网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()

  • A、default gateway
  • B、DNS servers
  • C、FTP server
  • D、helper address
  • E、subnet mask
  • F、TFTP server

参考答案

更多 “What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()A、default gatewayB、DNS serversC、FTP serverD、helper addressE、subnet maskF、TFTP server” 相关考题
考题 网管与网关网元通信采用的是什么协议(),网元之间通信采用()协议 A、ECC,ECCB、TCP/IP,FTPC、TCP/IP,ECCD、TCP/IP,TCP/IP

考题 You configure your Windows 2000 Professional computer for Internet Connection Sharing and for TCP/IP filtering as shown in the exhibit.You test your TCP/IP filtering configuration from another client computer. You can access web sites, but you cannot access FTP sites.What should you do to be able to access FTP sites?A.Add Port 21 to the TCP Ports section.B.Add Port 138 to the TCP Ports section.C.Add Port 21 to the IP Ports section.D.Add Port 138 to the IP Ports section.

考题 Above is the output from show ip bgp neighbors command. What is line 21 stating about the BGP connection?() A. the number of consecutive TCP connections to the specified remote neig hborB. the number of total TCP connections that the router hasC. the number of times the router has established a TCP connectionD. the number of neighbors that the router has

考题 关于TCP/IP协议的描述,哪些是正确的,()A. TCP是传输控制协议B.TCP/IP协议中只有TCP协议和IP协议C.IP是网络互联协议D.TCP/IP协议中除了TCP协议和IP协议外,还包括许多其他的协议

考题 The TCP/IP stack is a complete set of networking protocols.The OSI Model was meant to be a standardized way of connecting devices together,and most protocols have some direct correlation to the OSI Model.The OSI Model has 7 layers,the fourth layer is called______.A.physical layer B.data link layer C.application layer D.transport layer

考题 TCP/IP只包含了TCP和IP。

考题 What is the port number of an IPsec Encapsulating Security Payfoad packet?()A、UOP port 50B、IP protocol 51C、TCP port 51D、TCP port 50E、IP protocol 50F、UDP port51

考题 What is the port number of the IPsec Authentication Header packet?()A、IP protocol 50B、TCP port 51C、UDP port 50D、IP protocol 51E、UDP port 51F、TCP port 50

考题 What should you set the Client Configuration to when configuring the ODBC Data Source for the Database Subsystem?()A、TCP/IP  B、Multiprotocol  C、Named Pipes  D、NWLink IPX/SPX

考题 In the context of MPLS,what is the correct action to be performed when an aggregate label is received ?()A、It adds the VPN label into the top label in the MPLS label stackB、It replaces the top label in the MPLS label stack with a VPN label and propagatesC、It replaces the bottom label in the MPLS label stack with a VPN label and propagatesD、It removes the top label in the MPLS label stack and does a Layer 3 lookup on underlying IP packetsE、None of above

考题 What is the action of "pop" in the context of MPLS switching?()A、It removes the top label in the MPLS label stack.B、It adds a top label in MPLS label stack.C、It replaces the top label in the MPLS label stack with another value.D、It replaces the top label in the MPLS label stack with a set of labels.E、None of above.

考题 计算机中,有关TCP/IP协议的操作包括()等部分。A、TCP/IP协议的安装B、TCP/IP协议的配置C、TCP/IP协议的纠错D、TCP/IP协议的删除E、TCP/IP协议安装的检测

考题 What is the port number of an IPsec Encapsulating Security Payload packet?()A、IP protocol 50B、IP protocol 51C、TCP port 50D、TCP port 51E、UDP port 50F、UDP port 51

考题 An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configured.D、The PC has connectivity up to Layer 5 of the OSI model.E、The PC has the TCP/IP protocol stack correctly installed.

考题 An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC.If a reply is received, what does this confirm?()A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configuredD、The PC has connectivity up to Layer 5 of the OSI modelE、The PC has the TCP/IP protocol stack correctly installed.

考题 Which of the following IP addresses would a technician ping to verify the integrity of the local TCP/IP stack?()A、10.0.0.1B、127.0.0.1C、169.254.0.1D、192.168.0.1

考题 What is required during the initial creation of a cluster?()A、 Nothing,because HACMP will discover the configurationB、 The cluster name and a TCP/IP path to each of the nodesC、 The cluster name and ID and a TCP/IP path to each of the nodesD、 The cluster name and ID node names and a TCP/IP path to each of the nodes

考题 单选题What is a benefit of Internet protocol (IP) telephony?()A Synchronizes password exchanges for call setupB Eliminates the need for physical cabling in a TCP/IP networkC Enables two-way voice transmission over a packet-switched TCP/IP networkD Creates an encrypted tunnel for voice through a Transmission Control Protocol (TCP)/IP network

考题 多选题What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()Adefault gatewayBDNS serversCFTP serverDhelper addressEsubnet maskFTFTP server

考题 单选题An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A The PC has connectivity with a local host.B The PC has connectivity with a Layer 3 device.C The PC has a default gateway correctly configured.D The PC has connectivity up to Layer 5 of the OSI model.E The PC has the TCP/IP protocol stack correctly installed.

考题 单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()A Source TCP portB Source IP addressC Destination TCP portD Destination IP address

考题 多选题What are the four fields in an MPLS label?()AversionBexperimentalClabelDprotocolETTLFbottom-of-stack indicato

考题 单选题What is the action of "pop" in the context of MPLS switching?()A It removes the top label in the MPLS label stack.B It adds a top label in MPLS label stack.C It replaces the top label in the MPLS label stack with another value.D It replaces the top label in the MPLS label stack with a set of labels.E None of above.

考题 单选题Your Company upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings to be the same as they were for the previously installed network adapter.   When you restart eh computer, however, you cannot access the network. You try to ping your network adapter’s TCP/IP address locally. You receive the following error message. “Request timed out.” Next, you try to ping 127.0.0.1 and receive the same error message.   What must you do?()A Configure a different TCP/IP addressB Enable DHCP in the TCP/IP propertiesC Enable DNS in the TCP/IP propertiesD Configure the network adapter to run at 100 Mbps onlyE Replace the network adapter.

考题 单选题Which of the following IP addresses would a technician ping to verify the integrity of the local TCP/IP stack?()A 10.0.0.1B 127.0.0.1C 169.254.0.1D 192.168.0.1

考题 单选题In the context of MPLS,what is the correct action to be performed when an aggregate label is received ?()A It adds the VPN label into the top label in the MPLS label stackB It replaces the top label in the MPLS label stack with a VPN label and propagatesC It replaces the bottom label in the MPLS label stack with a VPN label and propagatesD It removes the top label in the MPLS label stack and does a Layer 3 lookup on underlying IP packetsE None of above

考题 单选题What is required during the initial creation of a cluster?()A  Nothing,because HACMP will discover the configurationB  The cluster name and a TCP/IP path to each of the nodesC  The cluster name and ID and a TCP/IP path to each of the nodesD  The cluster name and ID node names and a TCP/IP path to each of the nodes