首页
试卷库
试题库
当前位置:
X题卡
>
所有题目
>
题目详情
在由三台交换机Switch1~Switch3两两互连,且采用“存储,转发”方式的分组交换网络中,所有链路的数据传输速率为100Mbps,分组大小为1000B,其中分组头大小为20B。若连接在交换机Sw...
查看本题答案
包含此试题的试卷
高级网络规划设计师《单项选择》真题及答案
点击查看
你可能感兴趣的试题
阅读以下说明根据要求回答问题[说明]某单位的网络拓扑结构如图8-26所示Switch1Switch3
阅读以下交换机的配置信息回答问题[说明]某公司下设三个部门为了便于管理每个部门组成一个Vlan某公司
阅读以下说明根据要求回答问题[说明]某单位的网络拓扑结构如图8-26所示Switch1Switch3
请先看下面的叙述然后回答问题1问题2VLANVirtualLocalAreaNetwork的中文名为
阅读以下说明和交换机的配置信息回答问题1~3将解答填入对应栏内 某公司下设3个部门为了便于
阅读以下说明和交换机的配置信息回答问题1~3将解答填入对应栏内 某公司下设3个部门为了便于
阅读以下说明根据要求回答问题[说明]某单位的网络拓扑结构如图8-26所示Switch1Switch3
阅读以下交换机的配置信息回答问题 [说明] 某公司下设三个部门为了便于管理每个部门组成
阅读以下说明和交换机的配置信息回答下面问题 【说明】 某公司下设三个部门为了便于管理每个部门组成
在由3台交换机Switch1~Switch3两两互连且采用存储一转发方式的分组交换网络中所有链路的数
80.00
80.08
80.16
80.24
阅读以下说明和交换机的配置信息回答问题1~3将解答填入对应栏内 某公司下设3个部门为了便于
阅读以下说明和交换机的配置信息回答下面问题 【说明】 某公司下设三个部门为了便于管理每个部门组成
阅读以下交换机的配置信息回答问题 [说明] 某公司下设三个部门为了便于管理每个部门组成
某单位局域网拓扑结构如图6-6所示Catalyst3500系列交换机Switch1~Switc
某单位局域网拓扑结构如图6-6所示Catalyst3500系列交换机Switch1~Switc
[说明]某公司下设三个部门为了便于管理每个部门组成一个VLAN公司网络结构如图12-2所示[交换机S
阅读以下说明和交换机的配置信息回答下面问题 【说明】 某公司下设三个部门为了便于管理每个部门组成
某单位局域网拓扑结构如图6-6所示Catalyst3500系列交换机Switch1~Switc
默认情况下交换机的生成树优先级值为7若要控制三层交换机Switch1为VLAN2的根桥Switch2
某公司下设3个部门为了便于管理每个部门组成一个VLAN公司网络结构如图1所示[交换机Switch1的
热门试题
更多
Pharmingisascammingpracticeinwhichmaliciouscodeisinstalledonapersonalcomputerorservermisdirectingusersto___29___Websiteswithouttheirknowledgeorconsent.Pharminghasbeencalled"phishingwithoutalure". Inphishingtheperpetratorsendsoutlegitimate-___30___e-mailsappearingtocomefromsomeoftheWeb’smostpopularsitesinanefforttoobtainpersonalandfinancialinformationfromindividualrecipients.Butinpharminglargernumbersofcomputeruserscanbe___31___becauseitisnotnecessarytotargetindividualsonebyoneandnoconsciousactionisrequiredonthepartofthevictim.Inoneformofpharmingattackcodesentinane-mailmodifieslocalhostfilesonapersonalcomputer.ThehostfilesconvertURLsintothenumberstringsthatthecomputerusestoaccessWebsites.AcomputerwithacompromisedhostfilewillgotothefakeWebsiteevenifausertypesinthecorrectInternetaddressorclicksonanaffected___32___entry.Somespywareremovalprogramscancorrectthecorruptionbutitfrequentlyrecursunlesstheuserchangesbrowsing___33___ 31
[说明]位于Z城市的某大型集团公司要求建设覆盖全公司所有二级单位的园区网络将各个信息资源有效地连接起来充分发挥网络及网上信息的效能使公司的管理科研和生产实现条理化规范化科学化现代化以机关大楼为中心连接各下属单位组建园区网具体组网要求如下1公司针对网络的投资规模及网络扩展性要求中心结点与公司下属单位之间主要租用电信公司光纤组网2公司业务数据集中存放在信息中心同时在信息中心设置管理系统集中对网络资源应用系统及安全等方面进行管理3设置Internet访问出口4公司园区网对外设置出口与其他城市的分支机构相连基于网络的主要应用包括Internet/Intranet应用全公司范围的办公自动化传统MIS系统和数据库应用等具体如下1Intranet服务建立该公司内部集中的信息网站为公司内部所有上网用户提供生产调度产品营销物资供应商情信息科技动态安全生产动力计量生产技术环境保护行业信息外事外贸国外公司内部服务等信息服务2办公自动化该系统具有日常办公信息服务辅助办公等功能同时还通过Notes实现全公司范围内的内部电子邮件传输3传统MIS应用包括公司生产调度系统动力计量管理系统公司固定资产管理系统及人力资源管理系统4文件服务局域网内文件共享C/S应用或B/S应用文件传输等常用办公文档应用5Internet服务出口应用服务包括Web站点E-mail系统DNS系统FTP系统等6VoIP服务集团网内VoIP数据传输7视频会议集团网内视频会议数据传输[问题1]网络逻辑结构设计的工作任务是基于用户需求中描述的网络行为性能等要求根据网络用户的分类分布形成特定的网络结构网络安全设计是网络逻辑设计过程中的一个关键性内容通常规划师可以通过哪些步骤进行网络安全设计
Whenthesystemuponwhichatransportentityisrunningfailsandsubsequentlyreatartsthe___34___informationofallactiveconnectionsislost.Theaffectedconnectionsbecomehalf-openasthesidethatdidnotfaildoesnotyetrealizethepromble. Thestillactivesideofahalf-openconnectionsusinga___35___timer.Thistimermeasuresthetimetransportmachinewillcontinuetoawaitan___36___ofatransmittedsegmentafterthesegmenthasbeenretransmittedthemaximumnumberoftimes.Whenthetimer___37___thetransportentityassumesthateithertheothertransportentityortheinterveningnetworkhasfailed.AsaresultthetimerclosestheconnectionandsignalsanabnormalclosetotheTSuser. Intheeventthatatransportentityfailsandquicklyrestarthalf-openconnectionscanbeteminatedmorequicklybytheuseoftheRSTsegment.ThefailedsidereturnsanRSTitoeverysegmentithatitreceives.WhentheRSTireachestheothersideitmustbecheckedforvaliditydasedonthe___38___numberiastheRSTcouldbeinresponsetoanoldsegment.Iftheresetisvalidthetransportentityperformsanabnormaltermination. 37
[说明]位于Z城市的某大型集团公司要求建设覆盖全公司所有二级单位的园区网络将各个信息资源有效地连接起来充分发挥网络及网上信息的效能使公司的管理科研和生产实现条理化规范化科学化现代化以机关大楼为中心连接各下属单位组建园区网具体组网要求如下1公司针对网络的投资规模及网络扩展性要求中心结点与公司下属单位之间主要租用电信公司光纤组网2公司业务数据集中存放在信息中心同时在信息中心设置管理系统集中对网络资源应用系统及安全等方面进行管理3设置Internet访问出口4公司园区网对外设置出口与其他城市的分支机构相连基于网络的主要应用包括Internet/Intranet应用全公司范围的办公自动化传统MIS系统和数据库应用等具体如下1Intranet服务建立该公司内部集中的信息网站为公司内部所有上网用户提供生产调度产品营销物资供应商情信息科技动态安全生产动力计量生产技术环境保护行业信息外事外贸国外公司内部服务等信息服务2办公自动化该系统具有日常办公信息服务辅助办公等功能同时还通过Notes实现全公司范围内的内部电子邮件传输3传统MIS应用包括公司生产调度系统动力计量管理系统公司固定资产管理系统及人力资源管理系统4文件服务局域网内文件共享C/S应用或B/S应用文件传输等常用办公文档应用5Internet服务出口应用服务包括Web站点E-mail系统DNS系统FTP系统等6VoIP服务集团网内VoIP数据传输7视频会议集团网内视频会议数据传输[问题3]该集团公司园区网建设过程中要求在管理网络服务器应用层等方面提供全面的安全设计方案结合你的网络规划设计经验请给出该集团公司园区网中网络层面的相关安全解决方案
Themetricassignedtoeachnetworkdependsonthetypeofprotocol.SomesimpleprotocollikeRIPtreatseachnetworkasequals.The___44___ofpassingthrougheachnetworkisthesame;itisone___45___count.Soifapacketpassesthrough10networktoreachthedestinationthetotalcostis10hopcounts.OtherprotocolssuchasOSPFallowtheadministratortoassignacostforpassingthroughanetworkbasedonthetypeofservicerequired.A___46___throughanetworkcanhavedifferentcostsmetrics.Forexampleifmaximum___47___isthedesiredtypeofserviceasatellitelinkhasalowermetricthanafiber-opticline.Ontheotherhandifminimum___48___isthedesiredtypeofserviceafiber-opticlinehasalowermetricthanasatelliteline.OSPFalloweachroutertohaveseveralroutingtablebasedontherequiredtypeofservice. 45
某省6个城市A~F之间的网络通信线路每条通信线路旁标注了其长度千米数如图28-1所示如果要将部分千兆通信线路改造成万兆通信线路以提升各个城市网络之间的通信容量则至少要改造总计15千米的通信线路这种总千米数最少的改造方案共有16个 15
某软件企业2011年初计划投资1000万人民币开发一套统一安全网关UTM产品预计从2012年开始年实现产品销售收入1500万元年市场销售成本1000万元该产品的分析员张工根据财务总监提供的贴现率制作了如表28-6所示的产品销售现金流量表根据表中的数据该产品的动态投资回收期是___17___年投资收益率是___18___ 表28-6某企业UTM产品销售现金流量表 年度 2011 2012 2013 2014 2015 投资 1000 —— —— —— —— 成本 —— 1000 1000 1000 1000 收入 —— 1500 1500 1500 1500 净现金流量 -1000 500 500 500 500 净现值 -925.93 428.67 396.92 367.51 340.29 17
___39___isusedtoensuretheconfidentialityintegrityandauthenticityofthetwoendpointsintheprivatenetwork.___40___anapplication-layerprotocolauthenticateseachpeerinanIPSectransaction.IKEnegotiatessecuritypolicydeterminingwhichalgorithmmaybeusedtosetupthetunnel.Italsohandlestheexchangeofsessionkeysusedforthatonetransaction. Networksthatuse___41___tosecuredatatrafficcanautomaticallyauthenticatedevicesbyusingbyusing___42___whichverifytheidentitiesofthetwouserswhoaresendinginformationbackandforth.IPSeccanbeidealwaytosecuredatainlargenetworksthatrequiresecureconnectionsamongmanydevices. UsersdeployingIPSeccan___43___theirnetworkinfrastructurewithoutaffectingtheapplicationsonindividualcomputer.Theprotocolsuiteisavailableasasoftware-onlyupgradetothenetworkinfrastructure.Thisalowssecuritytobeimplementedwithoutcostlychangestoeachcomputer.MostimportantIPSecallowsinteroperabilityamongdifferentnetworkdevicesPCsandothercomputingsystems. 41
[说明]随着计算机技术和通信技术的迅猛发展计算机网络技术的发展也可用日新月异来形容在计算机网络的接入技术光通信技术路由交换技术网络安全技术无线通信技术网络存储技术等诸多方面不断涌现出各种新技术在网络规划和设计中如何根据项目的现状和实际需求积极地引进和使用新技术是网络规划设计师的职责[问题1]业务IP化和大颗粒化导致城域网技术需要由现有以TDM电路交换为内核向以IP分组交换为内核演进PTN是一种面向分组业务的传送网络和技术它定位于城域网汇聚接入层以分组交换为核心并提供多业务支持结合你的网络规划设计经验请分析比较MSTP组网与PTN组网两种方案的优点和不足将表7-5中横线上的内容填写完整表7-5MSTP与PTN的组网比较比较项目MSTP组网PTN组网统计复用刚性管道无统计复用______速率核心层10G汇聚层10G/2.5G接入层622/155M______组网______环形链形MESH保护____________保护性能50ms电信级保护______
[说明]目前F省基于MPLS-VPN技术构建的省电子政务外网已覆盖到全省各个县区而F省共有68家省市县党校其中省级党校1家副省级党校1家市级党校8家县区党校58家2010年底F省党校系统依托省电子政务外网平台构建了一个虚拟专网实现了全省共68家党校的互联互通目前在该VPN平台上共享的信息资源越来越多大大促进了全省党校系统信息资源的共享利用推动了全省党校系统信息化的发展[问题2]F省各级党校信息化发展状况不均衡基础设施条件和网络规模差距较大该省某革命老区的市委党校目前通过一台二层交换机构建了简单的校园网络并通过省政府信息中心下发的一台接入路由器连接到省电子政务外网如图7-6所示[*]请简要回答以下问题1在不添置硬件设备的情况如何区分解决该市委党校访问电子政务外网资源共享专网数据和全省党校系统VPN专网数据两种不同网络应用业务的建设需求2对于上述问题1的解决方案在图7-6所示的CE设备上需要配置哪些与全省党校系统VPN专网相关的接入信息3图7-6所示的电子政务外网接入方案存在哪些设计缺陷
TheBorderGatewayProtocolBGPisaninterautonomoussystem.___49___protocol.TheprimaryfunctionofaBGPspeakingsystemistoexchangenetwork___50___informationwithotherBGPsystem.ThisnetworkreachabilityinformationincludesinformationonthelistofAutonomousSystemASsthatteachabilityinformationtraverses.BGP-4providesanewsetofmechanismsforsupporting___51___interdomainrouting.ThesemechanismsincludesupportforadvertisinganIP___52___andeliminatetheconceptofnetworkclasswithinBGP.BGP-4alsointroducesmechanismsthatallowaggregationofroutesincluding___53___ofASpaths.Thesechangesprovidesupportfortheproposedsupernetttingscheme. 51
Pharmingisascammingpracticeinwhichmaliciouscodeisinstalledonapersonalcomputerorservermisdirectingusersto___29___Websiteswithouttheirknowledgeorconsent.Pharminghasbeencalled"phishingwithoutalure". Inphishingtheperpetratorsendsoutlegitimate-___30___e-mailsappearingtocomefromsomeoftheWeb’smostpopularsitesinanefforttoobtainpersonalandfinancialinformationfromindividualrecipients.Butinpharminglargernumbersofcomputeruserscanbe___31___becauseitisnotnecessarytotargetindividualsonebyoneandnoconsciousactionisrequiredonthepartofthevictim.Inoneformofpharmingattackcodesentinane-mailmodifieslocalhostfilesonapersonalcomputer.ThehostfilesconvertURLsintothenumberstringsthatthecomputerusestoaccessWebsites.AcomputerwithacompromisedhostfilewillgotothefakeWebsiteevenifausertypesinthecorrectInternetaddressorclicksonanaffected___32___entry.Somespywareremovalprogramscancorrectthecorruptionbutitfrequentlyrecursunlesstheuserchangesbrowsing___33___ 33
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution___24___toimprovetheirefficiencyandreduce___25___.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall___26___care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing___27___throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmanagementbyintegratingwithcustomers’existingsystemssuchasOpenView.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming___28___andadministrativechores. 25
Whenthesystemuponwhichatransportentityisrunningfailsandsubsequentlyreatartsthe___34___informationofallactiveconnectionsislost.Theaffectedconnectionsbecomehalf-openasthesidethatdidnotfaildoesnotyetrealizethepromble. Thestillactivesideofahalf-openconnectionsusinga___35___timer.Thistimermeasuresthetimetransportmachinewillcontinuetoawaitan___36___ofatransmittedsegmentafterthesegmenthasbeenretransmittedthemaximumnumberoftimes.Whenthetimer___37___thetransportentityassumesthateithertheothertransportentityortheinterveningnetworkhasfailed.AsaresultthetimerclosestheconnectionandsignalsanabnormalclosetotheTSuser. Intheeventthatatransportentityfailsandquicklyrestarthalf-openconnectionscanbeteminatedmorequicklybytheuseoftheRSTsegment.ThefailedsidereturnsanRSTitoeverysegmentithatitreceives.WhentheRSTireachestheothersideitmustbecheckedforvaliditydasedonthe___38___numberiastheRSTcouldbeinresponsetoanoldsegment.Iftheresetisvalidthetransportentityperformsanabnormaltermination. 35
WLANsareincreasinglypopularbecausetheyenablecost-effectiveconnectionsamongpeopleapplicationsanddatathatwerenotpossibleornotcost-effectiveinthepast.ForexampleWLAN-basedapplicationscanenablefine-grainedmanagementofsupplyanddistribution___24___toimprovetheirefficiencyandreduce___25___.WLANscanalsoenableentirelynewbusinessprocesses.TocitebutoneexamplehospitalsareusingWLAN-enabledpoint-of-careapplicationstoreduceerrorsandimproveoverall___26___care.WLANmanagementsolutionsprovideavarietyofotherbenefitsthatcanbesubstantialbutdifficulttomeasure.Forexampletheycanprotectcorporatedatabypreventing___27___throughrogueaccesspoints.TheyhelpcontrolsalarycostsbyallowingITstaffstomanagelargernetworkswithoutaddingstaff.Andtheycanimproveoverallnetworkmanagementbyintegratingwithcustomers’existingsystemssuchasOpenView.Fortunatelyitisn’tnecessarytomeasurethesebenefitstojustifyinvestinginWLANmanagementsolutionswhichcanquicklypayforthemselvessimplybyminimizingtime-consuming___28___andadministrativechores. 27
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome___19___.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto___20___activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch___21___ofserviceattacksorsteal___22___informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith___23___andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation. 23
Pharmingisascammingpracticeinwhichmaliciouscodeisinstalledonapersonalcomputerorservermisdirectingusersto___29___Websiteswithouttheirknowledgeorconsent.Pharminghasbeencalled"phishingwithoutalure". Inphishingtheperpetratorsendsoutlegitimate-___30___e-mailsappearingtocomefromsomeoftheWeb’smostpopularsitesinanefforttoobtainpersonalandfinancialinformationfromindividualrecipients.Butinpharminglargernumbersofcomputeruserscanbe___31___becauseitisnotnecessarytotargetindividualsonebyoneandnoconsciousactionisrequiredonthepartofthevictim.Inoneformofpharmingattackcodesentinane-mailmodifieslocalhostfilesonapersonalcomputer.ThehostfilesconvertURLsintothenumberstringsthatthecomputerusestoaccessWebsites.AcomputerwithacompromisedhostfilewillgotothefakeWebsiteevenifausertypesinthecorrectInternetaddressorclicksonanaffected___32___entry.Somespywareremovalprogramscancorrectthecorruptionbutitfrequentlyrecursunlesstheuserchangesbrowsing___33___ 29
Themetricassignedtoeachnetworkdependsonthetypeofprotocol.SomesimpleprotocollikeRIPtreatseachnetworkasequals.The___44___ofpassingthrougheachnetworkisthesame;itisone___45___count.Soifapacketpassesthrough10networktoreachthedestinationthetotalcostis10hopcounts.OtherprotocolssuchasOSPFallowtheadministratortoassignacostforpassingthroughanetworkbasedonthetypeofservicerequired.A___46___throughanetworkcanhavedifferentcostsmetrics.Forexampleifmaximum___47___isthedesiredtypeofserviceasatellitelinkhasalowermetricthanafiber-opticline.Ontheotherhandifminimum___48___isthedesiredtypeofserviceafiber-opticlinehasalowermetricthanasatelliteline.OSPFalloweachroutertohaveseveralroutingtablebasedontherequiredtypeofservice. 47
[论逻辑网络设计过程中对用户需求的把握]对于网络规划设计师而言在把某项工作系统化的时候正确地理解该项工作的内容并设计出有效的系统是最困难的事情为了把用户的需求正确无误地反映到网络工程项目的逻辑设计文档中常规的做法是将该工程项目的需求说明书和逻辑设计文档交给用户征求意见请围绕逻辑网络设计过程中对用户需求的把握论题依次对以下3个问题进行论述1.叙述你参与规划设计的网络工程项目的概要及其逻辑网络设计的目标说明你所承担的工作2.结合你的切身实践叙述该项目网络技术选择时的主要考虑因素3.就你所下过功夫的地方叙述为了把用户需求反映到网络工程项目的逻辑设计文档中采取了哪些手段与用户进行通信对于你所采用的手段各举出一点你认为有效果的方面和无效果的方面简要叙述你对这方面的评价
某省电子政务外网由r台骨干路由器通过2.5GbpsRPR/POS环网相连组成省级横向网的核心层现从门台有编号的路由器中取r0<r≤n台则该RPR/POS环共有种不同的排法
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome___19___.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto___20___activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch___21___ofserviceattacksorsteal___22___informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith___23___andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation. 21
___39___isusedtoensuretheconfidentialityintegrityandauthenticityofthetwoendpointsintheprivatenetwork.___40___anapplication-layerprotocolauthenticateseachpeerinanIPSectransaction.IKEnegotiatessecuritypolicydeterminingwhichalgorithmmaybeusedtosetupthetunnel.Italsohandlestheexchangeofsessionkeysusedforthatonetransaction. Networksthatuse___41___tosecuredatatrafficcanautomaticallyauthenticatedevicesbyusingbyusing___42___whichverifytheidentitiesofthetwouserswhoaresendinginformationbackandforth.IPSeccanbeidealwaytosecuredatainlargenetworksthatrequiresecureconnectionsamongmanydevices. UsersdeployingIPSeccan___43___theirnetworkinfrastructurewithoutaffectingtheapplicationsonindividualcomputer.Theprotocolsuiteisavailableasasoftware-onlyupgradetothenetworkinfrastructure.Thisalowssecuritytobeimplementedwithoutcostlychangestoeachcomputer.MostimportantIPSecallowsinteroperabilityamongdifferentnetworkdevicesPCsandothercomputingsystems. 43
Tocompeteintoday’sfast-pacedcompetitiveenvironmentorganizationsareincreasinglyallowingcontractorspartnersvisitorsandgueststoaccesstheirinternalenterprisenetworks.Theseusersmayconnecttothenetworkthroughwiredportsinconferenceroomsorofficesorviawirelessaccesspoints.InallowingthisopenaccessforthirdpartiesLANsbecome___19___.Thirdpartiescanintroduceriskinavarietyofwaysfromconnectingwithaninfectedlaptoptounauthorizedaccessofnetworkresourcesto___20___activity.Formanyorganizationshowevertheoperationalcomplexityandcoststoensuresafethirdpartynetworkaccesshavebeenprohibitive.Fifty-twopercentofsurveyedCISOsstatethattheycurrentlyuseamoatandcastle’ssecurityapproachandadmitthatdefensesinsidetheperimeterareweak.Threatsfrominternalusersarealsoincreasinglyacauseforsecurityconcerns.Employeeswithmaliciousintentcanlaunch___21___ofserviceattacksorsteal___22___informationbysnoopingthenetwork.Astheyaccessthecorporatenetworkmobileandremoteusersinadvertentlycaninfectthenetworkwith___23___andwormsacquiredfromunprotectedpublicnetworks.Hackersmasqueradingasinternaluserscantakeadvantageofweakinternalsecuritytogainaccesstoconfidentialinformation. 19
TheBorderGatewayProtocolBGPisaninterautonomoussystem.___49___protocol.TheprimaryfunctionofaBGPspeakingsystemistoexchangenetwork___50___informationwithotherBGPsystem.ThisnetworkreachabilityinformationincludesinformationonthelistofAutonomousSystemASsthatteachabilityinformationtraverses.BGP-4providesanewsetofmechanismsforsupporting___51___interdomainrouting.ThesemechanismsincludesupportforadvertisinganIP___52___andeliminatetheconceptofnetworkclasswithinBGP.BGP-4alsointroducesmechanismsthatallowaggregationofroutesincluding___53___ofASpaths.Thesechangesprovidesupportfortheproposedsupernetttingscheme. 53
___39___isusedtoensuretheconfidentialityintegrityandauthenticityofthetwoendpointsintheprivatenetwork.___40___anapplication-layerprotocolauthenticateseachpeerinanIPSectransaction.IKEnegotiatessecuritypolicydeterminingwhichalgorithmmaybeusedtosetupthetunnel.Italsohandlestheexchangeofsessionkeysusedforthatonetransaction. Networksthatuse___41___tosecuredatatrafficcanautomaticallyauthenticatedevicesbyusingbyusing___42___whichverifytheidentitiesofthetwouserswhoaresendinginformationbackandforth.IPSeccanbeidealwaytosecuredatainlargenetworksthatrequiresecureconnectionsamongmanydevices. UsersdeployingIPSeccan___43___theirnetworkinfrastructurewithoutaffectingtheapplicationsonindividualcomputer.Theprotocolsuiteisavailableasasoftware-onlyupgradetothenetworkinfrastructure.Thisalowssecuritytobeimplementedwithoutcostlychangestoeachcomputer.MostimportantIPSecallowsinteroperabilityamongdifferentnetworkdevicesPCsandothercomputingsystems. 39
[说明]S省某高校的校园网络拓扑结构如图6-8所示根据该校信息化建设领导小组的要求要实现负载均衡和冗余备份构建无阻塞高性能的网络基础设施平台该校园网络采用两台S7010万兆骨干路由交换机作为双核心汇聚交换机或部门交换机通过光纤链路分别与两台核心交换机相连通过防火墙和边界路由器与Internet相连全网交换机都启用了MSTP生成树模式并配置了相同的实例域名称和版本修订号该校园网两台S7010之间相连的端口均为Trunk端口S7010与其下连的汇聚交换机或部门交换机之间相连的端口也均为Trunk端口假设校园网中每台核心交换机对数据帧的转发延时为10ms每台汇聚交换机或部门交换机对数据帧的转发延时为25ms每个数据帧经过所有通信线路的信号传输延时都为1ms暂不考虑传输距离等因素该校园网中部分PC的IP地址及所属VLAN等信息如表6-2所示表6-2部分PC的IP地址及所属VLAN网络设置IP地址所属VLAN网络设置IP地址所属VLANPC110.3.9.10/24VLAN5PC510.3.10.21/24VLAN6PC210.3.10.10/24VLAN6PC610.3.11.21/24VLAN7PC310.3.11.10/24VLAN7PC710.3.9.21/24VLAN5PC410.3.12.10/24VLAN8[问题1]核心三层交换机S7010-1的部分MSTP配置信息如下S7010-1config#spanning-treemst1priority12288S7010-1config#spanning-treemstconfigurationS7010-1config-mst#instance1VLAN68S7010-1config-mst#instance2VLAN57S7010-1config-mst#nameregion1S7010-1config-mst#revision1核心三层交换机S7010-2的部分MSTP配置信息如下S7010-2config#spanning-treemst2priority12288S7010-2config#spanning-treemstconfigurationS7010-2config-mst#instance1VLAN68S7010-2config-mst#instance2VLAN57S7010-2config-mst#nameregion1S7010-2config-mst#revision11请问instance1的生成树的根交换机是哪一台为什么2对于instance2而言位于学术交流中心的交换机C3750G的根端口是哪个端口为什么3请指出PC2发送给PC5的数据包经过的设备路径格式PC2→设备1→→PC54请计算PC5每次发送给PC2的数据包的设备转发延迟时间
[说明]某省级重点中学欲构建一个局域网考虑到该中学的很多现代化教学业务依托于网络要求中学内部用户能够高速访问相关的5台内部高性能服务器并且要求通过网络的冗余性设计来获得较高的各类业务服务的可用性某系统集成公司根据该中学的相关需求将网络拓扑结构设计为双核心来进行负载均衡和容错该公司给出的网络拓扑图如图6-7所示[问题2]1假设平均每天经常浏览网页的用户数为300个每用户平均每分钟产生12个事务处理任务事务量大小为0.05MB则该校园网浏览网页需要的信息传输速率约为______Mbps2假设该校园网共有20间多媒体教室平均每间多媒体教室有4个摄像机每台摄像机采用CIF格式分辨率为352×288实时采集视频流码流为512Kbps则该校园网多媒体教室视频监控的应用业务流量约为______Mbps
某信息系统的LANWeb服务器和数据库服务器按照图28-7所示串联连接根据测得的处理时间LANWeb服务器和数据库服务器对单个客户请求的平均处理时间为30ms40ms和10ms根据以往的经验可知每秒平均有20个事务且事务到达间隔服从负指数分布现利用M/M/1排队论模型估算并发连接的客户数量增加时的响应时间每个队列的平均系统时间平均等待时间与平均处理时间之和单位秒可用以下公式计算该信息系统的平均响应时间R为ms
TheBorderGatewayProtocolBGPisaninterautonomoussystem.___49___protocol.TheprimaryfunctionofaBGPspeakingsystemistoexchangenetwork___50___informationwithotherBGPsystem.ThisnetworkreachabilityinformationincludesinformationonthelistofAutonomousSystemASsthatteachabilityinformationtraverses.BGP-4providesanewsetofmechanismsforsupporting___51___interdomainrouting.ThesemechanismsincludesupportforadvertisinganIP___52___andeliminatetheconceptofnetworkclasswithinBGP.BGP-4alsointroducesmechanismsthatallowaggregationofroutesincluding___53___ofASpaths.Thesechangesprovidesupportfortheproposedsupernetttingscheme. 49
某网络集成公司项目A的利润分析如表284所示设贴现率为10%第3年的利润净现值是元
热门题库
更多
中级数据库系统工程师
中级多媒体应用设计师
高级系统分析师
高级网络规划设计师
高级系统架构师
中级信息系统监理师
初级通信工程师
中级通信工程师
通信新技术、新业务知识
无线通信专业技术
移动通信专业技术
有线传输专业技术
电话交换专业技术
电信网络专业技术
计算机通信专业技术
通信电源专业技术