网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A receiving host computes the checksum on a frame and determines that the frame is damaged.The frame is then discarded.At which OSI layer did this happen?()
- A、session
- B、network
- C、physical
- D、data link
- E、transport
参考答案
更多 “A receiving host computes the checksum on a frame and determines that the frame is damaged.The frame is then discarded.At which OSI layer did this happen?()A、sessionB、networkC、physicalD、data linkE、transport” 相关考题
考题
2.I prefer _______ a small gift that has some thought behind it rather than some money.A. to receive; to gettingB. receiving; gettingC. to receive ; getD. receiving; get
考题
Every host and router on the Internet has an IP address, which encodes itsA.host numberB.host number and socketC.network numberD.host number and network number
考题
下列化合物哪一个存在共轭体系。()
A.CH-CH=CH2B.CH3-CH=CH-CH2-CH=CH2C.CH3-CH=CH-CH=CH2D.CH3-C≡C-CH3E.CH3-CH2- -CH3
考题
Every host and router on the Internet has an IP address, which encodes its(12).A.host numberB.network numberC.host number and socketD.host number and network number
考题
Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections.How many sessions exist between Host A and Host B?()A.1B.2C.3D.4
考题
By default, which IS-IS metric types does JUNOS software support?()
A. receiving of wide metrics onlyB. sending of narrow metrics onlyC. receiving of narrow metrics onlyD. sending and receiving of narrow and wide metrics
考题
A receiving host has failed to receive all of the segments that it should acknowledge.What can the host do to improve the reliability of this communication session?A.Start a new session using UDPB.Obtain a new IP address from the DHCP serverC.Use a different source port for the sessionD.Decrease the sequence numberE.Decrease the window size
考题
You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10
考题
A receiving host computes the checksum on a frame and determines that the frame is damaged.The frame is then discarded.At which OSI layer did this happen?()
A. sessionB. networkC. physicalD. data linkE. transport
考题
A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()
A. Drop the data.B. Send the data frames to the default gateway.C. Create an ARP request to get a MAC address for the receiving host.D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.
考题
The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()A.from host PC1 to host 5.1.1.10B.from host PC1 to host 5.1.3.10C.from host PC2 to host 5.1.2.10D.from host PC2 to host 5.1.3.8
考题
下列语句应将小写字母转换为大写字母,其中正确的是()。A、if(ch=’a’ch=’z’)ch=ch-32;B、if(ch=’a’ch=’z’)ch=ch-32;C、ch=(ch=’a’ch=’z’)?ch-32:’’;D、ch=(ch’a’ch’z’)?ch-32:ch;
考题
What is the Cisco IOS default behavior for switching from the shared tree to the shortest path tree in PIM-SM operations?()A、immediately after receiving the first packet on the shared tree for a given (S,G)B、after receiving over 1 kb/s traffic onthe shared tree for a given (S,G)C、10 seconds after receiving the first packet on the shared tree for a given (S,G)D、30 seconds after receiving the first packet on the shared tree for a given (S,G)E、after receiving over 10 kb/s traffic onthe shared tree for a given (S,G)
考题
In a Cisco Unified Computing System, What is the "designated receiver" port in end-host mode used for?()A、 Sending all broadcastsB、 Receiving all traffic from upstream switchesC、 Receiving broadcast trafficD、 Negotiating spanning tree with upstream switchesE、 Learning MAC addresses from upstream switches
考题
A host is expected to be a mail relay or receiving endpoint. Which of the following daemons should be listening for connections on port 25?()A、ftpdB、imapdC、pop3dD、sendmail
考题
接待来船拜访人员。()A、Receiving the person who comes on board to do their business.B、Receiving the persons who comes on board to visit.C、Receiving the persons who comes on board to do the job.D、Receiving the persons who comes on board to look around the ship.
考题
By default, which IS-IS metric types does JUNOS software support?()A、receiving of wide metrics onlyB、sending of narrow metrics onlyC、receiving of narrow metrics onlyD、sending and receiving of narrow and wide metrics
考题
单选题A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()A
Drop the data.B
Send the data frames to the default gateway.C
Create an ARP request to get a MAC address for the receiving host.D
Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.
考题
单选题Passengers can begin to earn Miles ______.A
if they reserve tickets at a hotelB
if they buy tickets at the airportC
before receiving the Permanent CardD
after receiving the Permanent Card
考题
单选题A receiving host computes the checksum on a frame and determines that the frame is damaged.Theframe is then discarded.At which OSI layer did this happen?()A
sessionB
networkC
physicalD
datalinkE
transport
考题
单选题In a Cisco Unified Computing System, What is the "designated receiver" port in end-host mode used for?()A
Sending all broadcastsB
Receiving all traffic from upstream switchesC
Receiving broadcast trafficD
Negotiating spanning tree with upstream switchesE
Learning MAC addresses from upstream switches
考题
单选题A receiving host computes the checksum on a frame and determines that the frame is damaged.The frame is then discarded.At which OSI layer did this happen?()A
sessionB
networkC
PhysicalD
data linkE
Transport
考题
单选题What is the Cisco IOS default behavior for switching from the shared tree to the shortest path tree in PIM-SM operations?()A
immediately after receiving the first packet on the shared tree for a given (S,G)B
after receiving over 1 kb/s traffic onthe shared tree for a given (S,G)C
10 seconds after receiving the first packet on the shared tree for a given (S,G)D
30 seconds after receiving the first packet on the shared tree for a given (S,G)E
after receiving over 10 kb/s traffic onthe shared tree for a given (S,G)
考题
单选题Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many sessions exist between Host A and Host B?()A
1B
2C
3D
4
热门标签
最新试卷