网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following analyzes the entire subnet to identify all hosts that are active?()
A
Ping sweep
B
Packet sniffer
C
Traceroute
D
Port scanner
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following analyzes the entire subnet to identify all hosts that are active?()A Ping sweepB Packet snifferC TracerouteD Port scanner” 相关考题
考题
Your ISP has assigned you the following IP address and subnet mask:IP address: 199.141.27.0Subnet mask: 255.255.255.240Which of the following addresses can be allocated to hosts on the resulting subnet?(Select all that apply)A. 199.141.27.2B. 199.141.27.175C. 199.141.27.13D. 199.141.27.11E. 199.141.27.208F. 199.141.27.112
考题
Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?A. CDPB. SNMPC. DHCPD. ARPE. DNSF. None of the above
考题
A network technician wants to use a packet analyzer to troubleshoot a reported problem with auser‘s workstation with IP address 192.168.1.45. To identify the workstation‘s packets thetechnician wants to use the workstation‘s MAC address.Which of the following protocols would provide the needed information?()A.DHCPB.ARPC.DNSD.PING
考题
Which of the following monitors a server to see which protocols might be in use?()
A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer
考题
Which of the following solutions will detect and disable a rogue access point?()
A.Port scanB.Packet snifferC.IPSD.IDS
考题
Which of the following is used to identify active hosts along with their network addresses?()
A.Port scanB.Ping sweepC.IDSD.NIPS
考题
Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?()
A.255.255.255.0B.255.255.254.0C.255.255.252.0D.255.255.248.0
考题
Which of the following ping parameters will set the size of the outgoing packet?()A、–cB、iC、RD、–s
考题
Which of the following solutions will detect and disable a rogue access point?()A、Port scanB、Packet snifferC、IPSD、IDS
考题
Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer
考题
Which of the following are TACACS+ characteristics?(Choose all that apply.)()A、Cisco proprietaryB、Standards-based protocolC、Provides separate services for authentication, authorization, and accountingD、Encrypts only the passwordE、Uses UDP for a transport layerF、Encrypts the entire packet
考题
Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()A、CDPB、SNMPC、DHCPD、ARPE、DNSF、None of the above
考题
While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()A、ping 192.168.1.255B、ping with sweep optionC、ping 192.168.1.127D、ping 192.168.1.64E、ping with broadcast option
考题
A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING
考题
Which of the following analyzes the entire subnet to identify all hosts that are active?()A、Ping sweepB、Packet snifferC、TracerouteD、Port scanner
考题
Which of the following is used to identify active hosts along with their network addresses?()A、Port scanB、Ping sweepC、IDSD、NIPS
考题
Which of the following tools can be used to identify the location of a network outage?()A、tracerouteB、netstatC、nslookupD、ping
考题
Which of the following commands verifies connectivity between two hosts?()A、chkntfsB、dxdiagC、tracertD、ipconfigE、ping
考题
Which of the following commands should be used to identify packet sequence problems?()A、 ping and arpB、 lsattr and ifconfigC、 netstat and iostatD、 iptrace and tcpdump
考题
多选题Which of the following are TACACS+ characteristics?(Choose all that apply.)()ACisco proprietaryBStandards-based protocolCProvides separate services for authentication, authorization, and accountingDEncrypts only the passwordEUses UDP for a transport layerFEncrypts the entire packet
考题
单选题Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()A
CDPB
SNMPC
DHCPD
ARPE
DNSF
None of the above
考题
单选题Which of the following commands should be used to identify packet sequence problems?()A
ping and arpB
lsattr and ifconfigC
netstat and iostatD
iptrace and tcpdump
考题
单选题Which of the following is used to identify active hosts along with their network addresses?()A
Port scanB
Ping sweepC
IDSD
NIPS
考题
单选题The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()A
ermit all packet smatching the first three octets of the source address to all destinationsB
permit all packet matching the last octet of the destination address and accept all source addressesC
permit all packet matching the host bits in the source address to all destinationsD
permit all packet from the third subnet of the network address to all destinations
考题
单选题The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()A
ermit all packets matching the first three octets of the source address to all destinationsB
permit all packet matching the last octet of the destination address and accept all source addressesC
permit all packet matching the host bits in the source address to all destinationsD
permit all packet from the third subnet of the network address to all destinations
考题
单选题Which of the following ping parameters will set the size of the outgoing packet?()A
–cB
iC
RD
–s
考题
单选题An administrator needs a network that can support up to 800 hosts on the same subnet. Which of the following is the MINIMUM subnet mask that should be used?()A
255.0.0.0B
255.255.0.0C
255.255.252.0D
255.255.255.0
热门标签
最新试卷