网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following parameters can prevent packet fragmentation on routers when connecting to remote networks?()
A

mtu

B

sb-max

C

rfc1323

D

tcp_mssdflt


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following parameters can prevent packet fragmentation on routers when connecting to remote networks?()A mtuB sb-maxC rfc1323D tcp_mssdflt” 相关考题
考题 Which of the following parameters can prevent packet fragmentation on routers when connecting to remote networks?()A、mtuB、sb-maxC、rfc1323D、tcp_mssdflt

考题 Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()A、Spanning Tree ProtocolB、Shortest path first treeC、Link-state advertisements (LSA)D、Hold-down timersE、Split horizonF、VRP

考题 Routers perform which of the following functions?()A、Packet switchingB、Collision prevention on a LAN segment.C、Packet filteringD、Broadcast domain enlargementE、Broadcast forwardingF、Internetwork communication

考题 Which of the following characteristics applies only to OSPFv3 and not to OSPFv2?()A、Several processes can exist simultaneouslyB、Requires direct connectivity from the backbone area to all other areasC、Has the same packet typesD、Can support multiple subnets on a single linkE、Uses a hierarchical structure divided into areasF、Adjacencies formed with neighbors

考题 Which of the following ping parameters will set the size of the outgoing packet?()A、–cB、iC、RD、–s

考题 Which of the following solutions will detect and disable a rogue access point?()A、Port scanB、Packet snifferC、IPSD、IDS

考题 Which of the following is TRUE about the ping  -f command?()A、 It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the "f" in the command line. B、 It is useful for flooding from slow character based terminals since it only displays a dot "." for each packet sent in fast mode. C、 It is useful for flooding from slow character based terminals since it only displays a dot "."       for each packet sent and a backspace on returned in fast mode. D、 The command can only be run by root.

考题 A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall

考题 Which one of the following parameters will influence the GSL device utilization the most:()A、PILTIMERB、ALPHAC、CSPSPRIO

考题 Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)

考题 Which of the following describe router functions?()A、Packet switchingB、Collision prevention on a LAN segmentC、Packet filteringD、Broadcast domain enlargementE、Broadcast forwardingF、Internetwork communication

考题 Which of the following can help prevent data loss on a RAID array in the event of a power failure?()A、Using a RAID mirrorB、A battery backed write cacheC、Using RAID with parityD、A battery backed read cache

考题 Which of the following WAN protocols is a packet switching technology?()A、Frame RelayB、POTSC、PSTND、ISDN

考题 Which of the following commands should be used to tune parameters of devices that are displayed with lsattr?()A、 chdevB、 cfgmgrC、 vmtuneD、 schedtune

考题 Firewall filters can perform which two actions?()A、Log packet.B、Count packet.C、Set packet metric.D、Decrement packet TTL.E、Change destination IP address.

考题 多选题Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ

考题 单选题Which of the following can help prevent data loss on a RAID array in the event of a power failure?()A Using a RAID mirrorB A battery backed write cacheC Using RAID with parityD A battery backed read cache

考题 单选题It can be inferred that the term “public duty” (pra.2), in the context of the passage, means which of the following?A The necessity to apprehend perpetratorsB The responsibility to punish transgressorsC An obligation to prevent harm to anotherD The assignment of punishment for harmful action

考题 单选题Which of the following monitors a server to see which protocols might be in use?()A Ping sweepB Intrusion detection softwareC Port scannerD Wireless packet sniffer

考题 多选题To manually configure the SGA components using Oracle Enterprise Manager Memory Advisor, you can set values for which of the following initialization parameters?()ADB_CACHE_SIZEBSHARED_POOL_SIZECLARGE_POOL_SIZEDJAVA_POOL_SIZEESGA_MAX_SIZEFSORT_AREA_SIZE

考题 单选题Which of the following is TRUE about the ping  -f command?()A  It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the f in the command line. B  It is useful for flooding from slow character based terminals since it only displays a dot . for each packet sent in fast mode. C  It is useful for flooding from slow character based terminals since it only displays a dot .       for each packet sent and a backspace on returned in fast mode. D  The command can only be run by root.

考题 多选题When configuring the messaging system, which of the following are parameters of the e-mail transport? ()ALocationBProtocolCModeDWeb AddressEHost

考题 多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP

考题 多选题Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ

考题 单选题Which of the following type of packets can easily be filtered with a stateful packet filter by enforcing the context or state of the request?以下那个协议很容易的根据请求状态或者环境被状态包过滤设备进行过滤?()A TCPB UDPC IPD ICMP

考题 多选题Firewall filters can perform which two actions?()ALog packet.BCount packet.CSet packet metric.DDecrement packet TTL.EChange destination IP address.

考题 单选题Which of the following ping parameters will set the size of the outgoing packet?()A –cB iC RD –s