Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Analysis of 60 cases of interview questions for Junior Network Engineers

2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

I. the basis of network operation and maintenance

Please briefly describe the classification and range of IPv4 addresses.

Answer:

Class A 1-127 net + Master

Class B 128-191 network + network + master + master

Class C 192-223 network + master

Class D 224-239 Multicast (Multicast)

Class E 240-254 what is the line sequence of T568b and T568a when making twisted pair in scientific research?

Answer:

T568b line sequence: White orange, orange, white green, blue, white blue, green, white brown, brown

T568a line sequence: White green, green, white orange, blue, white blue, orange, white brown brown on Huawei switch, router equipment, how to configure IP address for the interface?

Answer:

The VLAN1 of the switch can be configured with management IP, and every interface of the router can be configured with an IP address. The basic ideas are as follows:

System-view / / enter the system view

[ar1] interface g0UniUniqq1 / / entry interface g0UniUniUniver1 configuration

[ar1-GigabitEthernet0/0/1] ip address 192.168.1.254 24 / / with IP address 1

[ar1-GigabitEthernet0/0/1] undo shutdown / / Activation Interface take Huawei equipment as an example, how to realize the remote management of routers and switches?

Answer:

Basic configuration process:

1) confirm the IP address of the device (router interface, switch VLAN1)

2) enable AAA authentication on the device (enable AAA mode, add user accounts, allow telnet control)

3) from the IP address of the client telnet device, what does it mean to manage the cloud server after logging in, what is the difference between it and the ordinary server, and what are the advantages?

Answer:

CVM refers to the virtual server that is provided to individual or enterprise customers through the Internet. In Huawei Cloud, Aliyun and other service providers, it is often referred to as ECS (Elastic Compute Service).

Compared with the ordinary server, it is basically the same as the ordinary server in terms of remote management, operating system management, network application management and so on. CVM also has the following characteristics and advantages:

 customers do not need physical hardware, saving hardware maintenance costs (hosts, network equipment, cabinets, computer rooms, etc.)

 customers can choose servers, change / upgrade configurations on demand, and pay on demand

The change / upgrade / system recovery of  server configuration is convenient and fast. You can build a Web server on a CentOS7 server in a few minutes. What is the basic process or idea?

Answer:

The basic process of setting up a Web server:

1) install software packages, such as httpd (or nginx, tomcat, etc.)

2) configure website resources (deploy web pages)

3) Open service programs, such as httpd (or nginx, tomcat, etc.)

Other related actions:

1) if it is a website on the Internet, it is best to apply for a domain name that is easy to remember, which is more convenient for users to access and conducive to promotion.

2) domestic websites need to be put on record in time. Do you know anything about virtual machines? what are the operating architectures of virtual machines?

Answer:

Sojourn architecture, native architecture. In a nutshell, what are the characteristics of host architecture virtual machines?

Answer:

 is installed on the operating system as an application, and multiple operating systems can be installed on this application.

, such as VMware Workstation. Briefly, what are the characteristics of native architecture virtual machines?

Answer:

The virtual machine software is installed directly on the computer hardware.

The virtual machine itself is an operating system. How do I open Service Manager in a Windows system?

Answer:

Run services.msc. In the course of using the computer, you want to end a process and use the command to open the task manager.

Answer:

Run taskmgr. What are the private IP addresses reserved for use in the corporate LAN?

Answer:

 Class A 10.0.0.1 ~ 10.255.255.254

 Class B 172.16.0.1 ~ 172.31.255.254

Can IP addresses be configured on  Class C 192.168.0.1-192.168.255.254 switches, and what is the purpose of configuring IP addresses for the switches?

Answer:

Yes, the switch is configured with IP to facilitate remote management. How to configure a management IP address on a Huawei switch?

Answer:

[Huawei] interface vlanif 1

[Huawei-Vlanif1] ip address 192.168.1.100 24

[Huawei-Vlanif1] undo shutdown, what do you know about the remote management protocol and port number?

Answer:

Telnet-- TCP 23 port [router, switch]

SSH-TCP port 22 [Linux server, firewall]

RDP-TCP3389 port [Windows server] what's the difference between a computer and a virus?

Answer:

The computer has the nature of deception and can lead to the disclosure of sensitive information of the victim's computer, being controlled and so on.

Computer viruses, for the purpose of destruction, such as deleting files / dragging speed / system crash, etc., rather than stealing information (unlike *). What are the three service models of cloud computing?

Answer:

SaaS, Software as a Service

PaaS, platform as a Service

IaaS, what are the key considerations for the selection of infrastructure as a service CVM?

Answer:

Billing method (prepaid, pay on demand)

Specification (CPU/ memory / hard disk)

Mirror (Linux system)

Login method (set password)

How to remotely manage Linux CVM by billing method (by bandwidth, by traffic)? what remote management tools have you used?

Answer:

The Linux server is managed remotely by SSH. The commonly used SSH client softwares are Xshell, SecureCRT, Putty and so on. What are the common categories of server devices according to their form factor?

Answer:

Rack server, tower server, blade server, cabinet server. The equipment specifications of the computer room are often in U units. Do you know what this means?

Answer:

U refers to the thickness, 1Unit = 1.75in = 4.445 cm. A brief description of the cloud computing service providers you know?

Answer:

Abroad: Amazon AWS, Microsoft Azure, IBM SCE+

Domestic: what is the main basis for Huawei Cloud, Aliyun, Baidu Cloud and Tencent Cloud router devices to forward packets?

Answer:

Routing table. What are the types of routing table records?

Answer:

Directly connected route

How do non-directly connected routes (static or dynamic routes) view the routing table on Huawei routers?

Answer:

What is the purpose of display ip routing-table gateways and what devices are usually used as gateways?

Answer:

A gateway refers to a "gateway" from one network to another; usually a router, or a firewall device. How to check the native MAC address and DNS server address on the Windows host?

Answer:

What are the benefits of executing the ipconfig / all command to configure employee PCs to dynamically learn IP addresses in an enterprise?

Answer:

Reduce the amount of tasks of the administrator; avoid the probability of manual configuration input errors; avoid the probability of conflict. What is the default range of enabled alternate configuration addresses for Windows hosts when DHCP fails to obtain IP?

Answer:

169.254.0.1-169.255.254. How to quickly switch task windows in Windows system?

Answer:

Press the shortcut key Win+Tab, or Alt+TAB.

II. Network system management

How do I publish and access a shared directory on a Windows host?

Answer:

To publish a shared directory:

1) Environment settings, need to enable network discovery, enable file and printer sharing, turn off the firewall or allow SMB share access

2) right-click the directory to be shared, add a new share, set the share name, adjust NTFS permissions and share permissions

Access to the shared directory:

Win+R calls up "run" and enters the address of the shared resource, such as\ server address\ share name\, to access the corresponding resource. What is DNS and what is its main function?

Answer:

DNS is Domain Name System, the domain name system.

Main role: there are a large number of servers in the Internet, and their IP addresses are not convenient for users to remember, while DNS servers can provide clients with address resolution services of "domain name IP address", making the user experience more comfortable. What does RAID array refer to, what are the common array levels, and what are their characteristics?

Answer:

RAID, namely Redundant Arrays of Independent Drives, cheap redundant disk array, refers to the technology of using multiple disks to build logical disks with higher Icano performance, hardware backup and other characteristics.

Common RAID levels and features are as follows:

RAID0: stripe mode with at least 2 disks to improve efficiency through concurrent read and write

RAID1: mirror mode, with at least 2 disks. Improve the reliability of disk devices through mirror backup.

RAID10: stripe + mirror mode, equivalent to RAID1+RAID0, with at least 4 disks, with higher reading and writing efficiency and reliability

RAID5: cost-effective mode, with at least 3 disks, of which 1 disk capacity is used to store recovery check data

RAID6: equivalent to the extended version of RAID5, at least 4 disks, of which 2 disks are used to store recovery check data. What is the Linux directory structure, and briefly describe the Linux directory you know and its uses?

Answer:

The Linux system does not have C: and D: disks, and all document resources are organized in a directory structure that starts with a "/" root.

Several common directories and uses are as follows:

/: the root directory of the entire Linux file system

/ boot: stores files such as system kernel, startup menu configuration, etc.

/ home: the default home directory for ordinary users (subdirectory with the same name)

/ root: administrator's home directory / bin, / sbin: store system commands, executable programs

/ dev: store various device files

/ etc: stores various system configurations and system service configuration files

/ proc: how is the access to documents in the Linux system controlled by mapping files that store running data in memory?

Answer:

The access of Linux documents is mainly determined by attribution relationship and authority category-the system divides visitors into three categories: owner (u), owner group (g) and others (o), and permissions are divided into three categories: read (r), write (w) and executable (x).

When you need to modify the attribution of a document, use the chown command, such as:

Chown-R owner: group documentation.

Chown-R belongs to the master document.

Chown-R: belonging to group documents.

When you need to modify the permission tag of a document, use the chmod command, such as:

Chmod-R ugoa+-=rwx document if you have a CentOS7 or RHEL7 server, how do you configure IP address parameters for this server?

Answer:

You can use the nmcli tool to configure network connection parameters, such as:

Nmcli connection modify "connection name" ipv4.method manual ipv4.address "IP address / mask length" ipv4.gateway "default gateway address" ipv4.dns DNS server address connection.autoconnect yes

Nmcli connection up connection name

If no connection has been set up for the Nic, you need to add a good network connection first, such as:

Nmcli connection add con-name "connection name"ifname" interface name "what does the file system in the type ethernet computer refer to?

Answer:

File system: that is, how to organize files on external storage devices. What are the common file systems in Windows hosts?

Answer:

Windows commonly used file systems: what are the advantages of FAT and NTFSNTFS file systems?

Answer:

 improves disk read and write performance

 is reliable (encryption, access control list)

 high disk utilization (compression, disk quota) what does the workgroup in Windows refer to, and what is the name of the default workgroup?

Answer:

The working group is a kind of operating environment of the computer, the status between the hosts of the working group environment is equal, the management is decentralized, and there is no centralized management.

The default workgroup name is workgroup. What does a virtual Web host refer to and what are the ways to implement it?

Answer:

Multiple websites running on the server are called virtual hosts

How to implement virtual hosting:

Use different IP addresses

Same IP address, different port number

The same IP address and port number, different hostnames in the Linux system how to modify the DNS server address through the VIM editor?

Answer:

Vim / etc/resolv.conf

Nameserver DNS server address VIM text editing has several working modes and how to switch?

Answer:

Start VIM text editing first enter command mode = "press I key to enter input mode =" press Esc key to return to command mode = "press: enter last line mode. Briefly introduce the operation method of using tar command to make compressed package?

Answer:

Tar-zcPf backup files. Tar.gz document path (- z: call the gzip tool to compress / decompress the archive)

Tar-jcPf backup file. Tar.bz2 document path (- j: call the bzip2 tool to compress / decompress the archive)

Tar-JcPf backup files. Tar.xz document path (- J: call the xz tool to compress / decompress the archive) how to quickly open local user and group management in the Windows system?

Answer:

What are the built-in users in the system running "lusrmgr.msc" Windows?

Answer:

Administrator: administrator

Guest: guest (disabled by default), which group does the newly created user in the Windows system belong to by default for anonymous access?

Answer:

Automatically join the users group by default when you create a user in the Windows system. Which permissions does NTFS special right mainly refer to?

Answer:

Read permission: allow read access control list

Change permissions: allow changes to access control lists

Take ownership: how can users become their owners in Windows systems to create hidden shares and access hidden shares?

Answer:

When creating a share, add $to the share name to create a hidden share.

Access hidden share\ server IP address\ share name $. How to quickly open disk management in Windows system?

Answer:

Win+R runs and executes "diskmgmt.msc". What are the benefits of using dynamic disks in Windwos hosts?

Answer:

High expansibility, high reading and writing, high reliability. What is the FTP protocol and what is the default service port number?

Answer:

FTP is a file transfer protocol for uploading and downloading files; the default port number of FTP is 21. What is the common software used to build FTP servers?

Answer:

FileZilla Server, a free, open source, cross-platform FTP solution.

Serv-U, a powerful commercial version of FTP service software.

Vsftpd,Linux server comes with free, open source FTP service software. What client software is used to access FTP resources?

Answer:

FileZilla Client, FlashFXP, LeapFTP, CuteFTP,. Wait. What is the default home page file for a website?

Answer:

Most websites use index.html as their home page. What is the purpose of configuring a transponder on a DNS server?

Answer:

When the client requests to query the address record of the non-local jurisdiction, it is transferred to another designated DNS server for processing. How do I test DNS parsing from the command line in a Windows host?

Answer:

Enter the nslookup domain name. How to create a user account and set a login password on the Linux server?

Answer:

Useradd user name

Passwd user name / / enter the password you need to set twice according to the prompt what is http and the default port number

Answer:

Http Hypertext transfer Protocol

The default port number is 80. How to deactivate and activate network connection in CentOS7 Linux system

Answer:

Deactivate the specified connection:

Nmcli con down connection name

Activate the specified connection:

Nmcli con up connection name

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report