网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()
- A、default gateway
- B、DNS servers
- C、FTP server
- D、helper address
- E、subnet mask
- F、TFTP server
参考答案
更多 “What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()A、default gatewayB、DNS serversC、FTP serverD、helper addressE、subnet maskF、TFTP server” 相关考题
考题
You configure your Windows 2000 Professional computer for Internet Connection Sharing and for TCP/IP filtering as shown in the exhibit.You test your TCP/IP filtering configuration from another client computer. You can access web sites, but you cannot access FTP sites.What should you do to be able to access FTP sites?A.Add Port 21 to the TCP Ports section.B.Add Port 138 to the TCP Ports section.C.Add Port 21 to the IP Ports section.D.Add Port 138 to the IP Ports section.
考题
Above is the output from show ip bgp neighbors command. What is line 21 stating about the BGP connection?()
A. the number of consecutive TCP connections to the specified remote neig hborB. the number of total TCP connections that the router hasC. the number of times the router has established a TCP connectionD. the number of neighbors that the router has
考题
关于TCP/IP协议的描述,哪些是正确的,()A. TCP是传输控制协议B.TCP/IP协议中只有TCP协议和IP协议C.IP是网络互联协议D.TCP/IP协议中除了TCP协议和IP协议外,还包括许多其他的协议
考题
The TCP/IP stack is a complete set of networking protocols.The OSI Model was meant to be a standardized way of connecting devices together,and most protocols have some direct correlation to the OSI Model.The OSI Model has 7 layers,the fourth layer is called______.A.physical layer
B.data link layer
C.application layer
D.transport layer
考题
What is the port number of an IPsec Encapsulating Security Payfoad packet?()A、UOP port 50B、IP protocol 51C、TCP port 51D、TCP port 50E、IP protocol 50F、UDP port51
考题
What is the port number of the IPsec Authentication Header packet?()A、IP protocol 50B、TCP port 51C、UDP port 50D、IP protocol 51E、UDP port 51F、TCP port 50
考题
What should you set the Client Configuration to when configuring the ODBC Data Source for the Database Subsystem?()A、TCP/IP B、Multiprotocol C、Named Pipes D、NWLink IPX/SPX
考题
In the context of MPLS,what is the correct action to be performed when an aggregate label is received ?()A、It adds the VPN label into the top label in the MPLS label stackB、It replaces the top label in the MPLS label stack with a VPN label and propagatesC、It replaces the bottom label in the MPLS label stack with a VPN label and propagatesD、It removes the top label in the MPLS label stack and does a Layer 3 lookup on underlying IP packetsE、None of above
考题
What is the action of "pop" in the context of MPLS switching?()A、It removes the top label in the MPLS label stack.B、It adds a top label in MPLS label stack.C、It replaces the top label in the MPLS label stack with another value.D、It replaces the top label in the MPLS label stack with a set of labels.E、None of above.
考题
计算机中,有关TCP/IP协议的操作包括()等部分。A、TCP/IP协议的安装B、TCP/IP协议的配置C、TCP/IP协议的纠错D、TCP/IP协议的删除E、TCP/IP协议安装的检测
考题
What is the port number of an IPsec Encapsulating Security Payload packet?()A、IP protocol 50B、IP protocol 51C、TCP port 50D、TCP port 51E、UDP port 50F、UDP port 51
考题
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configured.D、The PC has connectivity up to Layer 5 of the OSI model.E、The PC has the TCP/IP protocol stack correctly installed.
考题
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC.If a reply is received, what does this confirm?()A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configuredD、The PC has connectivity up to Layer 5 of the OSI modelE、The PC has the TCP/IP protocol stack correctly installed.
考题
Which of the following IP addresses would a technician ping to verify the integrity of the local TCP/IP stack?()A、10.0.0.1B、127.0.0.1C、169.254.0.1D、192.168.0.1
考题
What is required during the initial creation of a cluster?()A、 Nothing,because HACMP will discover the configurationB、 The cluster name and a TCP/IP path to each of the nodesC、 The cluster name and ID and a TCP/IP path to each of the nodesD、 The cluster name and ID node names and a TCP/IP path to each of the nodes
考题
单选题What is a benefit of Internet protocol (IP) telephony?()A
Synchronizes password exchanges for call setupB
Eliminates the need for physical cabling in a TCP/IP networkC
Enables two-way voice transmission over a packet-switched TCP/IP networkD
Creates an encrypted tunnel for voice through a Transmission Control Protocol (TCP)/IP network
考题
多选题What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()Adefault gatewayBDNS serversCFTP serverDhelper addressEsubnet maskFTFTP server
考题
单选题An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A
The PC has connectivity with a local host.B
The PC has connectivity with a Layer 3 device.C
The PC has a default gateway correctly configured.D
The PC has connectivity up to Layer 5 of the OSI model.E
The PC has the TCP/IP protocol stack correctly installed.
考题
单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()A
Source TCP portB
Source IP addressC
Destination TCP portD
Destination IP address
考题
多选题What are the four fields in an MPLS label?()AversionBexperimentalClabelDprotocolETTLFbottom-of-stack indicato
考题
单选题What is the action of "pop" in the context of MPLS switching?()A
It removes the top label in the MPLS label stack.B
It adds a top label in MPLS label stack.C
It replaces the top label in the MPLS label stack with another value.D
It replaces the top label in the MPLS label stack with a set of labels.E
None of above.
考题
单选题Your Company upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings to be the same as they were for the previously installed network adapter. When you restart eh computer, however, you cannot access the network. You try to ping your network adapter’s TCP/IP address locally. You receive the following error message. “Request timed out.” Next, you try to ping 127.0.0.1 and receive the same error message. What must you do?()A
Configure a different TCP/IP addressB
Enable DHCP in the TCP/IP propertiesC
Enable DNS in the TCP/IP propertiesD
Configure the network adapter to run at 100 Mbps onlyE
Replace the network adapter.
考题
单选题Which of the following IP addresses would a technician ping to verify the integrity of the local TCP/IP stack?()A
10.0.0.1B
127.0.0.1C
169.254.0.1D
192.168.0.1
考题
单选题In the context of MPLS,what is the correct action to be performed when an aggregate label is received ?()A
It adds the VPN label into the top label in the MPLS label stackB
It replaces the top label in the MPLS label stack with a VPN label and propagatesC
It replaces the bottom label in the MPLS label stack with a VPN label and propagatesD
It removes the top label in the MPLS label stack and does a Layer 3 lookup on underlying IP packetsE
None of above
考题
单选题What is required during the initial creation of a cluster?()A
Nothing,because HACMP will discover the configurationB
The cluster name and a TCP/IP path to each of the nodesC
The cluster name and ID and a TCP/IP path to each of the nodesD
The cluster name and ID node names and a TCP/IP path to each of the nodes
热门标签
最新试卷