网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which fields are included in the TCP header? (Choose three).

A. Source Port

B. Acknowledgement Number

C. Request Number

D. Destination Address

E. Window

F. Data


参考答案

更多 “ Which fields are included in the TCP header? (Choose three).A. Source PortB. Acknowledgement NumberC. Request NumberD. Destination AddressE. WindowF. Data ” 相关考题
考题 Which two packet attributes contribute to the identification of a session? ()(Choose two.) A. destination portB. TTLC. IP optionsD. protocol number

考题 Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.) A. data integrityB. data confidentialityC. data authenticationD. outer IP header confidentialityE. outer IP header authentication

考题 In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.) A. IP protocolB. IP time-to-liveC. source and destination IP addressD. source and destination MAC addressE. source and destination TCP/UDP port

考题 Which two statements are true when source/destination filters are enabled? ()(Choose two.) A. Excluded traffic is not accelerated.B. Excluded traffic is only compressed.C. Source/destination filter applies to all traffic sent from LAN to WAN.D. Source/destination filters work in packet interception mode using RIPv2.

考题 An IPv6 host is configured to request a specific path through the network to reach a destination.Which IPv6 extension header should be used?() A. RoutingB. Hop-by-HopC. FragmentationD. Destination Options

考题 Which three of the following options are NOT fields found in an Ethernet frame?() A.VersionB.TypeC.Source PortD.FlagsE.Data

考题 Regarding PAR (Positive Acknowledgement and Re-transmission), which of the answer choices below are correct?() A. The source device will only retransmit lost packets on the request of the destination device.B. The source device starts a timer when it sends a segment and retransmits if an acknowledgment is not received before the timer expires.C. The destination device acknowledges receipt of a segment by sending a packet with a new sequence number and the ACK bit sent.D. The destination device acknowledges receipt of a segment by sending a packet that indicates the next sequence number it expects.E. If the destination device does not receive a segment, all segments are retransmitted.F. The source device keeps a record of all segments sent and expects and acknowledgment of each.

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?() A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address

考题 Although TCP segments differ from UDP segments, they both contain some common fields. What two segments do they share in common?() A. source addressB. optionsC. sequence numberD. sourcesE. destination portF. checksum

考题 What does a Layer 2 switch use to decide where to forward a received frame?() A. source MAC addressB. source IP addressC. source switch portD. destination IP addressE. destination port addressF. destination MAC address

考题 A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?() A. The source and destination addressesB. The destination port numberC. The destination addressD. The source addressE. All of the above

考题 Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?() A. source portB. output interfaceC. next-hop IP addressD. source MAC addressE. destination IP addressF. next-hop MAC address

考题 What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。 A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and destination MAC address

考题 Which of the following descriptions about IP spoofing is correct?()A、IP source address is forgedB、IP destination address is forgedC、IP TCP source port is forgedD、IP TCP destination port is forgedE、None of above

考题 Which fields are included in the TCP header?()A、Source PortB、Acknowledgement NumberC、Request NumberD、Destination AddressE、WindowF、Data

考题 What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address

考题 Server load balancing (SLB) is the process of deciding to which server a load-balancing device should send a client request for service. Which predictors are supported on ACE in order to select the best server to fulfill a client request? ()A、 Hash address: Selects the server by using a hash value based on either the source or destination IP address, or bothB、 Hash URL: Selects the server by using a hash value based on the requested URLC、 Hash MAC.Selects the server by using a hash value based on either the source or destination MAC address, or bothD、 Hash header: Selects the server by using a hash value based on the HTTP header nameE、 Hash IP: Selects the server using a hash value based on the IP address

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address

考题 In JUNOS Software, which three packet elements can be inspected to determine if asession already exists?()A、IP protocolB、IP time-to-liveC、source and destination IP addressD、source and destination MAC addressE、source and destination TCP/UDP port

考题 Which three of the following options are NOT fields found in an Ethernet frame?()A、VersionB、TypeC、Source PortD、FlagsE、Data

考题 In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)A、IP protocolB、IP time-to-liveC、source and destination IP addressD、source and destination MAC addressE、source and destination TCP/UDP port

考题 Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication

考题 Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication

考题 多选题Which fields are included in the TCP header?()ASource PortBAcknowledgement NumberCRequest NumberDDestination AddressEWindowFData

考题 多选题In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)AIP protocolBIP time-to-liveCsource and destination IP addressDsource and destination MAC addressEsource and destination TCP/UDP port

考题 单选题Which of the following descriptions about IP spoofing is correct?()A IP source address is forgedB IP destination address is forgedC IP TCP source port is forgedD IP TCP destination port is forgedE None of above

考题 单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()A source and destination MAC addressB source MAC address and destination network address onlyC source and destination network address onlyD source network address and destination MAC addressE source and destination MAC address and source and destination network address