网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

An IP ( ) is a unique number the computer uses to identify itself, and to be identified over a network.

A.address

B.device

C.point

D.data


参考答案

更多 “ An IP ( ) is a unique number the computer uses to identify itself, and to be identified over a network.A.addressB.deviceC.pointD.data ” 相关考题
考题 ●A computer virus is a computer program that is created to make and spread (72) of itself.(72) A.programsB.virusC.copiesD.files

考题 TCP/IP(71)layer protocols provide services to the application(72)running on a computer. The application layer does not define the application itself, but rather it defines(73)that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an(74)between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP(75)layer consists of two main protocol options--the Transmission Control Protocol(TCP) and the User Datagram Protocol(UDP).A.applicationB.transportC.linkD.network

考题 Every valid character in a computer that uses even(71)must always have an even number of 1 bits.(71)A.parityB.checkC.testD.compare

考题 What is the maximum number of IP addresses that can be assigned to hosts on a Ezonexam subnet that uses the 255.255.255.224 subnet mask?A. 14B. 15C. 16D. 30E. 31F. 32

考题 ● TCP/IP (71) layer protocols provide services to the application (72) running on a computer. The application layer does not define the application itself, but rather it defines (73) that applications need—like the ability to transfer a file in the case of HTTP. In short, the application layer provides an (74) between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP (75) layer consists of two main protocol options—the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).

考题 Each machine in the internet is assigned a unique network address,called(),that is used to identify the machine for communication purposesA.MAC addressB.IP addressC.host addressD.domain name address

考题 Each machine in the ineternet is assigned a unique network address, called__(71)__,that is used to identify the machine for communication purposes.A.MAC addressB.IP addressC.host addressD.domain name address

考题 You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()A. Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.B. Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.Select the Required option under the custom rule C. Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.D. Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.

考题 Every valid character in a computer that uses even ______ must always have an even number of 1 bits.A.parityB.checkC.testD.compare

考题 A computer virus is a computer program that is created to make and spread(71)of itself.A.programsB.virusC.copiesD.files

考题 TCP/IP ( )layer protocols provide services to the application(请作答此空)running on a computer. The application layer does not define the application itself, but rather it defines( )that applications need--like the ability to transfer a file in the case of HTTP. In short, the application layer provides an( )between software running on a computer and the network itself. The TCP/IP application layer includes a relatively large number of protocols, with HTTP being only one of those. The TCP/IP( )layer consists of two main protocol options--the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP).A.hardware] B.software] C.packet D.equipment

考题 ______ATA-100, each page is identified by a three element number and a page number.A.According with B.In accordance with C.To D.In according to

考题 Each machine in the internet is assigned a unique network address,called ( ) ,that is used to identify the machine for communication purposes. A.MAC address B.IP address C.host address D.domain name address

考题 Which two statements about the DiffServ  model are true?()A、a class can be identified as a single application, multiple applications with similar service needs,or be based on the source or destination IP addressB、a drawback of the DiffServ field in the MAC header to mark frames into behavior aggregates (BAs)C、DiffServ uses the DiffServ field in the MAC header to mark frames into behaviorD、the DiffServ field occupies the same eight bits of the MAC header that were previously used for the ToS fieldE、the first six high-order bits of the DiffServ field are used to identify the Resource Reservation Protocol (RSVP) valueF、the primary goal of DiffServ is scalability

考题 Each machine in the internet is assigned a unique network address,called(),that is used to identify the machine for communication purposesA、MAC addressB、IP addressC、host addressD、domain name address

考题 What is the purpose of a network mask?()A、It is used to identify the maximum hop count of a subnetworkB、It is used to identify an IP address as either private or publicC、It is used to identify the network to which an IP address belongsD、It is used to identify the total number of bits present in an IP address

考题 Which of the following is STP BEST identified by under the cable sheath?()A、Number of twists in wiresB、Number of wiresC、LubricantD、Foil

考题 What is the purpose of a network mask?()A、It is used to identify the maximum hop count of a subnetwork.B、It is used to identify an IP address as either private or public.C、It is used to identify the network to which an IP address belongs.D、It is used to identify the total number of bits present in an IP address.

考题 Which pseudocolumn could you use to identify a unique row in a Flashback Versions Query?()A、 XIDB、 VERSIONS_PKC、 VERSIONS_XIDD、 VERSIONS_UNIQUE

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You discover that the server has a large number of open connections that originate from the IP address 192.168.1.121. You need to identify the host name of the computer that uses the IP address 192.168.1.121. Which command should you run?()A、Arp–aB、Netstat-rC、Net view//192.168.1.121D、Ping–a 192.168.1.121

考题 You are the administrator of a Windows Server 2003 computer named Server1. Server1 is an FTP server located in the company’s internal network.Administrators report an increased amount of FTP traffic to Server1.   You need to configure Server1 to achieve the following goals: Identify the media access control (MAC) address of any computer that is performing FTP transfers from Server1.Find out the exact FTP commands that were executed.  Ensure that you do not disrupt the operation of Server1. What should you do?()A、Configure a performance alert to write an event to the application event log whenever the number of established FTP connections exceeds 1.B、Use a Network Monitor filter to capture IP traffic from any computer to Server1.C、Run the finger command on Server1 to identify the source of the FTP requests.D、Run the arp command on Server1 to identify the source of the FTP requests.

考题 You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

考题 单选题Which pseudocolumn could you use to identify a unique row in a Flashback Versions Query?()A  XIDB  VERSIONS_PKC  VERSIONS_XIDD  VERSIONS_UNIQUE

考题 多选题Which two statements about the DiffServ  model are true?()Aa class can be identified as a single application, multiple applications with similar service needs,or be based on the source or destination IP addressBa drawback of the DiffServ field in the MAC header to mark frames into behavior aggregates (BAs)CDiffServ uses the DiffServ field in the MAC header to mark frames into behaviorDthe DiffServ field occupies the same eight bits of the MAC header that were previously used for the ToS fieldEthe first six high-order bits of the DiffServ field are used to identify the Resource Reservation Protocol (RSVP) valueFthe primary goal of DiffServ is scalability

考题 单选题What is the purpose of a network mask?()A It is used to identify the maximum hop count of a subnetworkB It is used to identify an IP address as either private or publicC It is used to identify the network to which an IP address belongsD It is used to identify the total number of bits present in an IP address

考题 单选题Your network consists of a single Active Directory domain.You have a DHCP server that runs Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Service Pack 3 (SP3).A user named User1 reports that when she starts her computer, she receives a duplicate address error message.You confirm that her computer is configured as a DHCP client.You need to ensure that User1 receives a unique IP address from the DHCP server.  What should you do on the DHCP server?()A Reconcile the scope.B Create a superscope.C Enable conflict resolution.D Increase the number of IP addresses available in the scope.

考题 单选题What is the purpose of a network mask?()A It is used to identify the maximum hop count of a subnetwork.B It is used to identify an IP address as either private or public.C It is used to identify the network to which an IP address belongs.D It is used to identify the total number of bits present in an IP address.