网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()

A. Drop the data.

B. Send the data frames to the default gateway.

C. Create an ARP request to get a MAC address for the receiving host.

D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.


参考答案

更多 “ A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?() A. Drop the data.B. Send the data frames to the default gateway.C. Create an ARP request to get a MAC address for the receiving host.D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host. ” 相关考题
考题 Why did the host invite guests who had not known one another to the dinner? A、The host wanted to surprise everyone.B、The host was keen on meeting different persons.C、The host tried to make many friends at one time.D、Because he thought these people had plenty in common.

考题 Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections.How many sessions exist between Host A and Host B?()A.1B.2C.3D.4

考题 Click the Exhibit button.A user logs in, is assigned the default role, and successfully loads the Host Enforcer policies shown in the exhibit.Which three statements are true? () A. The local host will respond to ICMP echo-request packets from 192.168.53.10.B. The local host will respond to UDP port 53 requests from 192.168.1.25.C. The local host can send any packet of any type to host 172.16.1.1.D. The local host will accept any packet of any type from host 172.16.1.1.E. The local host can send packets to UDP port512 on server 192.168.53.10.

考题 When a host transmits data across a network to another host, which process does the data go through?() A.standardizationB.conversionC.encapsulationD.synchronization

考题 The user of Host1 wants to ping the DSL modem/router at 192.168.1.254. Based on the Host1 ARP table that is shown in the exhibit, what will Host1 do()。 A.send a unicast ARP packet to the DSL modem/routerB.send unicast ICMP packets to the DSL modem/routerC.send Layer 3 broadcast packets to which the DSL modem/router respondsD.send a Layer 2 broadcast that is received by Host2, the switch, and the DSL modem/router

考题 Anytime a host or a router has an IP datagram to send to another host or router, it has the( )address of the receiver. This address is obtained from the DNS if the sender is the host or it is found in a routing table if the sender is a router. But the IP data gram must be( ) in a frame to be able to pass through the physical network. This means that the sender needs the ( )address of the receiver. The host or the router sends an ARP query packet. The packet includes the physical and IP addresses of the sender and the IP address of the receiver. Because the sender does not know the physical address of the receiver, the query is( ) over the network.Every host or router on the network receives and processes the ARP query packet, but only the intended recipient recognizes its IP address and sends back an ARP response packet.The response packet contains the recipient's IP and physical addresses. The packet is(请作答此空) directly to the inquirer by using the physical address received in the query packet. A. multicast B. unicast C. broadcast D. multiple unicast

考题 What is the first thing that happens when IPv6 is enabled on an interface on a host?()A、A router solicitation is sent on that interface.B、There is a duplicate address detection on the host interface.C、The link local address is assigned on the host interface.D、A neighbor redirect message is sent on the host interface.

考题 A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()A、Drop the data.B、Send the data frames to the default gateway.C、Create an ARP request to get a MAC address for the receiving host.D、Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

考题 Which OSI layer header contains the address of a destination host that is another network?()A、applicationB、presentationC、sessionD、transportE、networkF、data linkG、physical

考题 What happens when Host Checker is configured to perform checks every "0" minutes? ()A、Host Checker is disabled.B、Host Checker will perform continous checks.C、Host Checker will perform checks when user logs out.D、Host Checker will perform checks when user first logs in.

考题 Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true?()A、Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.B、Router C will use ICMP to inform Router B that Host 2 cannot be reached.C、Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.D、Router C will send a Destination Unreachable message type.E、Router C will send a Router Selection message type.F、Router C will send a Source Quench message type.

考题 When a host transmits data across a network to another host, which process does the data go through?()A、standardizationB、conversionC、encapsulationD、synchronization

考题 How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A、These attacks send multiple FIN segments forcing TCP connection release.B、These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C、These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D、These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E、These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

考题 Which destination addresses will be used by Host A to send data to Host C?()A、the IP address of Switch 1B、the MAC address of Switch 1C、the IP address of Host CD、the MAC address of Host CE、the IP address of the router's E0 interfaceF、the MAC address of the router's E0 interface

考题 You are designing a Windows Server 2008 R2 Hyper-V environment. Your design includes a failover cluster that supports live migration. You need to ensure that the network supports this design. What should you do?()A、Use two iSCSI host bus adaptersB、Use two Fibre Channel host bus adaptersC、Place the physical host servers on the same TCP/IP subnetD、Place the physical host servers on different TCP/IP subnets

考题 单选题What is the first thing that happens when IPv6 is enabled on an interface on a host?()A A router solicitation is sent on that interface.B There is a duplicate address detection on the host interface.C The link local address is assigned on the host interface.D A neighbor redirect message is sent on the host interface.

考题 单选题A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()A Drop the data.B Send the data frames to the default gateway.C Create an ARP request to get a MAC address for the receiving host.D Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

考题 单选题You install the Web Server (IIS) role on and the SMTP Server feature on a server that runs Windows Server 2008.  You need to configure the new SMTP server to forward mail to the mail server of the Internet Service Provider (ISP). What should you do?()A Configure the smart host setting to use the local host.B Configure the smart host setting to use the mail server of the ISP.C Run the appcmd /delivery method:PickupDirectoryFromIis command.D Configure the SMTP delivery setting to Attempt direct delivery before sending to smart host.

考题 多选题Which destination addresses will be used by Host A to send data to Host C?()Athe IP address of Switch 1Bthe MAC address of Switch 1Cthe IP address of Host CDthe MAC address of Host CEthe IP address of the router's E0 interfaceFthe MAC address of the router's E0 interface

考题 单选题How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A These attacks send multiple FIN segments forcing TCP connection release.B These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

考题 多选题Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true (Choose two.)()。ARouter C will use ICMP to inform Host 1 that Host 2 cannot be reachedBRouter C will use ICMP to inform Router B that Host 2 cannot be reachedCRouter C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reachedDRouter C will send a Destination Unreachable message typeERouter C will send a Router Selection message typeFRouter C will send a Source Quench message type

考题 单选题Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many sessions exist between Host A and Host B?()A 1B 2C 3D 4

考题 单选题Which of the following protocols would be used to test if one host is reachable by another host, by sending echo requests and waiting for echo replies?()A SNMPB ICMPC TCPD UDP