网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following commands indicates the packet count for each interface?()
A

lsattr

B

route

C

netstat

D

ifconfig


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following commands indicates the packet count for each interface?()A lsattrB routeC netstatD ifconfig” 相关考题
考题 Which of the following indicates a more polite request or invitation

考题 Which of the following is TRUE about the ping  -f command?()A、 It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the "f" in the command line. B、 It is useful for flooding from slow character based terminals since it only displays a dot "." for each packet sent in fast mode. C、 It is useful for flooding from slow character based terminals since it only displays a dot "."       for each packet sent and a backspace on returned in fast mode. D、 The command can only be run by root.

考题 Which of the following commands provides data plane information required to forward a packet toa specific ip address?()A、sh ip routeB、sh ip cef 〈ip_address〉C、sh adjacency 〈ip_address〉D、sh ip route 〈ip_addres$〉E、sh ip adjacency 〈/p_address〉F、sh ip cef 〈mac_addrQss〉〈ip_address〉

考题 Which of the following describe router functions?()A、Packet switchingB、Collision prevention on a LAN segmentC、Packet filteringD、Broadcast domain enlargementE、Broadcast forwardingF、Internetwork communication

考题 Which of the following WAN protocols is a packet switching technology?()A、Frame RelayB、POTSC、PSTND、ISDN

考题 Which of the following commands will make a new directory?()A、cdB、mdC、dirD、rd

考题 Which of the following commands is used to delete an empty directory?()A、RDB、EDITC、DIRD、FORMAT

考题 Which of the following commands will be run at a command prompt to determine which WindowsOS is running on the computer?()A、VERB、Device ManagerC、VERIFYD、SET

考题 Which of the following kdb commands is used to obtain a stack trace from a dump? ()A、 trb B、 his C、 f D、 trace

考题 Following a system boot,the display indicates that previously detected hardware is missing.  Which of the following commands would identify the missing hardware?()A、diagB、lscfgC、cfgmgrD、lsslot

考题 Which of the following commands should be used to identify packet sequence problems?()A、 ping and arpB、 lsattr and ifconfigC、 netstat and iostatD、 iptrace and tcpdump

考题 Which of the following commands should be used to watch system errors as they are logged?()A、 errpt -cB、 tail -f /var/adm/ras/errlogC、 syslogd -dD、 /usr/lib/errdemon -s 8192

考题 Which of the following commands indicates the packet count for each interface?()A、lsattrB、routeC、netstatD、ifconfig

考题 A disk contains several logical volumes.  Which of the following commands indicates how much data is read from or written to a particular logical volume on the same disk?()A、 sar B、 iostat C、 svmon D、 filemon

考题 Which of the following commands gathers network packet statistics?()A、netstat -iB、ifconfig -aC、errpt -aD、iptrace -i

考题 Which of the following commands would a system administrator run tovalidate /etc/tunables/nextboot after manually editing()A、ksh -n nextbootB、tunsave -a -f nextbootC、tuncheck -r -f nextbootD、tunsave nextboot

考题 Which of the following commands indicates the available state of a physical adapter?()A、lscfgB、lsdevC、netstatD、ifconfig

考题 Firewall filters can perform which two actions?()A、Log packet.B、Count packet.C、Set packet metric.D、Decrement packet TTL.E、Change destination IP address.

考题 Firewall filters can perform which two actions?()A、Log packets.B、Set packet metrics.C、Count packets.D、Decrement packet's TTL value.

考题 单选题A disk contains several logical volumes.  Which of the following commands indicates how much data is read from or written to a particular logical volume on the same disk?()A  sar B  iostat C  svmon D  filemon

考题 单选题Which CLI command will ping destination 10.0.29.1 ten times and display the incoming interface of the received packet?()A ping count 10 10.0.29.1 detailB ping number 10 10.0.29.1 detailC ping count 10 10.0.29.1 extensiveD ping number 10 10.0.29.1 extensive

考题 单选题A user suspects that a recently installed program overwrote a Windows system file on the computer. Which of the following commands could be run to check and verify the system files?()A system /vB winnt /sC sfc /scannowD chkdsk /f

考题 单选题Which of the following is TRUE about the ping  -f command?()A  It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the f in the command line. B  It is useful for flooding from slow character based terminals since it only displays a dot . for each packet sent in fast mode. C  It is useful for flooding from slow character based terminals since it only displays a dot .       for each packet sent and a backspace on returned in fast mode. D  The command can only be run by root.

考题 单选题Which of the following kdb commands is used to obtain a stack trace from a dump? ()A  trb B  his C  f D  trace

考题 单选题Which of the following commands should be used to watch system errors as they are logged?()A  errpt -cB  tail -f /var/adm/ras/errlogC  syslogd -dD  /usr/lib/errdemon -s 8192

考题 单选题Which of the following commands should be used to identify packet sequence problems?()A  ping and arpB  lsattr and ifconfigC  netstat and iostatD  iptrace and tcpdump

考题 单选题Which of the following indicates a grave and imminent danger requesting immediate assistance on radio telephone?().A SOSB MaydayC SecuriteD PAN

考题 单选题Which of the following commands indicates when an interface has a multicast capability?()A lsdevB lsattrC netstatD ifconfig