网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following parameters can prevent packet fragmentation on routers when connecting to remote networks?()
A
mtu
B
sb-max
C
rfc1323
D
tcp_mssdflt
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following parameters can prevent packet fragmentation on routers when connecting to remote networks?()A mtuB sb-maxC rfc1323D tcp_mssdflt” 相关考题
考题
Which of the following parameters can prevent packet fragmentation on routers when connecting to remote networks?()A、mtuB、sb-maxC、rfc1323D、tcp_mssdflt
考题
Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()A、Spanning Tree ProtocolB、Shortest path first treeC、Link-state advertisements (LSA)D、Hold-down timersE、Split horizonF、VRP
考题
Routers perform which of the following functions?()A、Packet switchingB、Collision prevention on a LAN segment.C、Packet filteringD、Broadcast domain enlargementE、Broadcast forwardingF、Internetwork communication
考题
Which of the following characteristics applies only to OSPFv3 and not to OSPFv2?()A、Several processes can exist simultaneouslyB、Requires direct connectivity from the backbone area to all other areasC、Has the same packet typesD、Can support multiple subnets on a single linkE、Uses a hierarchical structure divided into areasF、Adjacencies formed with neighbors
考题
Which of the following ping parameters will set the size of the outgoing packet?()A、–cB、iC、RD、–s
考题
Which of the following solutions will detect and disable a rogue access point?()A、Port scanB、Packet snifferC、IPSD、IDS
考题
Which of the following is TRUE about the ping -f command?()A、 It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the "f" in the command line. B、 It is useful for flooding from slow character based terminals since it only displays a dot "." for each packet sent in fast mode. C、 It is useful for flooding from slow character based terminals since it only displays a dot "." for each packet sent and a backspace on returned in fast mode. D、 The command can only be run by root.
考题
A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall
考题
Which one of the following parameters will influence the GSL device utilization the most:()A、PILTIMERB、ALPHAC、CSPSPRIO
考题
Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)
考题
Which of the following describe router functions?()A、Packet switchingB、Collision prevention on a LAN segmentC、Packet filteringD、Broadcast domain enlargementE、Broadcast forwardingF、Internetwork communication
考题
Which of the following can help prevent data loss on a RAID array in the event of a power failure?()A、Using a RAID mirrorB、A battery backed write cacheC、Using RAID with parityD、A battery backed read cache
考题
Which of the following WAN protocols is a packet switching technology?()A、Frame RelayB、POTSC、PSTND、ISDN
考题
Which of the following commands should be used to tune parameters of devices that are displayed with lsattr?()A、 chdevB、 cfgmgrC、 vmtuneD、 schedtune
考题
Firewall filters can perform which two actions?()A、Log packet.B、Count packet.C、Set packet metric.D、Decrement packet TTL.E、Change destination IP address.
考题
多选题Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ
考题
单选题Which of the following can help prevent data loss on a RAID array in the event of a power failure?()A
Using a RAID mirrorB
A battery backed write cacheC
Using RAID with parityD
A battery backed read cache
考题
单选题It can be inferred that the term “public duty” (pra.2), in the context of the passage, means which of the following?A
The necessity to apprehend perpetratorsB
The responsibility to punish transgressorsC
An obligation to prevent harm to anotherD
The assignment of punishment for harmful action
考题
单选题Which of the following monitors a server to see which protocols might be in use?()A
Ping sweepB
Intrusion detection softwareC
Port scannerD
Wireless packet sniffer
考题
多选题To manually configure the SGA components using Oracle Enterprise Manager Memory Advisor, you can set values for which of the following initialization parameters?()ADB_CACHE_SIZEBSHARED_POOL_SIZECLARGE_POOL_SIZEDJAVA_POOL_SIZEESGA_MAX_SIZEFSORT_AREA_SIZE
考题
单选题Which of the following parameters can prevent packet fragmentation on routers when connecting to remote networks?()A
mtuB
sb-maxC
rfc1323D
tcp_mssdflt
考题
单选题Which of the following is TRUE about the ping -f command?()A
It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the f in the command line. B
It is useful for flooding from slow character based terminals since it only displays a dot . for each packet sent in fast mode. C
It is useful for flooding from slow character based terminals since it only displays a dot . for each packet sent and a backspace on returned in fast mode. D
The command can only be run by root.
考题
多选题When configuring the messaging system, which of the following are parameters of the e-mail transport? ()ALocationBProtocolCModeDWeb AddressEHost
考题
多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP
考题
多选题Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ
考题
单选题Which of the following type of packets can easily be filtered with a stateful packet filter by enforcing the context or state of the request?以下那个协议很容易的根据请求状态或者环境被状态包过滤设备进行过滤?()A
TCPB
UDPC
IPD
ICMP
考题
多选题Firewall filters can perform which two actions?()ALog packet.BCount packet.CSet packet metric.DDecrement packet TTL.EChange destination IP address.
考题
单选题Which of the following ping parameters will set the size of the outgoing packet?()A
–cB
iC
RD
–s
热门标签
最新试卷