网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

When files are transferred between a host and an FTP server, the data is divided into smaller pieces for transmission. As these pieces arrive at the destination host, they must be reassembled to reconstruct the original file. What provides for the reassembly of these pieces into the correct order?

A.The sequence number in the TCP header

B.The Start Frame. Delimiter in the 802.3 Preamble

C.The TTL in the IP header

D.The acknowledgement number in the segment header

E.The frame. check sequence in the Ethernet frame. trailer


参考答案

更多 “ When files are transferred between a host and an FTP server, the data is divided into smaller pieces for transmission. As these pieces arrive at the destination host, they must be reassembled to reconstruct the original file. What provides for the reassembly of these pieces into the correct order?A.The sequence number in the TCP headerB.The Start Frame. Delimiter in the 802.3 PreambleC.The TTL in the IP headerD.The acknowledgement number in the segment headerE.The frame. check sequence in the Ethernet frame. trailer ” 相关考题
考题 What is true about the functions provided by a DHCP Relay Proxy over the DHCP Relay agent?() A. Monitors and manages leases.B. Creates host route dynamically after address assignment.C. Provides an IP address from a pool.D. Must be on same subnet as DHCP server

考题 What two situations could require the use of multiple routing protocols? () A. when all equipment is manufactured by CiscoB. when there are multiple paths to destination networksC. because having multiple routing protocols confuses hackersD. when migrating from an older Interior Gateway Protocol (IGP) to a new IGPE. when using UNIX host - based routersF. when smaller broadcast domains are desired

考题 A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A. applicationB. presentationC. sessionD. transportE. internetF. data link

考题 A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework A. applicationB. presentationC. sessionD. transportE. internetF. data link

考题 When a host transmits data across a network to another host, which process does the data go through?() A.standardizationB.conversionC.encapsulationD.synchronization

考题 How dose a DHCP server dynamically assign IP address to host?() A.Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.B.Addresses are assigned for a fixed period of time.At the end of period,a newquest for an address must be made,and another address is then assigned.C.Addresses are leased to host.A host will usually keep the same address by periodically contacting the DHCP sever to renew the lease.D.Addresses are permanently assigned so that the host uses the same address at all times.

考题 A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。 A.10.10.0.1B.10.10.0.2C.199.99.9.33D.199.99.9.57E.200.2.2.17F.200.2.2.18

考题 In low-speed network,it is usually adequate to wait for congestion to occur and then react to it by telling the source of packets to slow down.In high-speed networks,this approach often works poorly,because in the(71)between sending the notification and notification arriving at the source,thousands of additional(72)may arrive.In ATM network,a major tool for preventing(73)is(74)control.When a host wants a new virtual(75),it must describe the traffic to be offered and the service expected.A.packets B.cells C.message D.files

考题 A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()A、Drop the data.B、Send the data frames to the default gateway.C、Create an ARP request to get a MAC address for the receiving host.D、Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

考题 What two situations could require the use of multiple routing protocols? ()A、when all equipment is manufactured by CiscoB、when there are multiple paths to destination networksC、because having multiple routing protocols confuses hackersD、when migrating from an older Interior Gateway Protocol (IGP) to a new IGPE、when using UNIX host - based routersF、when smaller broadcast domains are desired

考题 Your company has an Active Directory Domain S ervices (AD DS) domain. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You have the following requirements: H Local devices from remote desktop clients must be redirected to the RD Session Host server . H USB devices from remote desktop clients must not be redirected to the RD Session Host server . What should you do?()A、Disable drive redirection on the remote desktop clients.B、Disable drive redirection on the RD Session Host server.C、Enable the Prevent installation of removable devices Group Policy setting on the remote desktop clients.D、Enable the Prevent installation of removable devices Group Policy setting on the RD Session Host server.

考题 A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()A、applicationB、presentationC、sessionD、transportE、internetF、data link

考题 When a host transmits data across a network to another host, which process does the data go through?()A、standardizationB、conversionC、encapsulationD、synchronization

考题 What is true about the functions provided by a DHCP Relay Proxy over the DHCP Relay agent?()A、Monitors and manages leases.B、Creates host route dynamically after address assignment.C、Provides an IP address from a pool.D、Must be on same subnet as DHCP server

考题 If you create your database using Oracle Managed Files (OMF), what is true?()A、You must use Oracle predefined names to identify raw partitions that will hold OMF structures. B、You must define directories for two online redo log groups and three copies of the control file. C、If your CREATE DATABASE command fails, any OMF database files that have already been created will be dropped automatically. D、You must use only OMF data files when adding new tablespaces or data files to your database in the future.

考题 Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. All client computers run Windows 7. You need to ensure that the current Libraries from users’ computers are available when they log on to the RD Session Host server. What should you do?()A、Redirect each userˉs Documents folder to a network shareB、Redirect each userˉs Links folder to the RD Session Host serverC、Use a startup script to copy .library-ms files from the client computers to the RD Session Host server.D、Use Group Policy Preferences to copy .library-ms files from the client computers to the RD Session Host server.

考题 Your company has an Active Directory Domain Services (AD DS) domain. You inst all the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. All client computers run Windows 7. You need to ensure that the current Libraries from users computers are avail able when they logon to the RD Session Host server. What should you do?()A、Redirect each user ’s Docu ment s f ol der t o a net work shar eB、Redirect each user ’s Li nks f ol der t o t he RD Sessi on Host serverC、Use a startup script to copy .library - ms files from the client computers to the RD S ession Host server.D、Use Group Policy Preferences to copy .library - ms files from the client computers to the RD Session Host server.

考题 You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1.You find that only some of the captured frames display host mnemonic names in the Source column and the Destination column. All other frames display IP addresses.You need to display mnemonic host names instead of IP addresses for all the frames. What should you do? ()A、Create a new display filter and apply the filter to the capture.B、Create a new capture filter and apply the filter to the capture.C、Populate the Aliases table and apply the aliases to the capture.D、Configure the Network Monitor application to enable the Enable Conversations option. Recapture the data to a new file.

考题 You deploy a Hyper-V host and you convert the Web servers to VMs. You discover that when users transfer large data files from the Web servers, the CPU utilization of the host exceeds acceptable limits. You need to recommend a solution to reduce the CPU utilization associated to network traffic. The solution must meet the company’s business requirements. What should you recommend implementing?()A、Two network cards that support network adapter teamingB、A network card that supports Virtual Machine ChimneyC、An additional Hyper-V host and Network Load Balancing (NLB)D、An additional Hyper-V host and Failover Clustering

考题 Your comp any runs Remote Desktop Services on Windows Server 2008. You have a Remote Desktop Session Host (RD Session Host) server. You plan to install an application on the RD Session Host server by running a setup.exe file. You need to ensure that the application will install properly and be useable by all users on the RD Session Host server. What should you do first on the RD Session Host server?()A、Run the Changeuser /install command.B、Run the Changeuser /execute command.C、Set the Remote Desktop licensing mode t o RDS Per User CAL.D、Set the Remote Desktop licensing mode to RDS Per Device CAL.

考题 Your company has an Active Directory Domain Services (AD DS) domain. You inst all the Remote Desktop Session Host (RD Session Host) role service on a server that runs Windows Server 2008 R2. All client computers run Windows 7. You need to ensure that the current Libraries from usersˉ co mput ers ar e avail abl e when t hey l og on t o t he R D Session Host server. What should you do?()A、Redirect each user ¯s Docu ment s f ol der t o a net work shar eB、Redirect each user ¯s Li nks f ol der t o t he RD Sessi on Host serverC、Use a startup script to copy .library - ms files from the client computers to the RD S ession Host server.D、Use Group Policy Preferences to copy .library - ms files from the client computers to the RD Session Host server.

考题 You perform a security audit on a server named Server1. You install the Microsoft Network Monitor 3.0 application on Server1. You find taht only some of the captured frames dsplay host mnemonic names in the Source column and the Destination column. All other frames display IP addresses. You need to display mnemonic host names instead of IP addresses for all the frames what should you do?()A、 Create a new display filter and apply the filter to the captureB、 Create a new capture filter and apply the filter to the captureC、 Populate the Aliases table and apply the aliases to the captureD、 Configure the Network Monitor Application to enable the Enable Converstations optionrecapture the data to a new file.

考题 You install the FTP role service on a server that runs Windows Server 2008. Users receive an errormessage when they attempt to upload files to the FTP site.  You need to allow authenticated users to upload files to the FTP site. What should you do?()A、Run the ftp Ca 192.168.1.200 command on the server that runs Windows Server 2008.B、Run the appcmd unlock config command on the server that runs Windows Server 2008.C、Configure Write permissions on the FTP site. Configure the NTFS permissions on the FTP destination folder for the Authenticated Users group to Allow - Modify.D、Configure Write permissions on the FTP site. Configure the NTFS permissions on the FTP destination folder for the Authenticated Users group to Allow C Write attributes.

考题 单选题Refer to the exhibit。A problem with network connectivity has been observed.It is suspected that the cable connected to switch port Fa0/9 on Switch 1 disconnected.What would be an effect of tis cable being disconnected?()A Host B would not be able to access the server in VLAN9 until the cable is reconnectedB For less than a minute ,Host B would not be able to access the server in VLAN9.Then normal network function would resume.C Communication between VLAN3 and the other VLANs would be disabledD The transfer of files from Host B to the server in VLAN9 would be significantly slower.