网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following protocols would be used to test if one host is reachable by another host, by sending echo requests and waiting for echo replies?()
A

SNMP

B

ICMP

C

TCP

D

UDP


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following protocols would be used to test if one host is reachable by another host, by sending echo requests and waiting for echo replies?()A SNMPB ICMPC TCPD UDP” 相关考题
考题 Which of the following protocols would be used in order to log into a router to configure a VLAN?() A.RDPB.SMTPC.TELNETD.FTP

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

考题 Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?() A. AESB. TKIPC. 802.1qD. ISAKMP

考题 Which of the following protocols should be used to monitor network performance?() A.SNTPB.SMTPC.HTTPD.SNMP

考题 Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A、RIPB、0S:FC、STPD、EGP

考题 Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、 AES B、 TKIPC、 802.1qD、 ISAKMP

考题 Which of the following protocols is used by thin clients?()A、IPXB、NetBIOSC、RDPD、UDP

考题 A server has been intermittently shutting off. The power going to the server was tested and is giving the appropriate voltages. Which of the following tools would be used to test the power supply?()A、 POST diagnostic cardB、 OTDRC、 TDRD、 Multimeter

考题 Which of the following protocols is commonly used for VoIP technology?()A、TelnetB、SMTPC、SIPD、SNMP

考题 Which of the following would BEST optimize a computer that is heavily used? ()A、ScandiskB、DefragC、IndexingD、Chkdsk

考题 Which of the following storage protocols would be suitable for transport across an IP network?()A、 SASB、 SCSIC、 iSCSID、 SATA

考题 Which of the following protocols should be used to monitor network performance?()A、SNTPB、SMTPC、HTTPD、SNMP

考题 Which of the following protocols would be used in order to log into a router to configure a VLAN?()A、RDPB、SMTPC、TELNETD、FTP

考题 Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A、AESB、TKIPC、802.1qD、ISAKMP

考题 Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()A、BridgeB、FirewallC、Port replicatorD、Gateway

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

考题 Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP

考题 Which of the following commands should be used to report statistics on network protocols used by the system?()A、 lsattrB、 pstatC、 netstatD、 ifconfig

考题 单选题Which of the following protocols is used to disable switch ports automatically to prevent switchingloops?()A RIPB 0S:FC STPD EGP

考题 单选题Which of the following storage protocols would be suitable for transport across an IP network?()A  SASB  SCSIC  iSCSID  SATA

考题 单选题In MPLS traffic engineering, which one of the following protocols is used for Path Setup?()A BGPB OSPFC ISISD RSVP

考题 单选题Which of the following commands should be used to report statistics on network protocols used by the system?()A  lsattrB  pstatC  netstatD  ifconfig

考题 单选题A server has been intermittently shutting off. The power going to the server was tested and is giving the appropriate voltages. Which of the following tools would be used to test the power supply?()A  POST diagnostic cardB  OTDRC  TDRD  Multimeter

考题 单选题Which of the following protocols is used to encrypt data between web servers and web browsers?()A SMTPB SIPC HTTPD SSL

考题 单选题Which of the following protocols would MOST likely be used in the establishment of an IPSec VPN tunnel?()A  AES B  TKIPC  802.1qD  ISAKMP