网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A host is to be part of a very small private network, which will never be connected to any other networks. Which of the following name resolution schemes would be the easiest to implement?()
A
DNS
B
NIS
C
DHCP
D
etc/hosts file
参考答案
参考解析
解析:
暂无解析
更多 “单选题A host is to be part of a very small private network, which will never be connected to any other networks. Which of the following name resolution schemes would be the easiest to implement?()A DNSB NISC DHCPD etc/hosts file” 相关考题
考题
● Every host and router on the Internet has an IP address,which encodes its (69) .(69) A.host numberB.host number and socketC.network numberD.host number and network number
考题
Every host and router on the Internet has an IP address, which encodes itsA.host numberB.host number and socketC.network numberD.host number and network number
考题
Every host and router on the Internet has an IP address, which encodes its(12).A.host numberB.network numberC.host number and socketD.host number and network number
考题
Given the host IP address of 192.168.100.60 and a network mask of 255.255.255.224 (or /27), which address represents the correct network address for the referenced host?()
A.192.168.100.48B.192.168.100.16C.192.168.100.0D.192.168.100.32
考题
In any NAT (network address translation) configuration, what is the Inside Global IP address?()
A. The summarized address for all internal subnetted addresses.B. A private IP address assigned to a host on the inside network.C. A registered address that represents an inside host to an outside network.D. A unique IP address used on an internal networkE. Non of the above
考题
A network vulnerability scanner is part of which critical element of network and system security?()
A. host securityB. perimeter securityC. security monitoringD. policy management
考题
When a host transmits data across a network to another host, which process does the data go through?()
A.standardizationB.conversionC.encapsulationD.synchronization
考题
Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()A、They are separate from the central site and use NAT to route through the Internet to the Central SiteB、They are part of the VLANs at the Central Site; they are in the same subnetsC、They use public IP Addresses that are routable through the InternetD、They are in separate subnets but are part of the private address space of the network
考题
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()A、The default gateway is configured on a different subnet form this host.B、The host is a member of the fifth usable subnet of the 192.168.16.0 network.C、The subnetwork address for this host is 192.168.16.160/28.D、The address of the next higher subnet is 192.168.16.192.E、The address of the router interface that is attached to this subnetwork is 192.168.16.190.F、There are 60 usable host addresses on this subnet.
考题
A host is to become part of a hierarchical naming topology. Which of the following services are required?()A、DHCPB、Domain Name ServiceC、Network Information ServiceD、A hosts file
考题
Which of the following Class A networks is reserved for "private networks" use only?()A、network 10.0.0.0B、network 127.0.0.0C、network 129.135.0.0D、network 192.168.0.0
考题
In any NAT (network address translation) configuration, what is the Inside Global IP address?()A、The summarized address for all internal subnetted addresses.B、A private IP address assigned to a host on the inside network.C、A registered address that represents an inside host to an outside network.D、A unique IP address used on an internal networkE、Non of the above
考题
A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management
考题
When a host transmits data across a network to another host, which process does the data go through?()A、standardizationB、conversionC、encapsulationD、synchronization
考题
Which of the following devices can be installed on individual computers throughout the network?()A、NIPSB、Network-based firewallC、VPN concentratorD、Host-based firewall
考题
Which of the following would restrict traffic from a specific host to a network?()A、MIBsB、NASC、ACLD、SMTP
考题
A technician notices that when trying to ping a workstation by network name the workstation does not reply back over the network. The workstation is part of the domain and is able to get to the Internet. Which of the following is the cause of the problem?()A、Faulty cable on the workstationB、Wrong host name on the workstationC、Wrong WINS on the workstationD、Incorrect IP address assigned to the workstation
考题
The local host on a small network is named Earth. There is also a remote host on the network named Saturn. The system administrator of the network is in the /u/tmp directory of Earth, and starts an ftp to Saturn as root. Which of the following sequence of commands issued from the local host, Earth, will:()。 1.Change to the /u/new directory on Saturn. 2.Check to see if there is an a.out file on remote host Saturn. 3.Transfer a.out from Earth to Saturn.A、cd /u/new ls a.out put a.outB、cd /u/new ls a.out get a.outC、lcd /u/new ls a.out put a.outD、lcd /u/new ls a.out get a.out
考题
A host is to be part of a very small private network, which will never be connected to any other networks. Which of the following name resolution schemes would be the easiest to implement?()A、DNSB、NISC、DHCPD、etc/hosts file
考题
Given the host IP address of 192.168.100.60 and a network mask of 255.255.255.224 (or /27), which address represents the correct network address for the referenced host?()A、192.168.100.48B、192.168.100.16C、192.168.100.0D、192.168.100.32
考题
单选题Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()A
They are separate from the central site and use NAT to route through the Internet to the Central SiteB
They are part of the VLANs at the Central Site; they are in the same subnetsC
They use public IP Addresses that are routable through the InternetD
They are in separate subnets but are part of the private address space of the network
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
多选题Your network contains a Hyper-V host named Host1 that runs Windows Server 2008 R2. The host is connected to VLAN ID 10. For testing purposes, you plan to deploy several virtual machines (VMs) on the Host1. You need to recommend which virtual networks must be created for the VMs. The solution must ensure that the VMs can only connect to other VMs. Which network configuration or configurations should you recommend?()Aan external network on VLAN ID 10Ban internal network on VLAN ID 11Can external network on VLAN ID 11Da private network on VLAN ID 10Ean internal network on VLAN ID 10
考题
单选题You are implementing a very simple TCP/IP network. It rarely changes and you would like to use Oracle Connection Manager to filter client requests. Which naming method can you use?()A
Only hostB
Only localC
Either host or localD
Both host and local
考题
单选题In any NAT (network address translation) configuration, what is the Inside Global IP address?()A
The summarized address for all internal subnetted addresses.B
A private IP address assigned to a host on the inside network.C
A registered address that represents an inside host to an outside network.D
A unique IP address used on an internal networkE
Non of the above
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
单选题Given the host IP address of 192.168.100.60 and a network mask of 255.255.255.224 (or /27), which address represents the correct network address for the referenced host?()A
192.168.100.48B
192.168.100.16C
192.168.100.0D
192.168.100.32
考题
多选题A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()AThe default gateway is configured on a different subnet form this host.BThe host is a member of the fifth usable subnet of the 192.168.16.0 network.CThe subnetwork address for this host is 192.168.16.160/28.DThe address of the next higher subnet is 192.168.16.192.EThe address of the router interface that is attached to this subnetwork is 192.168.16.190.FThere are 60 usable host addresses on this subnet.
热门标签
最新试卷