网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
The monitor traffic command closely resembles which UNIX-based utility?()
A
ps -x
B
passwd
C
ls -a-l
D
tcpdump
参考答案
参考解析
解析:
暂无解析
更多 “单选题The monitor traffic command closely resembles which UNIX-based utility?()A ps -xB passwdC ls -a-lD tcpdump” 相关考题
考题
When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()
A. snoopB. tcpdumpC. monitorD. tail
考题
Which command would you use to view interface usage details in real time?()
A. show interfaces terseB. show interfaces extensiveC. monitor interface trafficD. monitor traffic interface
考题
The monitor traffic command provides access to which utility?()
A.tcpdumpB.telnetC.tracerouteD.netstat
考题
Which command allows you to decode packets in JUNOS?()
A.debug packet interface-nameB.show interface extensiveC.traceoptions interface-nameD.monitor traffic interface interface-name
考题
The monitor traffic command closely resembles which UNIX-based utility?()
A.ps -xB.passwdC.ls -a-lD.tcpdump
考题
Which CLI command displays packet and byte counts for an interface in real-time?()
A.monitor trafficB.show interfacesC.monitor interfaceD.show traffic counts
考题
Which command should be used to capture network traffic between the localhost and a host named ‘webserver’?()
A.tcpdump webserverB.tcpdump host webserverC.tcpdump -hostname webserverD.tcpdump -print -h webserver
考题
You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()
A. It resembles a Layer 2 bridge.B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C. Inline interfaces which have no IP addresses cannot be detected.D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
考题
Which two of these are characteristics of an IDS sensor?()A、passively listens to network trafficB、is an active device in the traffic pathC、has a permissive interface that is used to monitor networksD、traffic arrives on one IDS interface and exits on anotherE、has a promiscuous interface that is used to monitor the network
考题
Which command sequence shows traffic per queue for an interface?()A、show interfaces queue ge-0/0/0B、show statistics queue detailC、show interfaces ge-0/0/0 statistics extensiveD、monitor interface ge-0/0/0 queue
考题
The monitor traffic command closely resembles which UNIX-based utility?()A、ps -xB、passwdC、ls -a-lD、tcpdump
考题
Which command should be used to capture network traffic between the localhost and a host named ‘webserver’?()A、tcpdump webserverB、tcpdump host webserverC、tcpdump -hostname webserverD、tcpdump -print -h webserver
考题
An administrator is evaluating an application for application monitoring. What command should be Used to determine if the application can be monitored with a process monitor?() A、 pa auxB、 ps -elC、 ps -efD、 ps -pl
考题
Which command would you use to view interface usage details in real time?()A、show interfaces terseB、show interfaces extensiveC、monitor interface trafficD、monitor traffic interface
考题
The monitor traffic command provides access to which utility?()A、tcpdumpB、telnetC、tracerouteD、netstat
考题
When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()A、snoopB、tcpdumpC、monitorD、tail
考题
Which command allows you to decode packets in JUNOS?()A、debug packet interface-nameB、show interface extensiveC、traceoptions interface-nameD、monitor traffic interface interface-name
考题
Which CLI command displays packet and byte counts for an interface in real-time?()A、monitor trafficB、show interfacesC、monitor interfaceD、show traffic counts
考题
多选题You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()AIt resembles a Layer 2 bridge.BTraffic flow through the IPS resembles traffic flow through a Layer 3 router.CInline interfaces which have no IP addresses cannot be detected.DMalicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
考题
单选题Which of the following most closely represents an image copy? ()A
Unix cp command of a fileB
Bit-by-bit copy of a fileC
Windows COPY command of a file D
All of the above
考题
单选题An administrator is evaluating an application for application monitoring. What command should be Used to determine if the application can be monitored with a process monitor?()A
pa auxB
ps -elC
ps -efD
ps -pl
考题
单选题The monitor traffic command provides access to which utility?()A
tcpdumpB
telnetC
tracerouteD
netstat
考题
单选题Which utility is used to assign a flow of data to a traffic class?()A
ip profileB
policy-listC
classifier-listD
rate-limit-profile
考题
单选题When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()A
snoopB
tcpdumpC
monitorD
tail
考题
单选题An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A
HubB
BridgeC
SwitchD
Router
考题
单选题Which of the following is the BEST reason to implement a firewall on a server?()A
To watch for bandwidth issuesB
To protect the server from all trafficC
To block certain traffic by portsD
To monitor certain malicious traffic
考题
单选题Which IOS command shows the detailed error report?()A
errpt -A B
errpt -a C
errlog -a D
errlog -ls
热门标签
最新试卷