考题
__________you suspect something, I may as well tell you the whole truth.A. SinceB. UntilC. AfterD. While
考题
You have configured a Ezonexam switch as shown below:Ezonexam3(config-if) switchport port-securityEzonexam3(config-if) switchport port-security mac-address stickySelect the action below that results from executing these commands.A. A dynamically learned MAC address is saved in the VLAN database.B. A dynamically learned MAC address is saved in the startup-configuration file.C. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.D. A dynamically learned MAC address is saved in the running-configuration file.E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.F. None of the above
考题
You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with the IP protocol stack in your PC. Which of the following actions is most likely to confirm your diagnosis?A. ping 127.0.0.0B. ping 203.125.12.1C. telnet 127.0.0.1D. ping 127.0.0.1E. tracert 203.125.12.1F. None of the above
考题
Which of one the following fields is contained within an IEEE Ethernet frame header?()
A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address
考题
While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A. pingB. traceC. show ip routeD. show interfaceE. show cdp neighbors
考题
Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?()
A.the MAC address of the seiver network interfaceB.the MAC address of host AC.the MAC address of router interface e 1D.the MAC address of router interface e0
考题
--May I know your address? --()ASure. Here you areBI have no ideaCIt’s far from here
考题
What is the purpose of the inverse ARP?()A、to map a known DLCI to an IP addressB、to map a known IP address to a MAC addressC、to map known SPID to a MAC addressD、to map a known DLCI to a MAC addressE、to map a known IP address to a SPIDF、to map a known MAC address to an IP address
考题
--May I know your address? --()A、Sure. Here you areB、I have no ideaC、It’s far from here
考题
Inverse ARP is being used in the TestKing frame relay network. What is the purpose of Inverse ARP?()A、To ma a known IP address to a MAC addressB、To map a known DLCI to a MAC addressC、To ma a known MAC address to an IP addressD、To ma a known DLCI address to a IP addressE、To ma a known IP address to a SPID addressF、To ma a known SPID address to a MAC address
考题
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply
考题
What keywords do you need to the access-list to provide to the logging message like source address and source mac address?()A、LogB、Log-inputC、Log-outputD、Logging
考题
Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address
考题
While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A、pingB、traceC、show ip routeD、show interfaceE、show cdp neighbors
考题
You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()A、by using triggersB、by using external tablesC、by using anonymous PL/SQL blocksD、by auditing all DML operations on the table
考题
You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()A、by using triggersB、by using Data PumpC、by using external tablesD、by using anonymous PL/SQL blocks
考题
单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A
The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B
Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E
The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G
None of the other alternatives apply
考题
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. Youwant to track users who are performing the transactions and the values used in the transactions. You alsoplan to transfer these values to another table for analysis. How would you achieve this()A
by using triggersB
by using Data PumpC
by using external tablesD
by using anonymous PL/SQL blocks
考题
单选题While troubleshooting a network connectivity issue, you suspect that a router may be missing a route, or may be receiving bad routing information to a destination. What command should you issue to view the route that the router will use to reach a given destination?()A
pingB
traceC
show ip routeD
show interfaceE
show cdp neighbors
考题
单选题What keywords do you need to the access-list to provide to the logging message like source address and source mac address?()A
LogB
Log-inputC
Log-outputD
Logging
考题
单选题--May I know your address? --()A
Sure. Here you areB
I have no ideaC
It’s far from here
考题
单选题You are preparing to install an operating system on virtual machines (VMs) in a Hyper-V environment. You need to configure each VM so that you can perform a network-based operating system installation. What should you do for each VM?()A
Add a Network Adapter.B
Add a Legacy Network Adapter.C
Configure a static MAC address.D
Configure a dynamic MAC address.
考题
单选题P300 is the brainwave _____.A
which may confirm that the person knows no details about the questionB
lack of which may confirm that the person knows details about the questionC
which may help prove that the suspect hasn’t committed a crimeD
lack of which may mean that the suspect hasn’t committed a crime
考题
单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()A
source and destination MAC addressB
source MAC address and destination network address onlyC
source and destination network address onlyD
source network address and destination MAC addressE
source and destination MAC address and source and destination network address
考题
单选题You are unable to telnet to a router at address 203.125.12.1 from a workstation with the IP address 203.125.12.23. You suspect that there is a problem with your protocol stack. Which of the following actions is most likely to confirm your diagnosis?()A
ping 127.0.0.0B
ping 203.125.12.1C
telnet 127.0.0.1D
ping 127.0.0.1E
tracert 203.125.12.1
考题
单选题You suspect unauthorized data manipulation language (DML) operations on a particular table. You want to track users who are performing the transactions and the values used in the transactions. Also, you plan to transfer these values to another table for analysis. How would you achieve this?()A
by using triggersB
by using external tablesC
by using anonymous PL/SQL blocksD
by auditing all DML operations on the table
考题
单选题R1 forwards a packet from Host 1 to remote Server 1. Which statement describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1()。A
The frame does not have MAC addresses.B
The source MAC address in the frame is the MAC address of the NIC of Host 1.C
The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.D
The destination MAC address in the frame is the MAC address of the NICof server 1.E
The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2
考题
单选题Your network includes several virtual machines (VMs) that are distributed across a Windows Server 2008 R2 Hyper-V failover cluster. You need to be able to configure the VMs in a Network Load Balancing (NLB) cluster. What should you do on each VMs network adapter?()A
Enable MAC address spoofing.B
Disable MAC address spoofing.C
Enable TCP Offload Engine(TOE).D
Disable TCP Offload Engine(TOE).