When the system upon which a transport entity is running fails and subsequently restarts,the(21) information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.The s

题目

When the system upon which a transport entity is running fails and subsequently restarts,the(21) information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.The still active side of a half-open connections can close the connection using a(22)timer. This timer measures the time the transport machine will continue to await an (23) of a transmitted segment after the segment has been retransmitted the maximum number of times.When the timer (24),the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user. In the event that a transport entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment, the failed side returns an RST i to every segment i that it receives. When the RST i reaches the other side, it must be checked for validity based on the (25) number i, as the RST could be in response to an old segment. If the reset is valid, the transport entity performs an abnormal termination. 空白处(23)应选择()

  • A、reset
  • B、acknowledgment
  • C、sequence
  • D、synchroizer

相似考题
更多“When the system upon which a transport entity is running fails and subsequently restarts,the(21) information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.The s”相关问题
  • 第1题:

    For the accompanying router output, which of the following statements describes the stat e that neighbor 172.16.254.3 is in?()

    A. The router will not accept connections from the peer.

    B. BGP can exchange routing information in this state.

    C. The router is listening on its server port for connection requests from the peer.

    D. The router ha s sent out an active TCP connection request to the peer.


    参考答案:C

  • 第2题:

    Which command shows your active Telnet connections?()

    • A、show session
    • B、show cdpneighbors
    • C、show users
    • D、show queue

    正确答案:A

  • 第3题:

    Which is true when describing a connection replication in Cisco ACE?()

    • A、 It is not supported for SSL connections.
    • B、 It is not supported for non-SSL connections.
    • C、 It can only be configured manually.
    • D、 It has a maximum limit of 50,000 replicated connections.

    正确答案:A

  • 第4题:

    When the system upon which a transport entity is running fails and subsequently restarts,the(21) information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.The still active side of a half-open connections can close the connection using a(22)timer. This timer measures the time the transport machine will continue to await an (23) of a transmitted segment after the segment has been retransmitted the maximum number of times.When the timer (24),the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user. In the event that a transport entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment, the failed side returns an RST i to every segment i that it receives. When the RST i reaches the other side, it must be checked for validity based on the (25) number i, as the RST could be in response to an old segment. If the reset is valid, the transport entity performs an abnormal termination. 空白处(21)应选择()

    • A、data
    • B、state
    • C、signal
    • D、control

    正确答案:B

  • 第5题:

    How does the Juniper DX accelerate web servers? ()

    • A、by translating HTTP requests to HTTPS
    • B、by refusing client connections that are unnecessarily refreshed by end users
    • C、by multiplexing numerous client-side connections to fewer server-side connections
    • D、by multiplexing numerous server-side connections to fewer client-side connections

    正确答案:C

  • 第6题:

    When the system upon which a transport entity is running fails and subsequently restarts,the(21) information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.The still active side of a half-open connections can close the connection using a(22)timer. This timer measures the time the transport machine will continue to await an (23) of a transmitted segment after the segment has been retransmitted the maximum number of times.When the timer (24),the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user. In the event that a transport entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment, the failed side returns an RST i to every segment i that it receives. When the RST i reaches the other side, it must be checked for validity based on the (25) number i, as the RST could be in response to an old segment. If the reset is valid, the transport entity performs an abnormal termination. 空白处(25)应选择()

    • A、sequence
    • B、acknowledgment
    • C、connection
    • D、message

    正确答案:A

  • 第7题:

    You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command:   LSNRCTL>STATUS listener1   Which information will NOT be displayed when you issue the above command?() 

    • A、 whether the password is set in the listener or a file or not
    • B、 the number of client connections the service handler has refused
    • C、 the information will be displayed whether the instance can accept connections or not
    • D、 the protocol addresses on which the listener is configured to listen

    正确答案:B

  • 第8题:

    You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to get a list of all the open connections on the server and all the port numbers used by the connections. Which tool should you use?()

    • A、Nbtstat
    • B、Netsh
    • C、Netstat
    • D、Nslookup

    正确答案:C

  • 第9题:

    多选题
    A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()
    A

    Disabling connections from named pipes or socket files (depending on the operating system of the server)

    B

    Enabling and using SSL for connections to the Mysql database

    C

    Installing Mysql on the application server, and running the database and application on the same server

    D

    Starting the server with – bind- address=0.0.0.0 specified

    E

    Running the server with – skip-networking specified

    F

    Limiting logins to originate from the application server or the server's subnet'


    正确答案: A,E
    解析: 暂无解析

  • 第10题:

    单选题
    When Robert discovered that the company was engaged in dishonest business, he immediately _____ all connections with it.
    A

    offset

    B

    separated

    C

    severed

    D

    vanquished


    正确答案: C
    解析:
    sever意为“切断、分开”。offset意为“补偿”和compensate及make up意思相同。separate意为“分开,分居”。vanquish意为“打败,克服”。句意为:当他发现公司在从事不诚信交易后,立即断绝了与公司的一切联系。

  • 第11题:

    多选题
    Which two statements are true regarding the starting of the database instance using the following command?() SQL>STARTUP UPGRADE
    A

    It enables all system triggers.

    B

    It allows only SYSDBA connections.

    C

    It ensures that all job queues remain active during the upgrade process.

    D

    It sets system initialization parameters to specific values that are required to enable database upgrade scripts to be run.


    正确答案: C,B
    解析: 暂无解析

  • 第12题:

    When the system upon which a transport entity is running fails and subsequently restarts, the(66)information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.The still active side of a half-open connection can close the connection using a(67)timer. This timer measures the time the transport machine will continue to await an(68)of a transmitted segment after the segment has been retransmitted the maximum number of times. When the timer(69), the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user.In the event that a transport entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment. The failed side returns an RST i to every segment i that it receives. When the RST i reaches the other side, it must be checked for validity based on the(70)number i, as the RST could be in response to an old segment. If the reset is valid, the transport entity performs an abnormal termination.

    A.data

    B.state

    C.signal

    D.control


    正确答案:B
    解析:当传输实体所在的系统失效并且重新启动后,所有活动连接的状态信息都会丢失。受其影响的连接形成了半开通状态,但是没有失效的一方,还没有认识到这个问题。半连接中仍旧活动的一方可以使用放弃定时器关闭连接。这种定时器测量一个段重发最大次数后等待应答的时间。当定时器超时后,传输实体假定对方传输实体或中间的网络已经失效。结果是,定时器关闭连接,并向传输用户发出非正常关闭的通知。在一个传输实体失效并且很快重启动的情况下,使用RST 段可以更快地终止半连接。失效一方对它接收到的每一个段i,返回一个RST i。当RST i 到达另一边时,应该验证它的序列号i,因为RST 有可能是对老数据段的响应。如果重启是有效的,传输实体将完成非正常终止过程。

  • 第13题:

    It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()

    • A、 single layer of firewalling
    • B、 multiple layers of firewalling
    • C、 firewall connections in either an active or standby state
    • D、 an architecture in which all traffic between firewalls goes through application-specific servers

    正确答案:B

  • 第14题:

    What is meant by the term "firewall sandwich"?()

    • A、multiple layers of firewalling
    • B、a method of operating firewalls from multiple vendors
    • C、firewall connections in either an active or standby state
    • D、an architecture in which all traffic between firewalls goes through application-specific servers
    • E、an architecture in which all traffic between firewalls goes through application-specific gateways

    正确答案:A

  • 第15题:

    Which of the following is TRUE about the ate program?()

    • A、When running ate for the first time it will prompt for all the required information and configure all the required devices
    • B、The program is used by cu to communicate to a remote system
    • C、The program is used for remote communications between the host and a remote system using a modem or null modem via a tty port
    • D、The program ate calls cu to communicate with the remote system

    正确答案:C

  • 第16题:

    Which command shows your active Telnet connections?()

    • A、show session
    • B、show cdp neighbors
    • C、show users
    • D、show queue

    正确答案:A

  • 第17题:

    Which of the following commands will show all active TCP/IP network connections?()

    • A、PING
    • B、NETSTAT
    • C、NET
    • D、TRACERT

    正确答案:B

  • 第18题:

    Which two statements are true regarding the starting of the database instance using the following command?() SQL>STARTUP UPGRADE  

    • A、 It enables all system triggers.
    • B、 It allows only SYSDBA connections.
    • C、 It ensures that all job queues remain active during the upgrade process.
    • D、 It sets system initialization parameters to specific values that are required to enable database upgrade scripts to be run.

    正确答案:B,D

  • 第19题:

    You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()

    • A、Encrypt customer information when it is stored and when it is being transmitted
    • B、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network
    • C、Encrypt all marketing information on file servers and client computers
    • D、Require encrypted connections to all file servers

    正确答案:A

  • 第20题:

    单选题
    You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command:   LSNRCTL>STATUS listener1   Which information will NOT be displayed when you issue the above command?()
    A

     whether the password is set in the listener or a file or not

    B

     the number of client connections the service handler has refused

    C

     the information will be displayed whether the instance can accept connections or not

    D

     the protocol addresses on which the listener is configured to listen


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which is true when describing a connection replication in Cisco ACE?()
    A

     It is not supported for SSL connections.

    B

     It is not supported for non-SSL connections.

    C

     It can only be configured manually.

    D

     It has a maximum limit of 50,000 replicated connections.


    正确答案: B
    解析: 暂无解析