网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()
A
netstat
B
traceroute
C
nbtstat
D
ping
参考答案
参考解析
解析:
暂无解析
更多 “单选题An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()A netstatB tracerouteC nbtstatD ping” 相关考题
考题
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A.WormB.SmurfC.Logic BombD.Man-in-the-middle
考题
A network technician wants to use a packet analyzer to troubleshoot a reported problem with auser‘s workstation with IP address 192.168.1.45. To identify the workstation‘s packets thetechnician wants to use the workstation‘s MAC address.Which of the following protocols would provide the needed information?()A.DHCPB.ARPC.DNSD.PING
考题
An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()A. NetstatB. IfconfigC. HostnameD. Ping
考题
An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()
A.netstatB.tracerouteC.nbtstatD.ping
考题
An administrator is in charge of several remote servers in Japan. Users call and complain they cannot connect to the company’s resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running?()A、pingB、netstatC、nbtstatD、telnet
考题
The server administrator discovers that a server, which has not been patched, is runningextremely slow and suspects that the server may have been compromised. Which of the following commands should the administrator use to check the number of network connections the server is making?()A、netstatB、pingC、nslookupD、grep
考题
An administrator needs to review the open ports on a host. Which of the following commands should they use?()A、traceroute -dB、ping -tC、netstat -anoD、nbtstat -a
考题
A system administrator is trying to troubleshoot company wide email problems that may be related to DNS. Which of the following network tools would be MOST useful to determine if it is a DNS issue?()A、netstatB、tracertC、nslookupD、ping
考题
An administrator wants to use a Windows system to monitor a server that is rebooting. Which of the following commands should the administrator use to know when the NIC is back online in the server?()A、 ping i 240B、 ping -tC、 ping -aD、 ping w 240
考题
An administrator needs to know the workstation name of a user who called in for support in orderto remotely manage it. After calling the user and having the user open a command prompt, whichof the following commands would the administrator ask the user to type?()A、NetstatB、IfconfigC、HostnameD、Ping
考题
Which of the following commands should the administrator run to check if the SMTP services are still active?()A、 Telnet Server name 25B、 Ping Server name C、 net send Server name test mailD、 nbtstat a Server name
考题
A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING
考题
An administrator is testing setting the IP address on a Linux server from command line. Which of the following commands is used to set the default gateway for the server?()A、routeB、tracerouteC、ipconfigD、nmap
考题
An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()A、netstatB、tracerouteC、nbtstatD、ping
考题
Which of the following commands should Jill, a technician, use to test a computer’s NIC forfunctionality?()A、ping netB、ping ipconfigC、ping localhostD、ping microsoft.com
考题
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A、WormB、SmurfC、Logic BombD、Man-in-the-middle
考题
A system administrator received the following message while trying to ssh to a server: connection timed out.The administrator pinged the server and had no response. The administrator then pinged the gateway, and was successful. Which tool could the administrator use next to isolate the problem?()A、routeB、tracerouteC、netstat -nrD、broadcast ping
考题
Which of the following commands is used to determine the route that the IP packets take to a network host?()A、 route B、 netstat C、 iptrace D、 traceroute
考题
An AIX system administrator wants to reset the level at which the SIGDANGER signal is sent to processes so appropriate actions can be taken when paging space is running low. Which of the following commands is used to reset the level?()A、 vmtune -wB、 svmon -wC、 schedtune -wD、 vmstat -s
考题
单选题An AIX system administrator wants to reset the level at which the SIGDANGER signal is sent to processes so appropriate actions can be taken when paging space is running low. Which of the following commands is used to reset the level?()A
vmtune -wB
svmon -wC
schedtune -wD
vmstat -s
考题
单选题Users have reported that they cannot access certain Internet sites. An administrator wants to test that the sites are properly resolving to an IP address. Which of the following tools would allow the administrator to test name resolution?()A
net viewB
ipconfigC
digD
ifconfig
考题
单选题Which of the following commands should the administrator run to check if the SMTP services are still active?()A
Telnet Server name 25B
Ping Server name C
net send Server name test mailD
nbtstat a Server name
考题
单选题A system administrator has a filesystem called /test/data in volume group datavg. Which of the following commands will allow the administrator to create a mirrored copy of the filesystem’s data?()A
chfsB
chlvC
mklvcopyD
mkfscopy
考题
单选题An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A
NIPSB
HoneypotC
DMZD
NIDS
考题
单选题An administrator wants to use a Windows system to monitor a server that is rebooting. Which of the following commands should the administrator use to know when the NIC is back online in the server?()A
ping i 240B
ping -tC
ping -aD
ping w 240
考题
单选题An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()A
netstatB
tracerouteC
nbtstatD
ping
考题
单选题A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A
WormB
SmurfC
Logic BombD
Man-in-the-middle
考题
单选题Which of the following commands is used to determine the route that the IP packets take to a network host?()A
route B
netstat C
iptrace D
traceroute
热门标签
最新试卷