /dev/rmt0 rewind mkszfile mksysb -i /dev/rmt0 tctl -f /dev/rmt0 offline In the above script, the system administrator is editing a routine backup script using vi because the mkszfile command is unnecessary. What steps should the system administrator use to delete the line containing the mkszfile command? Move to line 3, and press xx. Move to line 2 and press o. Move to line 3 and press d. Move to line 3, and press dd.
Tài liệu liên quan