更多“Although TCP segments differ fro”相关问题
  • 第1题:

    Although TCP segments differ from UDP segments, they both contain some common fields. What two segments do they share in common?()

    A. source address

    B. options

    C. sequence number

    D. sources

    E. destination port

    F. checksum


    参考答案:E, F

  • 第2题:

    关于数据封装的顺序()是正确的。

    A.DatA.segments-packets-frames-bits

    B.DatA.packets-segments-frames-bits

    C.DatA.frames-segments-packets-bits

    D.DatA.segments-frames-packets-bits


    参考答案:A

  • 第3题:

    Even for one single connection, the retransmission time should not be fixed.A connection may be able to send segments and receive (74)faster during nontraffic period than during congested periods. TCP uses the dynamic retransmission time,a transmission time is different for each connection and which may be changed during the same connection.

    A.connections
    B.requests
    C.acknowledgments
    D.datagrams

    答案:C
    解析:
    网络工程师

  • 第4题:

    哪一项不是决定客户机发送Client—Key—Exchang消息的密钥交换类型:()

    • A、RSA
    • B、固定的Differ—Hellman
    • C、Fortezza
    • D、长期的Differ—Hellman

    正确答案:D

  • 第5题:

    How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()

    • A、These attacks send multiple FIN segments forcing TCP connection release.
    • B、These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.
    • C、These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.
    • D、These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.
    • E、These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

    正确答案:B

  • 第6题:

    What statements are true regarding ICMP packets?()

    • A、They acknowledge receipt of TCP segments.
    • B、They guarantee datagram delivery.
    • C、They can provide hosts with information about network problems.
    • D、They are encapsulated within IP datagrams.
    • E、They are encapsulated within UDP datagrams.

    正确答案:C,D

  • 第7题:

    单选题
    You have 100 segments in the USERS tablespace. You realize that the USERS tablespace is running low on space. You can use Segment Advisor to().
    A

    add data files to the tablespace 

    B

    identify the segments that you should shrink 

    C

    modify the storage parameters for the tablespace 

    D

    automatically shrink the segments with unused space 

    E

    check the alerts generated for the tablespace that is running low on space


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    关于数据封装的顺序()是正确的。
    A

    DatA.segments-packets-frames-bits

    B

    B.Datpackets-segments-frames-bits

    C

    C.Datframes-segments-packets-bits

    D

    D.Datsegments-frames-packets-bits


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()
    A

    DoS

    B

    SYN flood

    C

    port scanning

    D

    IP address sweep


    正确答案: C
    解析: 暂无解析

  • 第10题:

    多选题
    What statements are true regarding ICMP packets?()
    A

    They acknowledge receipt of TCP segments.

    B

    They guarantee datagram delivery.

    C

    They can provide hosts with information about network problems.

    D

    They are encapsulated within IP datagrams.

    E

    They are encapsulated within UDP datagrams.


    正确答案: B,E
    解析: 暂无解析

  • 第11题:

    单选题
    Which statement is true about a Smurf attack?()
    A

    It sends ping requests in segments of an invalid size

    B

    It intercepts the third step in a TCP three-way handshake to hijack a session

    C

    It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem

    D

    It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    To determine the space allocated for temporary segments, the DBA can access which of the following views? ()
    A

    DBA_TABLESPACES 

    B

    DBA_TABLES 

    C

    DBA_SEGMENTS 

    D

    DBA_FREE_SPACE


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Estimates _____ anywhere from 600 000 to 3 million. Although the figure may vary, analysts do agree on another mater: that the number of the homeless is increasing. One of the federal government’s studies predicts that the number of the homeless will reach nearly 19 million by the end of this decade.

    [A] cover

    [B] change

    [C] differ

    [D] range


    正确答案:D
    16. [D] 本句意思为“估计数字的范围大约从60万到300 万之间”,而 range from… to …这一句型正是表示“在……范围之内变化”的意思,故本题选[D]。[A] cover 虽然有“包含”之意,但 cover表示“覆盖”的面积、大小,不表示范围,故排除。[C] differ 主要强调不同,而本句并未强调不同,只是强调范围,故选择 range。

  • 第14题:

    Estimates( )anywhere from 600,000 to 3 million.Although the figure may vary,analysts do agree on another matter:that the number of the homeless is increasing,one of the federal government’s studies predicts that the number of the homeless will reach nearly 19 million by the end of this decade.

    A.cover
    B.change
    C.range
    D.differ

    答案:C
    解析:
    本句意思为“估计数字的范围大约从60万到300万之间”,而range from…to…这一句型正是表示“在…范围之内变化”的意思,故本题选CA.cover虽然有“包含”之意,但cover表示“覆盖”的面积,大小,不表示范围,故排除。D.differ主要强调不同,而本句并未强调不同,只是强调范围,故选择range。

  • 第15题:

    CipherSuite字段中的第一个元素密钥交换模式中,不支持的密钥交换模式是哪个()

    • A、定的Differ—Hellman
    • B、暂的Differ—Hellman
    • C、名的Differ—Hellman
    • D、期的Differ—Hellman

    正确答案:D

  • 第16题:

    Which statement is true about a Smurf attack?()

    • A、It sends ping requests in segments of an invalid size
    • B、It intercepts the third step in a TCP three-way handshake to hijack a session
    • C、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem
    • D、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

    正确答案:C

  • 第17题:

    Which two statements are true about network voice traffic? (Choose two.)()

    • A、 Voice traffic is affected more by link speed than FTP traffic is.
    • B、 Voice traffic is affected more by packet delays than FTP traffic is.
    • C、 Voice streams involve larger packet sizes than most TCP network traffic involves.
    • D、 Voice traffic is more sensitive to packet loss than TCP network traffic is.
    • E、 Voice traffic requires QOS mechanisms only in heavily loaded network segments.

    正确答案:B,D

  • 第18题:

    关于数据封装的顺序()是正确的。

    • A、DatA.segments-packets-frames-bits
    • B、B.Datpackets-segments-frames-bits
    • C、C.Datframes-segments-packets-bits
    • D、D.Datsegments-frames-packets-bits

    正确答案:A

  • 第19题:

    单选题
    You have 100 segments in the USERS tablespace. You get an alert that the USERS tablespace is running low on space. You decide to shrink some segments. Which option would you use to determine which segments to shrink?()
    A

    Segment Advisor 

    B

    SQL Tuning Advisor 

    C

    SQL Access Advisor 

    D

    Segment Resource Estimation 

    E

    Automatic Database Diagnostic Monitor (ADDM)


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    A:Can I buy two or three cards fro meachset? B:Oh,sorry,Wesellitby().
    A

    singly

    B

    apiece

    C

    set

    D

    sets


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    You have 100 segments in the USERS tablespace. You realize that the USERS tablespace is running low on space. You can use Segment Advisor to()。
    A

    identify the segments that you should shrink

    B

    modify the storage parameters for the tablespace

    C

    automatically shrink the segments with unused space

    D

    check the alerts generated for the tablespace that is running low on space


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()
    A

    These attacks send multiple FIN segments forcing TCP connection release.

    B

    These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.

    C

    These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.

    D

    These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.

    E

    These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.


    正确答案: B
    解析: 暂无解析

  • 第23题:

    多选题
    Although TCP segments differ from UDP segments, they both contain some common fields. What two segments do they share in common?()
    A

    source address

    B

    options

    C

    sequence number

    D

    sources

    E

    destination port

    F

    checksum


    正确答案: D,B
    解析: 暂无解析