网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which of the following is used to identify active hosts along with their network addresses?()
- A、Port scan
- B、Ping sweep
- C、IDS
- D、NIPS
参考答案
更多 “Which of the following is used to identify active hosts along with their network addresses?()A、Port scanB、Ping sweepC、IDSD、NIPS” 相关考题
考题
Which of the following features would hide internal IP addresses from the Internet?()
A. Network Address TranslationB. Port forwardingC. Quality of ServiceD. SSID broadcast
考题
Which of the following is used to identify active hosts along with their network addresses?()
A.Port scanB.Ping sweepC.IDSD.NIPS
考题
Which of the following answers are correct characteristics of microsegmentation, in the context of a Local Area Network (LAN)?()
A. Dedicated paths between sending and receiving hosts are established.B. Multiple subnetwork broadcast addresses are created.C. Multiple ARP tables are needed.D. The decrease in the number of collision domains.E. Broadcast domains are enhanced.F. Additional bandwidth is used to connect hosts.
考题
Which of the following IP addresses for the network 27.35.16.32/28 can be assigned to hosts?()
A.27.35.16.32B.27.35.16.33C.27.35.16.48D.27.35.16.47E.27.35.16.45F.27.35.16.44
考题
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
A.15.234.118.63B.92.11.178.93C.134.178.18.56D.192.168.16.87E.201.45.116.159F.217.63.12.192
考题
Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ
考题
Which of the following solutions will detect and disable a rogue access point?()A、Port scanB、Packet snifferC、IPSD、IDS
考题
Which of the following features would hide internal IP addresses from the Internet?()A、Network Address TranslationB、Port forwardingC、Quality of ServiceD、SSID broadcast
考题
A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network. Which of the following options is the most probable cause?()A、A large FTP job is in process. B、A network interface was misconfigured. C、The ping command is being used excessively. D、A bad network interface card and/or network cable is in use.
考题
Which of the following commands should be used to list all of the active network interfaces on a system?()A、lscfgB、routeC、netstatD、entstat
考题
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode
考题
When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()A、The type of application used on the networkB、The type of system bus used by the computersC、The type of memory installed in each computerD、The type of media used in the network topologyE、The type of protocols used in the networkF、The physical layout of the network hosts
考题
Which of the following analyzes the entire subnet to identify all hosts that are active?()A、Ping sweepB、Packet snifferC、TracerouteD、Port scanner
考题
Which of the following tools can be used to identify the location of a network outage?()A、tracerouteB、netstatC、nslookupD、ping
考题
Which of the following is used to produce the best LCD image on a laptop?()A、Dual scanB、Active matrixC、Passive matrixD、Active scanning
考题
Which of the following commands should be used to identify packet sequence problems?()A、 ping and arpB、 lsattr and ifconfigC、 netstat and iostatD、 iptrace and tcpdump
考题
What is the purpose of a network mask?()A、It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB、It is used to define which parts of the IP address are allocated to host addresses and network prefixesC、It is used to hide subnets from external networks by masking the subnets with NATD、It is used to differentiate a network as a classful network or a classless network
考题
You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm. Immediately send a notification to a network administrator that the infected computer needs to be repaired. What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.
考题
单选题Which of the following tools can be used to identify the location of a network outage?()A
tracerouteB
netstatC
nslookupD
ping
考题
多选题Which of the following IP addresses for the network 27.35.16.32/28 can be assigned to hosts?()A27.35.16.32B27.35.16.33C27.35.16.48D27.35.16.47E27.35.16.45F27.35.16.44
考题
单选题Which of the following analyzes the entire subnet to identify all hosts that are active?()A
Ping sweepB
Packet snifferC
TracerouteD
Port scanner
考题
单选题Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()A
CDPB
SNMPC
DHCPD
ARPE
DNSF
None of the above
考题
单选题Which of the following commands should be used to identify packet sequence problems?()A
ping and arpB
lsattr and ifconfigC
netstat and iostatD
iptrace and tcpdump
考题
单选题Which of the following is used to identify active hosts along with their network addresses?()A
Port scanB
Ping sweepC
IDSD
NIPS
考题
单选题What is the purpose of a network mask?()A
It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB
It is used to define which parts of the IP address are allocated to host addresses and network prefixesC
It is used to hide subnets from external networks by masking the subnets with NATD
It is used to differentiate a network as a classful network or a classless network
考题
单选题A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network. Which of the following options is the most probable cause?()A
A large FTP job is in process. B
A network interface was misconfigured. C
The ping command is being used excessively. D
A bad network interface card and/or network cable is in use.
考题
多选题Which of the following answers are correct characteristics of microsegmentation, in the context of a Local Area Network (LAN)?()ADedicated paths between sending and receiving hosts are established.BMultiple subnetwork broadcast addresses are created.CMultiple ARP tables are needed.DThe decrease in the number of collision domains.EBroadcast domains are enhanced.FAdditional bandwidth is used to connect hosts.
热门标签
最新试卷