In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/03 Report--
1. What do the following metrics mean in CPU performance metrics?
External frequency: the reference frequency of the CPU, the speed of synchronous operation between the CPU and the motherboard, which determines the running rate of the whole motherboard.
Front-end bus frequency: directly affects the speed of data exchange between CPU and memory.
two。 What are the two chips of the motherboard and how to distinguish them? What is the use of it?
Beiqiao: close to CPU, responsible for communication among CPU, memory and graphics card
South Bridge: far away from CPU, responsible for the communication between Icano buses.
3. What is BIOS and how does it relate to CMOS?
BIOS is a basic input and output system that stores basic computer hardware information. The BIOS settings are saved in the CMOS chip.
4. Explain what RAM and ROM are and their respective characteristics.
RAM: random access memory, readable, writable and easy to lose
ROM: read-only memory, readable, non-writable, not easy to lose.
5. What is a virtual machine?
Is a software program that runs on a computer, simulating computer hardware functions as an independent computer environment for other software program systems.
6. How many architectures are there in virtual machines? What are the characteristics?
Sojourn structure:
Installed as an application on the operating system, multiple operating systems can be installed on this application
Native architecture:
The virtual machine software is installed directly on the computer hardware, and the virtual machine itself is an operating system.
7. Please name three virtual machine vendors, as well as their products and product architectures.
(1) Vmware
VMware Workstation homestay architecture
VMware vSphere native architecture
(2) Microsoft
Virtual PC homestay architecture
Virtual Server homestay architecture
Hyper-V native architecture
3) Citrix (Citrix)
XenDesktop native architecture
XenServer native architecture
8. What is an operating system?
Also known as OS, is a kind of computer software, for application software to provide access to computer hardware services, provide effective hardware and software management.
9. What are the characteristics of virtual machine snapshots?
You can easily restore the system to the specified state
10. How many cloning methods are there for virtual machines?
Linked clone, full clone
11. What is TCP/IP protocol?
TCP/IP communication protocol is the most complete and widely supported communication protocol at present. It allows computers with different network architectures and different operating systems to communicate. It is the standard communication protocol of Internet.
twelve。 What are the three elements of communication between the host and the host?
IP address, subnet mask, IP rout
13. What is the role, composition, classification and default subnet mask of IP addresses?
Function: used to identify the network address of a node
Composition: 32 binary digits, expressed in dotted decimal system, consisting of network bits + host bits
Classification:
Class A: 1-127 net + main 255.0.0.0
Class B: 128-191 net + Master + Master 255.255.0.0
Class C: 192-223 network + main 255.255.255.0
Category D: 224-239 Multicast (Multicast)
Category E: 240-254 scientific research
14. Private IP address classification and range.
Category A: 10.0.0.1-10.255.255.254
Category B: 172.16.0.1-172.31.255.254
Category C: 192.168.0.1-192.168.255.25
15. What is a gateway?
A gateway at which one network is connected to another.
16. In the Windows system command line mode, what is the command to view the IP address and view the MAC address?
Ipconfig, ipconfig / all or ipconfig / all
17. What is the difference between a workgroup and a domain network?
Working group anti-fall: peer-to-peer relationship, no centralized management
Domain network: it is centrally managed by controller.
18. What are the characteristics and functions of computer names?
Easy to remember
Should be unique within the same win network
Other hosts can be accessed through the computer name within the win network.
19. What are ALP rules?
Add local users to local groups, and finally only assign permissions to local groups (meaning of the ALP rule)
20. What is a file system?
That is, the method of organizing files on an external storage device.
21. What are the common file systems?
FAT 、 NTFS 、 EXT
twenty-two。 What are the advantages of the NTFS file system?
Improve disk read and write ability
High reliability: encryption, access control list
Disk utilization: compression, disk matching
AD needs the support of NTFS.
23. What are the characteristics of the NTFS file system?
Access permissions can be set for groups of different users
Users must have the appropriate access rights to access resources
It can prevent resources from being illegally tampered with and deleted.
24. What are the permission rules for NTFS? What are the characteristics of these rules?
Accumulation of permissions: accumulation of valid NTFS permissions of users on the basis of non-conflict of permissions
Refusal first: rejection is above all else.
Inherit permissions: the default subfolder or subfile inherits the permissions of the parent folder, and the subfolder can cancel the permissions of the parent folder.
25. How to determine the share permissions and the final effective permissions of NTFS?
Intersection of sharing permissions and NTFS permissions
twenty-six。 Three ways to access shared folders
Browse through the "web"
Through the UNC path
Map network driv
twenty-seven。 What are the necessary operations and commands of the above three ways?
Browse through the Web: network Discovery must be enabled
Through the UNC path:\ server IP\ share name or\ server name\ share name
Map network drive: net use drive letter:\ server IP\ share name
twenty-eight。 What is a backup?
Prepare another one to deal with unexpected situations such as documents, data loss or corruption.
twenty-nine。 What are the categories of backup objects? What are the characteristics of each category?
System backup: backup for the entire operating system; when the operating system is damaged or cannot be started, it can be quickly restored by backup.
Data backup: back up the user's data files, applications, and databases; when these data are lost or damaged, they can also be restored through backup.
thirty。 What is a cold / hot backup? What are their strengths and weaknesses?
Cold backup:
Refers to the way to perform a backup when the documents that need to be backed up are not occupied; for example, turn off the database software and back up the database data. The advantage is simple and fast, easy to recover to a certain point in time, easy to maintain; the disadvantage is that it can only be restored to a certain point in time, and the data is inconvenient to use normally during the backup.
Hot backup:
Refers to the way in which the backup does not affect the normal use of the backup document; for example, the database software is running and the database data is backed up. The advantage is that the backup time is short, does not affect the use of data, and can be restored in seconds; the disadvantage is that all operations are synchronized, including deletion.
thirty-one。 What are the prerequisites to restore the original with one button? What are the consequences or sequelae after one-click reduction?
Make available system backup files in advance (usually in .gho format)
All the added data will be lost.
thirty-two。 What is a domain?
The computers in the network are logically organized together for centralized management. the environment of centralized management is called domain.
thirty-three。 What is a domain controller?
In the domain, there is at least one domain controller, the user account and security database of the whole domain are kept in the domain controller, a computer with the active directory is installed as the domain controller, and the domain administrator can control the behavior of each domain user.
thirty-four。 What is active Directory?
Is a directory database that stores information about objects throughout the windows network. It is also a service that can perform various operations on the data in the active directory.
thirty-five。 What are the advantages of active Directory?
Centralized management, convenient access to network resources, scalability
thirty-six。 What are the prerequisites for installing DC?
Local administrator privileges, the operating system version must meet the windows server version, have TCP/IP settings, have enough free disk space, have at least one NTFS partition, and require DNS support.
thirty-seven。 What command can test domain name resolution?
Nslookup
thirty-eight。 What are the types of domain groups? What's the use?
Security groups: setting access permissions for users
Distribution group: for e-mail communication, including contacts and user accounts.
thirty-nine。 What is the scope of the group? What are the scope and characteristics of application?
Local domain group:
Scope of application: this domain
Create a local domain group for resources in this domain.
Global groups:
Scope of use: whole forest and trust domain
Global groups are typically used to manage directory objects that require routine maintenance, such as user accounts and computer accounts.
Common group:
Scope of use: whole forest and trust domain
The identity information is recorded in the global catalog and the query speed is fast.
forty。 What is the difference between a generic group and a global group?
In a multi-domain environment, the identity information of general group members is recorded in the global catalog, while the global group membership information is stored in each domain. In a multi-domain environment, the login or query speed of general group members is faster.
forty-one。 What is the command to open the local security policy?
Secpol.msc
forty-two。 What is the command to make the local security policy effective or restart the computer?
Gpupdate
forty-three。 What is the command to force the refresh policy?
Gpupdate / force
forty-four。 What is group policy? What is the command to turn on local group policy?
A collection of policies that run gpedit.msc
forty-five。 What is a domain group policy? What does it have to do with local group policy?
A collection of policies that have nothing to do with local group policies.
forty-six。 What are the advantages of group policy?
Reduce administrative costs, reduce the possibility of individual configuration errors, and set specific policies for specific objects.
forty-seven。 What is GPO? What are the functions?
A special object in AD that stores all configuration information for Group Policy.
forty-eight。 Explain the application rules and rule contents of each group of strategies.
Policy inheritance and blocking
A subordinate container can inherit or prevent the GPO settings of its parent container from being applied
The policy is enforced.
Causes the subordinate container to enforce the GPO settings of its parent container
Policy accumulation and conflict
Multiple GPO settings accumulate without conflict, such as post-conflict application.
Order in which Group Policy is applied: LSDOU
Local Group Policy site domain OU
If the OU conflicts with the child OU, the child OU takes effect.
If multiple GPO are linked to the same OU, they are applied one by one according to the link order. For example, if the link order is 1 and 2 respectively, the GPO with the link order of 1 takes effect and overrides the group policy applied first, with the highest priority.
Screening
Prevent users or computers in a container from applying their GPO settings
forty-nine。 What is DNS?
Domain name system
fifty。 What is the default port number for DNS?
fifty-three
fifty-one。 What is the purpose of DNS?
Resolve a domain name to an IP address
Resolve the IP address to a domain name.
fifty-two。 In addition to DNS, what else can be used for domain name resolution? What are the shortcomings?
The disadvantage of hosts file is that the name is easy to repeat, the efficiency of large file parsing decreases, and the single point of management host is prone to failure.
fifty-three。 What is the spatial structure of DNS?
Spatial structure is hierarchy
Layer 1-- > Root Domain: "."
Layer 2-> top-level domain: organizational domain (com, net), country or region (CN, JP), reverse domain (in-addr-arpa)
Layer 3-> Secondary domains: such as baidu.com, sohu.com, 163.com
Layer 4-- > Host: such as www.baidu.com, www.sohu.com, www.163.com
fifty-four。 What is the hostname in DNS?
Hostname. Domain name = FQDN name is a fully qualified domain name-
fifty-five。 What are two parsing methods for DNS? How to analyze it?
Forward resolution: finding IP addresses by domain names
Reverse resolution: the domain name is found by the IP address.
fifty-six。 What are the two query methods for DNS? What are the characteristics?
Recursive query: the result obtained by the client can only be success or failure
Iterative query: the server answers with the best results.
fifty-seven。 How to lighten the load on a single DNS server?
Save the contents of the same DNS region in multiple DNS servers, and achieve load balancing through regional transmission.
fifty-eight。 What is backup or redundancy of DNS?
The main DNS server establishes the main area, the auxiliary DNS server resume auxiliary area, jointly maintains the DNS resource record, any DNS server failure will not affect the use.
fifty-nine。 Please describe the process of zone transfer in DNS.
Copy the zone file from the primary DNS server to the secondary DNS server.
sixty。 How many secondary areas can there be in a primary area?
There may be multiple auxiliary areas, and the auxiliary areas can also have auxiliary areas.
sixty-one。 What is a subdomain?
The act of creating a subdomain in a zone to expand the domain name space.
sixty-two。 What is delegation?
The act of delegating a subdomain to another server for maintenance.
sixty-three。 What is the difference between a subdomain and a delegate?
The resources of the child domain are in the parent zone file, they share a zone file, and the authoritative server of the child domain is the authoritative server of the parent zone.
Delegate has a separate zone file that specifies a new authoritative server for the new domain.
sixty-four。 What is FTP?
FTP is an application layer protocol.
sixty-five。 What is the structure of FTP?
Cpact S structure
sixty-six。 Which floor does FTP run on?
Application layer
sixty-seven。 Which layer of protocol is used by FTP?
TCP of the transport layer
sixty-eight。 What is the default port number for FTP?
21 and 20
sixty-nine。 Access the command format of FTP through a browser.
FTP://IP or domain name
seventy。 In command line mode, what are the commands for uploading and downloading FTP?
Get: downloading a single file
Mget: downloading multiple files
Put: upload a document
Mput: upload multiple files.
seventy-one。 What are the two anonymous usernames and passwords for FTP?
Anonymous: password is empty
Ftp: password is ftp
seventy-two。 What is a virtual directory?
Mount to another directory under the root of the website by alias
seventy-three。 What are the advantages of virtual directories?
Easy to develop and maintain separately
Moving location does not affect the logical structure of the site.
seventy-four。 What is a virtual host in a web service?
Multiple websites running on the server
seventy-five。 What are the three ways to implement virtual hosting?
Use different IP addresses
Same IP address, different port number
Same IP address and port number, different hostname.
seventy-six。 How many types of network locations are there in Windows firewalls? What are the differences?
Three kinds
Public network
Private network
Domain network.
seventy-seven。 What are the two elements of encryption?
Algorithm.
Key.
seventy-eight。 What is a key?
Is an algorithm used to encode and decode data.
seventy-nine。 How many types of data encryption technologies are generally divided into? What are the differences?
Symmetrical encryption
Asymmetric encryption.
eighty。 The common ideas of network troubleshooting and the function or purpose of each step.
First ping the loopback address to check whether the TCP/IP driver is working.
Then ping other hosts in this network segment to check whether the private network communication is normal.
Then ping the default gateway to check whether the egress route is normal.
Then ping other hosts in other network segments to check remote connectivity.
eighty-one。 Explain what the status returned by the following HTTP means.
200: successful, the server has successfully processed the request.
307: temporary redirection.
400: error request, the server does not understand the syntax of the request.
401: authentication error, this page requires authorization.
403: prohibited, the server rejects the request.
404: not found, the server could not find the requested web page.
500-505: the server encountered internal errors while trying to process the request, which may be the server's own fault.
eighty-two。 Indicates the circumstances under which the results returned by the following ping request are received.
Request timed out:
The other party shuts down the phone.
The address doesn't exist.
It is not on the same network segment and the route cannot find each other.
ICMP filtering, such as firewalls.
Destination host Unreachable:
The other party is not on the same network segment as himself, and the default route is not set
Network cable failure
Bad IP address:
Unable to resolve this IP or IP address does not exist
Source quench received:
The other party or the midway server is busy and unable to respond
Unknown host:
Domain name server failure
The name is incorrect
A line failure between the administrator system and the remote host.
No answer:
The central host is not running
Incorrect local or central host network configuration
The local or central router is not working
The communication line is faulty.
There is a routing problem with the central host.
No route to host:
The network card is not working properly.
Transmti failed error code 10043:
The Nic driver is not working properly.
Unknown host name:
The DNS is not configured correctly.
eighty-three。 The range of loopback addresses.
127.0.0.1 ~ 127.0.0.254
eighty-four。 What is the address of 169.254.X.X? What are the configuration conditions?
Temporary IP address
When the DHCP service is not used and the IP address is not manually configured, the system automatically configures the address.
eighty-five。 What is the address of MAC?
Physical address of the device.
eighty-six。 Please list the types of commonly used dynamic disks and the corresponding number of disks required, disk utilization, performance characteristics, and redundancy.
Simple volume, 1 disk, 100% utilization, no change in performance, no redundancy
Spanned volumes, 2-32 disks, 100% utilization, no change in performance, no redundancy
Striped volumes, 2-32 disks, 100% utilization, improved read and write performance, no redundancy
Mirrored volumes, 2 disks, 50% utilization, reduced read and write performance, redundancy
RAID5, 3-32 disks, utilization = number of disks-1, reduced read and write ability, redundancy.
eighty-seven。 There are two ways to open remote desktop tools.
Start-> all programs-- > Windows Accessories-- > remote Desktop tools
Win+R-- > run: mstsc-- > Open the remote Desktop tool.
eighty-eight。 What is the most basic difference between an image file ending in .iso and an image file ending in .gho?
.gho is a GHOST image file, a clone file backed up with GHOST, and a backup file of a hard disk or a hard disk partition when using ghost to restore the system.
An .iso file is the equivalent of a CD.
eighty-nine。 What is the drive letter?
Is the identifier of the DOS, WINDOWS system to the disk storage device.
ninety。 What are the most basic characteristics of the drive letter? What are the default drive letters?
The drive letter cannot be repeated.
An and B letters indicate floppy drive
C usually represents the first disk partition, or default system partition.
ninety-one。 What does the following domain name represent in the top-level domain?
Gov: government departments
Com: business sector
Edu: education Department
Net: network service structure
Mil: military department
Org: civil society organization.
ninety-two。 Combined with the DNS query method, please explain the complete DNS parsing process.
Enter the domain name you want to access in the browser. The browser first accesses its own hosts file to see if there is a mapping relationship. If it exists, it calls directly to complete the resolution. If it does not exist, it sends the access request to the local domain name server. After receiving the request, the local domain name server queries its own cache record. If there is a record, it returns the result directly. If there is no record, the local domain name server will send the request to the root domain name server. after receiving the request, the root domain name server will return the IP address of the corresponding top-level domain name server according to the top-level domain. After receiving the returned top-level domain name server IP address, the local domain name server will send the request to the top-level domain name server. After receiving the request, the top-level domain name server queries its own cache record, if it cannot be resolved. The address of the subordinate domain name server is returned to the local domain name server again. After receiving the address, the local domain name server repeats the above action until the domain name server address in the request is queried. After receiving the resolution record, the local domain name server will first cache a copy, and then send the resolution result to the client. After receiving the result, the client can directly access the web page under the domain name.
ninety-three。 How many kinds of network connection are there? What are the differences?
Two kinds, directly connected and crossed.
ninety-four。 How many standards are there for making network cable? What is it?
T568A 、 T568B
ninety-five。 How is the line order of the above standards arranged?
T568A: White green, green, white orange, blue, white blue, orange, white brown, brown
T568B: White orange, orange, white green, blue, white blue, green, white brown, brown.
ninety-six。 Rules for the application of direct and cross lines.
Direct connection for different equipment
Crossover for the same equipment.
ninety-seven。 In the case of more PC, what method can be used to quickly install the operating system of all computers? Answer at least one.
Batch installation of PXE
ninety-eight。 Why does the PC in the classroom automatically learn the IP address that starts with 172.60 and can still be used normally even if it is not part of the private IP address range?
IP addresses are divided into public IP and private IP, but in the process of use, as long as the format of the IP address conforms to the rules, the device can be successfully set up and used in the internal network. Private IP addresses are not recognized in the public network, so all IP addresses within the private IP address range cannot be used as public network IP addresses. If the public network IP address is used in the private network, it will not affect the public network. As long as the IP address is not duplicated in the same network, it can be used.
ninety-nine。 There is a web server, one day a user complained that the speed of a website above is very slow, if you are the administrator of the server, with the knowledge you have learned so far, what train of thought will you use to find the reason, please list the train of thought and steps and reasons for troubleshooting. (assuming the server has any operating system and software)
First check the status of the server and troubleshoot the hardware and system
Then check the underlying network status, such as interconnection, latency, traffic, and troubleshoot the network and network card
Finally, check the operation of web server software.
one hundred。 How to tell a 6-year-old child what a switch is in one sentence?
Open-ended questions, there is no absolute authority of the correct answer, you can think about it for yourself.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.