网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The monitor traffic command closely resembles which UNIX-based utility?()
A

ps -x

B

passwd

C

ls -a-l

D

tcpdump


参考答案

参考解析
解析: 暂无解析
更多 “单选题The monitor traffic command closely resembles which UNIX-based utility?()A ps -xB passwdC ls -a-lD tcpdump” 相关考题
考题 When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?() A. snoopB. tcpdumpC. monitorD. tail

考题 Which command would you use to view interface usage details in real time?() A. show interfaces terseB. show interfaces extensiveC. monitor interface trafficD. monitor traffic interface

考题 The monitor traffic command provides access to which utility?() A.tcpdumpB.telnetC.tracerouteD.netstat

考题 Which command allows you to decode packets in JUNOS?() A.debug packet interface-nameB.show interface extensiveC.traceoptions interface-nameD.monitor traffic interface interface-name

考题 The monitor traffic command closely resembles which UNIX-based utility?() A.ps -xB.passwdC.ls -a-lD.tcpdump

考题 Which CLI command displays packet and byte counts for an interface in real-time?() A.monitor trafficB.show interfacesC.monitor interfaceD.show traffic counts

考题 Which command should be used to capture network traffic between the localhost and a host named ‘webserver’?() A.tcpdump webserverB.tcpdump host webserverC.tcpdump -hostname webserverD.tcpdump -print -h webserver

考题 You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device() A. It resembles a Layer 2 bridge.B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C. Inline interfaces which have no IP addresses cannot be detected.D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

考题 Which two of these are characteristics of an IDS sensor?()A、passively listens to network trafficB、is an active device in the traffic pathC、has a permissive interface that is used to monitor networksD、traffic arrives on one IDS interface and exits on anotherE、has a promiscuous interface that is used to monitor the network

考题 Which command sequence shows traffic per queue for an interface?()A、show interfaces queue ge-0/0/0B、show statistics queue detailC、show interfaces ge-0/0/0 statistics extensiveD、monitor interface ge-0/0/0 queue

考题 The monitor traffic command closely resembles which UNIX-based utility?()A、ps -xB、passwdC、ls -a-lD、tcpdump

考题 Which command should be used to capture network traffic between the localhost and a host named ‘webserver’?()A、tcpdump webserverB、tcpdump host webserverC、tcpdump -hostname webserverD、tcpdump -print -h webserver

考题 An administrator is evaluating an application for application monitoring. What command should be  Used to determine if the application can be monitored with a process monitor?()  A、 pa auxB、 ps -elC、 ps -efD、 ps -pl

考题 Which command would you use to view interface usage details in real time?()A、show interfaces terseB、show interfaces extensiveC、monitor interface trafficD、monitor traffic interface

考题 The monitor traffic command provides access to which utility?()A、tcpdumpB、telnetC、tracerouteD、netstat

考题 When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()A、snoopB、tcpdumpC、monitorD、tail

考题 Which command allows you to decode packets in JUNOS?()A、debug packet interface-nameB、show interface extensiveC、traceoptions interface-nameD、monitor traffic interface interface-name

考题 Which CLI command displays packet and byte counts for an interface in real-time?()A、monitor trafficB、show interfacesC、monitor interfaceD、show traffic counts

考题 多选题You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()AIt resembles a Layer 2 bridge.BTraffic flow through the IPS resembles traffic flow through a Layer 3 router.CInline interfaces which have no IP addresses cannot be detected.DMalicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

考题 单选题Which of the following most closely represents an image copy? ()A Unix cp command of a fileB Bit-by-bit copy of a fileC Windows COPY command of a file D All of the above

考题 单选题An administrator is evaluating an application for application monitoring. What command should be  Used to determine if the application can be monitored with a process monitor?()A  pa auxB  ps -elC  ps -efD  ps -pl

考题 单选题The monitor traffic command provides access to which utility?()A tcpdumpB telnetC tracerouteD netstat

考题 单选题Which utility is used to assign a flow of data to a traffic class?()A ip profileB policy-listC classifier-listD rate-limit-profile

考题 单选题When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()A snoopB tcpdumpC monitorD tail

考题 单选题An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A HubB BridgeC SwitchD Router

考题 单选题Which of the following is the BEST reason to implement a firewall on a server?()A To watch for bandwidth issuesB To protect the server from all trafficC To block certain traffic by portsD To monitor certain malicious traffic

考题 单选题Which IOS command shows the detailed error report?()A errpt -A B errpt -a C errlog -a D errlog -ls