前言:中文期刊網精心挑選了網絡管理員范文供你參考和學習,希望我們的參考范文能激發你的文章創作靈感,歡迎閱讀。
網絡管理員范文1
關鍵詞:網絡管理員考試;結構分析;難點分析;資格和水平考試
中圖分類號:TP393文獻標識碼:A文章編號:1009-3044(2008)22-674-01
2008 Network Administrator of the First half of the Examination
ZHANG Zhi-yong
(Hunan Normal University, Changsha 410081, China)
Abstract: In this paper,we analyse the examination of Network Manager held in May,2008.This examination consists of two parts that one part held in the morning and the other held in the afternoon.we also analyse the emphases and difficulties of the exam.
Key words: examination of network manager; structure analysis; difficulty analysis; qualification and level test
1 引言
2008年5月網絡管理員考試試題,是全國軟件水平考試中的初級級別的考試。本次報考人數全國近4萬。通過該考試可以獲得相應的助理工程師的職稱。本次網絡管理員考試題目結構組成和以往的考試成相差不大。難度稍微有所加大。
2 應試指導
由于該考試直接和職稱掛鉤,同時10多年的考試建立起來的權威性。得到眾多考生的認可。同時與國際廠商認證想比較,考試費用較低、涉及的知識點全面―不光考察了基礎的計算機知識,也考實際的應用知識。涵蓋的計算機課程有計算機體系結構、計算機原理、軟件功能、辦公軟件應用、操作系統、計算機網絡基礎、軟件工程等十幾門。其難度高于同等級別的CCNA和HCNA。
1)適合報考考生的要求:由于其難度相對太大,建議考生根據自身的情況和能力,選擇考試的級別。一般網絡專業的在讀學生,在三年級的時候可以試一試這類型的考試。一般其他專業的人員,需要自學大部分的計算機專業的課程,并要積累一定的網絡交換機、路由器、Windows服務器、Linux服務器的實際管理經驗以及一些網頁編程的知識。由于是初級考試,相對其他級別的網絡工程師考試是容易的。復習對路,就沒有太多的難度了。另外,不要指望一年就通過,因為考試分兩個部分,且都要求達標,才可得到證書。如果題目出偏題或者不對自己胃口。有可能一部分不易通過。因此,對于基礎較差的考生要多考幾次,一般作一年兩次考試的打算,一旦走上此路,就造成不要放棄。
2)仔細研究大綱:大綱是考試的指南,只有認真研究了大綱才能制定出合適的復習計劃。這里要強調的是,編譯原理和高等數學不再是考試大綱所要求的了。
3)選擇輔導用書:選擇輔導用戶是通過考試的關鍵,目前有些考生使用的輔導材料過于老化,對考試不光沒有幫助還有誤導的作用。這里建議使用徐峰老師主編的《網絡管理員沖刺指南》、和朱小平、施游主編的《網絡管理員考試考點分析與真題詳解(第2版)》。
3 上午試題結構分析
上午考試英語部分由原來的10分縮減為5分,網絡應用的考點相應增加5分。其他考試的分值基本沒有太多的變化。表1是按題號對應的考試內容。
4 下午試題結構分析
下午的考試題目依然有以下幾個特點:
1)題型設計上,沒有多大變換;
2)題型基本上覆蓋了考綱中的各個考點;
3)根據近幾次網絡管理員考試的對比,基本上與往年的考試一樣考察Linux基礎、Windows服務、網絡管理與設計、安全和html、ASP。但在各個大類的基礎上,著重的考核處有些不同。考生可以參考往年的試題分析進行比較。
5 總結
總體上來說,本次考試試題難度還是不大的。只要作好歷年試題和掌握了網絡的基礎知識和計算機基礎知識,應該能比較輕松的通過該考試。
參考文獻:
網絡管理員范文2
Dear Mr. Smith,
As a graduate of an institution of higher education, I have a few very basic expectations. Chief among these is that my direct superiors have an intellect that ranges above the common ground squirrel. After your consistent and annoying harassment of my co-workers and me during the commission of our duties, I can only surmise that you are one of the few true genetic wastes of our time.推薦:辭職報告范文專題
Asking me, a network administrator, to explain every little nuance of everything I do each time you happen to stroll into my office is not only a waste of time, but also a waste of precious oxygen. I was hired because I know how to network computer systems, and you were apparently hired to provide amusement to myself and other employees, who watch you vainly attempt to understand the concept of cut and paste for the hundredth time.
You will never understand computers. Something as incredibly simple as binary still gives you too many options. You will also never understand why people hate you, but I am going to try and explain it to you, even though I am sure this will be just as effective as telling you what an IP address is. Your shiny new iMac has more personality than you ever will. copyright dedecms
You walk around the building all day, shiftlessly looking for fault in others. You have a sharp dressed, useless look about you that may have worked for your interview, but now that you actually have responsibility, you pawn it off on overworked staff, hoping their talent will cover for your glaring ineptitude. In a world of managerial evolution, you are the blue-green algae that everyone else eats and laughs at. Managers like you are a sad proof of the Dilbert principle.
Since this situation is unlikely to change without you getting a full frontal lobotomy reversal, I am forced to tender my resignation. However, I have a few parting thoughts.
1. When someone calls you in reference to employment, it is illegal for you to give me a bad recommendation. The most you can say to hurt me is I prefer not to comment. I will have friends randomly call you over the next couple of years to keep you honest, because I know you would be unable to do it on your own.
2. I have all the passwords to every account on the system, and I know every password you have used for the last five years. If you decide to get cute, I am going to publish your favorites list, which I conveniently saved when you made me back up your useless files. I do believe that terms like Lolita are not usually viewed favorably by the administration.
3. When you borrowed the digital camera to take pictures of your Mothers birthday, you neglected to mention that you were going to take pictures of yourself in the mirror nude. Then you forgot to erase them like the techno-moron you really are. Suffice it to say I have never seen such odd acts with a sauce bottle, but I assure you that those have been copied and kept in safe places pending the authoring of a glowing letter of recommendation. (Try to use a spell check please; I hate having to correct your mistakes.)
Thank you for your time, and I expect the letter of recommendation on my desk by 8:00 am tomorrow. One word of this to anybody, and all of your little twisted repugnant obsessions will be open to the public. Never screw with your systems administrator. Why? Because they know what you do with all that free time!
網絡管理員范文3
As a graduate of an institution of higher education, I have a few very basic expectations. Chief among these is that my direct superiors have an intellect that ranges above the common ground squirrel. After your consistent and annoying harassment of my co-workers and me during the commission of our duties, I can only surmise that you are one of the few true genetic wastes of our time.
Asking me, a network administrator, to explain every little nuance of everything I do each time you happen to stroll into my office is not only a waste of time, but also a waste of precious oxygen. I was hired because I know how to network computer systems, and you were apparently hired to provide amusement to myself and other employees, who watch you vainly attempt to understand the concept of cut and paste for the hundredth time.
You will never understand computers. Something as incredibly simple as binary still gives you too many options. You will also never understand why people hate you, but I am going to try and explain it to you, even though I am sure this will be just as effective as telling you what an IP address is. Your shiny new iMac has more personality than you ever will.
You walk around the building all day, shiftlessly looking for fault in others. You have a sharp dressed, useless look about you that may have worked for your interview, but now that you actually have responsibility, you pawn it off on overworked staff, hoping their talent will cover for your glaring ineptitude. In a world of managerial evolution, you are the blue-green algae that everyone else eats and laughs at. Managers like you are a sad proof of the Dilbert principle.
Since this situation is unlikely to change without you getting a full frontal lobotomy reversal, I am forced to tender my resignation. However, I have a few parting thoughts.
1. When someone calls you in reference to employment, it is illegal for you to give me a bad recommendation. The most you can say to hurt me is I prefer not to comment. I will have friends randomly call you over the next couple of years to keep you honest, because I know you would be unable to do it on your own.
2. I have all the passwords to every account on the system, and I know every password you have used for the last five years. If you decide to get cute, I am going to publish your favorites list, which I conveniently saved when you made me back up your useless files. I do believe that terms like Lolita are not usually viewed favorably by the administration.
3. When you borrowed the digital camera to take pictures of your Mothers birthday, you neglected to mention that you were going to take pictures of yourself in the mirror nude. Then you forgot to erase them like the techno-moron you really are. Suffice it to say I have never seen such odd acts with a sauce bottle, but I assure you that those have been copied and kept in safe places pending the authoring of a glowing letter of recommendation. (Try to use a spell check please; I hate having to correct your mistakes.)
Thank you for your time, and I expect the letter of recommendation on my desk by 8:00 am tomorrow. One word of this to anybody, and all of your little twisted repugnant obsessions will be open to the public. Never screw with your systems administrator. Why? Because they know what you do with all that free time!
網絡管理員范文4
縣中小學開展了第一期網絡管理員的培訓,來自縣四十所中小學的網絡管理員參加了本次培訓。培訓分為理論培訓與實踐實踐,理論培訓在縣進修學校舉行,實踐培訓在寧波大學進行,我作為我校的網絡管理員參加了本次培訓,并認真學習了有關學校網絡管理的相關知識。
當前,中國教育正以前所未有的速度和力度推進自己的信息化建設,并提出了當前階段教育信息化建設的具體目標——本世紀的頭10年內在全國中小學普及信息技術教育,并在全國90%以上的中小學校開設信息技術必修科目,加快信息技術與其他課程的整合;加強信息基礎設施和教育資源建設,使全國90%左右獨立建制的中小學能夠上網,共享優質教育資源,提高教育質量。而作為教育信息化建設的基礎,各種教育網絡如教育城域網、校園網、教育資源中心等項目也正在全國各地如火如荼地規劃與建設之中,校園網絡建設得到越來越多教育機構的重視。
我作為一名普通的小學信息技術教師有幸參與了這一培訓,在此我先感謝縣電教館和縣進修學校為我們提供這一次學習的機會,別人的感受我不知道,但我這一次真的學到了不少東西。本次培訓分為三期前兩期為理論培訓,后有期為實踐培訓,通過前面兩期的培訓,大家對網絡的基本原理有了全面的了解與認識,而本期培訓主要是針對具體的實踐操作。
培訓的設備主要為網線的制作、共享式以太組網實驗、交換機(二層、三層)、路由器、防火墻,從基本的組網拓撲圖到靜態路由、動態路由的配置,從VLAN的劃分到NAT轉換及路由器的配置。其中VLAN的劃分、NAT轉換及路由器的配置對學校網絡的組網及維護尤其重要,其相對來說又是網絡中比較專業與復雜的工作,普通的中學校教師對這一塊的知識基本上都是知道原理但沒有具體實踐的經驗。通過寧波大學幾位培訓老師專業的講解與演示,以及對應的操作練習,我對這一塊內容有了更具體的認識,操作水平也提高了不少。在此也要衷心感謝我們培訓班的兩位班主任的辛苦管理。
通過本次培訓,我對網絡管理這一塊工作有了更深的認識,對各種網絡設備的操作也更加熟悉。相信本次培訓的知識很快就能夠運用到我校網絡的管理與維護中。
網絡管理員范文5
一、XX年我作為網管主要工作內容:
1、 操作系統的維護工作。
主要包含:操作系統的更新維護。
軟件的安裝調試。
找尋同事領導提出的新軟件。
2、 網絡的維護工作。
主要包含:網絡殺毒軟件的安裝部署。
網絡的正常通訊。
網絡服務器的維護。
增加網絡管理軟件對內部網絡的使用規范進行有效的控制。
安裝并調試完畢公司的網絡系統。
3、 復印機、打印機、傳真機等相關辦公設備的調試、采購、維護工作。
主要包含:復印機出現故障時作出正確的處理,使之不耽誤正常的復印工作。
保障各部門的打印機和傳真機正常工作。
采購相關的設備耗才。
維護辦公設備的正常運行。
聯系供應商對設備進行維護、保養、維修。
4、 電腦及部分耗材的采購工作。
主要包含:采購辦公室新近員工辦公用的電腦,并按使用程度作出不用的采購方案。
二、 XX年里我的工作中的欠缺與改善方法
XX年一年多的工作總有不足的地方,有些是自己能感受到的有些是領導指出的。做出總結爭取在來年的工作中能夠得到好的改善。
1. 網絡行為的控制
網絡管理員范文6
一、高職院校校園網絡現狀
(1)考慮到投入和收益的比例,眾多學校對校園網絡的經費投入不足,再加上掌握決策權的學校領導對信息技術的了解不多,對建設校園網的目的不明確,所以就將有限的經費投資在關鍵的硬件設備上,而對于網絡的安全建設一直沒有比較系統的投入,從而導致校園網絡安全防范能力不夠,隨時都有被侵襲的危險,存在極大的安全隱患。
(2)計算機蠕蟲病毒泛濫與網絡蠕蟲病毒的危害日益嚴重,種類和數量日益增多,發作日益頻繁?,F在蠕蟲病毒往往與黑客技術結合,計算機中毒發作后,常導致拒絕服務攻擊,連累全網服務中斷。過去病毒最大的“本事”是復制自身到其他程序,現在它具有了蠕蟲的特點,通過網絡到處亂竄。還有些病毒具有黑客程序的功能,一旦侵入計算機系統后,病毒控制者可以從入侵的系統中竊取信息,遠程控制這些系統了。
(3)來自網絡外部的入侵攻擊等惡意破壞行為頻率越來越高。某些計算機被攻破后,可能成為黑客的工具,進行再次攻擊。例如,系統攻擊就是攻擊針對單個主機,并通過RealSecure系統對它進行監視。
(4)眾多學校技術人員技術參差不齊,責任心不強,多數網絡管理員都從大中專院校畢業,在工作之前沒有受過系統的專業培訓,所以,不能很好地勝任本職工作。如把在計算機中裝上還原卡當作是萬能管理方法;不設置系統管理員密碼;在系統中不安裝防火墻和殺毒軟件等等。另外,有些網絡管理員敷衍塞責,對出現的系統故障置之不理。
二、高職院校校園網中的安全隱患
(1)校園網通過與Internet相聯,在享受Internet方便快捷的同時,也面臨著遭遇攻擊的風險;
(2)目前使用的操作系統存在安全漏洞,對網絡安全構成了威脅;
(3)校園網內部也存在很大的安全隱患,由于內部用戶對網絡的結構和應用模式都比較了解,因此來自內部的安全威脅更大一些;
(4)S著校園內計算機應用的大范圍普及,接入校園網節點日漸增多,而這些節點大部分沒有采取一定的防護措施,隨時有可能造成病毒泛濫、信息丟失、數據損壞、網絡被攻擊、系統癱瘓等嚴重后果;
(5)限于學院數字化的進程,目前的網絡防護體系中還缺少硬件級防火墻這一防護環節,即沒有對內部網和外部網進行有效的隔離,入侵就很難避免。
三、高職院校校園網絡安全解決方案
1.升級網絡基礎交換設備。
將校園網內所有交換機全部升級為安全智能接入交換機。智能接入交換機具備大容量訪問控制功能,能夠屏蔽常見病毒端口,將病毒攻擊、網關攻擊等行為限制在接入層。并結合用戶上網認證系統,對用戶進入校園網的權限及可用資源實行規范、分級管理。
2.配備完整的系統的網絡安全設備。
校園網絡雖然比較復雜,但從整體技術架構來看,還是屬于局域網范疇,因此,在局域網和外部網絡接口處配置統一的網絡安全控制和監管設備即可將絕大多數外部攻擊拒之門外。另外需要注意的是,校園網絡現在基本上都是高速網絡,因此配置安全設備既要考慮到功能,又必須考慮性能,將配置安全設備后對網絡性能的影響盡可能的降到最低。據此要求,校園網絡需要配備以下安全設備:高性能的硬件防火墻;旁路監聽型的入侵檢測系統;漏洞掃描系統;安全審計系統;旁路監聽型不良內容過濾系統;覆蓋全校范圍的網絡版防病毒系統;網絡故障檢測,以及網絡故障診斷設備。通過配置這些安全產品可以實現對校園網絡進行系統的防護、預警和監控,對大量的非法訪問和不健康信息起到有效的阻斷作用,對網絡的故障可以迅速定位并解決。
3.安裝補丁程序和網絡殺毒軟件。
任何操作系統都有漏洞,大部分校園網服務器使用的操作系統都有漏洞,尤其是Windows2000、Windows2003等微軟的操作系統。網絡系統管理員需要及時對系統進行升級,有時候也可以借助第三方安全軟件來對系統進行升級。電腦病毒的防范,根據校園網現狀,在充分考慮可行性的基礎上,可采用殺毒軟件網絡版的分級管理,多重防護體系作為校園網的防病毒管理架構。充分使用殺毒軟件網絡版所擁有的“遠程安裝”、“智能升級”、“集中管理”等多種功能,為校園網絡建立起一個完善的防病毒體系。
4.采取有利措施防止內部用戶非正常使用和對校園網的的攻擊行為。
建立各部門計算機使用制度,明確用戶的責任和義務,嚴禁各部門隨意安裝和運行一些帶有黑客性質的軟件。嚴禁使用未檢驗的光盤、軟盤和其他移動存儲設備。對校園網上的計算機實施IP和MAC地址的綁定,防止私自亂改IP的現象發生。