网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following functions does the "ifconfig en4 down" perform?()
A

Removes the en4 interface

B

Removes the en4’s network route

C

Stops all traffic through the en4 interface

D

Stops all traffic through the en4 and removes its network route from the routing table


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following functions does the "ifconfig en4 down" perform?()A Removes the en4 interfaceB Removes the en4’s network routeC Stops all traffic through the en4 interfaceD Stops all traffic through the en4 and removes its network route from the routing table” 相关考题
考题 How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?() A. It sends the traffic through one egress port toward its destinationB. It sends the traffic through multiple egress ports to all available receiversC. It sends the traffic through an internal link to the RED. It sends the traffic to the local system for further processing

考题 What does a router do if it has no EIGRP feasible successor route to a destination network and the successor route to that destination network is inactive status?() A. It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.B. It sends a copy of its neighbor table to all adjacent routers.C. It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.D. It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.

考题 You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device() A. It resembles a Layer 2 bridge.B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C. Inline interfaces which have no IP addresses cannot be detected.D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

考题 What does the command udld reset accomplish?()A、allows an UDLD port to automatically reset when it has been shutdownB、resets all UDLD enabled ports that have been shutdownC、removes all UDLD configurations from interfaces that were globally enabledD、removes all UDLD configurations from interfaces that were enabled per-port

考题 Based on the following items, which two types of interfaces are found on all network-based IPS sensors?()A、Loopback interfaceB、Command and control interfaceC、Monitoring interfaceD、Management interface

考题 Which of the following BEST describes a hub?()A、Determines the best route to transmit dataB、Inspects traffic and accepts or declines transmissionC、Broadcasts data to specific network devicesD、Broadcasts data to all network devices

考题 Which of the following functions does the "ifconfig en0" perform?()A、Shuts down en0B、Displays en0 settingsC、Reconfigures en0 using the ODMD、Sends an SNMP alert to the network administrator

考题 How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()A、It sends the traffic through one egress port toward its destinationB、It sends the traffic through multiple egress ports to all available receiversC、It sends the traffic through an internal link to the RED、It sends the traffic to the local system for further processing

考题 What are three objectives that the no ip inspect command achieves?()A、removes the entire CBAC configurationB、removes all associated static ACLsC、turns off the automatic audit feature in SDMD、denies HTTP and Java applets to the inside interface but permits this traffic to the DMZE、resets all global timeouts and thresholds to the defaultsF、deletes all existing sessions

考题 A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A、NIC filtering is enabled.B、Port security is configured.C、NIC is not in promiscuous mode.D、NIC is in promiscuous mode.

考题 What is the difference between thE.remove and thE.purge action with the dpkg command?()A、 -remove removes the program, -purge also removes the config filesB、 -remove only removes the program, -purge only removes the config filesC、 -remove removes a package, -purge also removes all packages dependent on itD、 -remove removes only the package file itself, -purge removes all files related to the package

考题 Which of the following functions does the "ifconfig en4 down" perform?()A、Removes the en4 interfaceB、Removes the en4’s network routeC、Stops all traffic through the en4 interfaceD、Stops all traffic through the en4 and removes its network route from the routing table

考题 How does the ERX Edge Router interact with subscriber IP addresses assigned by an external DHCP server?()A、It monitors messages from the external server and updates the routing table as needed.B、It maintains the leases for the DHCP server and reassigns addresses to new subscribers.C、It sends keep alives to the subscriber and makes the address available when the subscriber stops responding.D、It sends keep alives to the subscriber and removes the host route when the subscriber stops responding.

考题 What does the TRUNCATE statement do?()A、Removes the tableB、Removes all rows from a tableC、Shortens the table to 10 rowsD、Removes all columns from a tableE、Removes foreign keys from a table

考题 You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet.Which of the following describes the results of running this cmdlet?()A、It removes one or more network adapters from a specified NIC team.B、It removes a team interface from a NIC team.C、It removes a specified NIC team from the host.D、It removes a network adapter member from a switch team.

考题 You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

考题 多选题You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()AIt resembles a Layer 2 bridge.BTraffic flow through the IPS resembles traffic flow through a Layer 3 router.CInline interfaces which have no IP addresses cannot be detected.DMalicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

考题 单选题What is the difference between thE.remove and thE.purge action with the dpkg command?()A  -remove removes the program, -purge also removes the config filesB  -remove only removes the program, -purge only removes the config filesC  -remove removes a package, -purge also removes all packages dependent on itD  -remove removes only the package file itself, -purge removes all files related to the package

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A NIC filtering is enabled.B Port security is configured.C NIC is not in promiscuous mode.D NIC is in promiscuous mode.

考题 单选题You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()A Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B Allow all inbound VPN traffic to pass through the perimeter firewall only.  C Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

考题 单选题You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet.Which of the following describes the results of running this cmdlet?()A It removes one or more network adapters from a specified NIC team.B It removes a team interface from a NIC team.C It removes a specified NIC team from the host.D It removes a network adapter member from a switch team.

考题 单选题How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()A It sends the traffic through one egress port toward its destinationB It sends the traffic through multiple egress ports to all available receiversC It sends the traffic through an internal link to the RED It sends the traffic to the local system for further processing

考题 单选题What does a router do if it has no EIGRP feasible successor route to a destination network and the successor route to that destination network is inactive status?()A It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.B It sends a copy of its neighbor table to all adjacent routers.C It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.D It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()A  NIC filtering is enabled.B  Port security is configured.C  NIC is not in promiscuous mode.D  NIC is in promiscuous mode.

考题 单选题Which of the following functions does the "ifconfig en4 down" perform?()A Removes the en4 interfaceB Removes the en4’s network routeC Stops all traffic through the en4 interfaceD Stops all traffic through the en4 and removes its network route from the routing table

考题 单选题Which of the following functions does the "ifconfig en0" perform?()A Shuts down en0B Displays en0 settingsC Reconfigures en0 using the ODMD Sends an SNMP alert to the network administrator

考题 单选题You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A  Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B  Allow all inbound VPN traffic to pass through the perimeter firewall only.C  Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D  Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

考题 单选题Which of the following BEST describes a hub?()A Determines the best route to transmit dataB Inspects traffic and accepts or declines transmissionC Broadcasts data to specific network devicesD Broadcasts data to all network devices