网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A host is expected to be a mail relay or receiving endpoint. Which of the following daemons should be listening for connections on port 25?()
- A、ftpd
- B、imapd
- C、pop3d
- D、sendmail
参考答案
更多 “A host is expected to be a mail relay or receiving endpoint. Which of the following daemons should be listening for connections on port 25?()A、ftpdB、imapdC、pop3dD、sendmail” 相关考题
考题
● Every host and router on the Internet has an IP address,which encodes its (69) .(69) A.host numberB.host number and socketC.network numberD.host number and network number
考题
哪个ACL可允许主机10.220.158.10访问web服务器192.168.3.244()A.access-list 101 permit tcp host 10.220.158.10 eq 80 host 192.168.3.224B.access-list 101 permit tcp 10.220.158.10 0.0.0.0 host 192.168.3.224 0.0.0.0 eq 80C.access-list 101 permit host 10.220.158.10 0.0.0.0 host 192.168.3.224 0.0.0.0 eq 80D.access-list 101 permit tcp 10.220.158.10 0.0.0.0 host 192.168.3.224 eq 80
考题
There are 2 switches in the Ezonexam LAN, with no routers. Ports 1, 2 3 are assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link. Which of the conditions below would verify trunk and VLAN operation? (Select all valid answers)A.Host 1 on VLAN 1 can ping Host 2 on VLAN 1B.Host 1 on VLAN 1 can ping Host 4 on VLAN 2C.Host 1 on VLAN 1 can not ping Host 2 on VLAN 1D.Host 4 on VLAN 2 can not ping Host 1 on VLAN 1E.Host 4 on VLAN 2 can ping Host 2 on VLAN 2
考题
Every host and router on the Internet has an IP address, which encodes itsA.host numberB.host number and socketC.network numberD.host number and network number
考题
Every host and router on the Internet has an IP address, which encodes its(12).A.host numberB.network numberC.host number and socketD.host number and network number
考题
Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections.How many sessions exist between Host A and Host B?()A.1B.2C.3D.4
考题
Click the Exhibit button.A user logs in, is assigned the default role, and successfully loads the Host Enforcer policies shown in the exhibit.Which three statements are true? ()
A. The local host will respond to ICMP echo-request packets from 192.168.53.10.B. The local host will respond to UDP port 53 requests from 192.168.1.25.C. The local host can send any packet of any type to host 172.16.1.1.D. The local host will accept any packet of any type from host 172.16.1.1.E. The local host can send packets to UDP port512 on server 192.168.53.10.
考题
You would like to configure your PC’s IP address of 10.10.0.156 as an FTP host with au ser name of user anda password of mypass.Which configuration command accomplishes this goal?()
A.host userpc 10.10.0.156 ftp usermypassB.host userpc 10.10.0.156 tftp usermypassC.host nameuserpc 10.10.0.156 ftp usermypassD.host nameuserpc 10.10.0.156 tftp usermypass
考题
Which naming convention is used by Juniper Routers when archiving their configurations to a remote server?()
A.yyyymmdd_HHMMSS_host-name_juniper.conf.gzB.host-name_juniper.conf.gz_yyyymmdd_HHMMSSC.yyyymmdd_HHMMSS_host-name_juniper.confD.host-name_juniper.conf_yyyymmdd_HHMMSS
考题
URL是万维网的网页的地址,它的地址排列格式为( )
A Scheme://host:port/pathB host:// Scheme:port/pathC host:// Scheme: path/ portD Scheme://host: path/ port
考题
There are 2 switches in the Testking LAN, with no routers. Ports 1, 2 3 are assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link.Which of the conditions below would verify trunk and VLAN operation?()A. Host 1 on VLAN 1 can ping Host 2 on VLAN 1B. Host 1 on VLAN 1 can ping Host 4 on VLAN 2C. Host 1 on VLAN 1 can not ping Host 2 on VLAN 1D. Host 4 on VLAN 2 can not ping Host 1 on VLAN 1E. Host 4 on VLAN 2 can ping Host 2 on VLAN 2
考题
You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10
考题
The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()A.from host PC1 to host 5.1.1.10B.from host PC1 to host 5.1.3.10C.from host PC2 to host 5.1.2.10D.from host PC2 to host 5.1.3.8
考题
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()A、The default gateway is configured on a different subnet form this host.B、The host is a member of the fifth usable subnet of the 192.168.16.0 network.C、The subnetwork address for this host is 192.168.16.160/28.D、The address of the next higher subnet is 192.168.16.192.E、The address of the router interface that is attached to this subnetwork is 192.168.16.190.F、There are 60 usable host addresses on this subnet.
考题
Which profile configuration command dynamically creates a host route in the routing table?()A、ip host routesB、ip access-routesC、host routes enabledD、access-routes enabled
考题
What happens when Host Checker is configured to perform checks every "0" minutes? ()A、Host Checker is disabled.B、Host Checker will perform continous checks.C、Host Checker will perform checks when user logs out.D、Host Checker will perform checks when user first logs in.
考题
DHCP代表什么?()A、Dynamic Host Configuration ProtocolB、Dynamic Hosting Configuration ProtocolC、Dynamlc Host Computer ProtocolD、Dynamic Host Computer Port
考题
The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()A、The local and the remote host must have Transmission Control Protocol/Internet Protocol (TCP/IP) installed and configured. B、The remote host must support NFS. C、The remote host must have an NFS exported directory defined such that the local host has read and write permissions to the dump file on the remote host. D、The remote host can be the same as the local host.
考题
You would like to configure your PC’s IP address of 10.10.0.156 as an FTP host with au ser name of user anda password of mypass.Which configuration command accomplishes this goal?()A、host userpc 10.10.0.156 ftp usermypassB、host userpc 10.10.0.156 tftp usermypassC、host nameuserpc 10.10.0.156 ftp usermypassD、host nameuserpc 10.10.0.156 tftp usermypass
考题
单选题DHCP是下面哪些英语单词的缩写().A
Dynamic Host Configuration ProtocolB
Dynamic Host Connection ProtocolC
Dynamic Hot Connection ProtocolD
Denial Host Configuration Protocol
考题
单选题A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()A
Drop the data.B
Send the data frames to the default gateway.C
Create an ARP request to get a MAC address for the receiving host.D
Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.
考题
多选题Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true (Choose two.)()。ARouter C will use ICMP to inform Host 1 that Host 2 cannot be reachedBRouter C will use ICMP to inform Router B that Host 2 cannot be reachedCRouter C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reachedDRouter C will send a Destination Unreachable message typeERouter C will send a Router Selection message typeFRouter C will send a Source Quench message type
考题
单选题Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many sessions exist between Host A and Host B?()A
1B
2C
3D
4
考题
多选题A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()AThe default gateway is configured on a different subnet form this host.BThe host is a member of the fifth usable subnet of the 192.168.16.0 network.CThe subnetwork address for this host is 192.168.16.160/28.DThe address of the next higher subnet is 192.168.16.192.EThe address of the router interface that is attached to this subnetwork is 192.168.16.190.FThere are 60 usable host addresses on this subnet.
热门标签
最新试卷