A host is to become part of a hierarchical naming topology. Which of the following services are required?()
第1题:
Every host and router on the Internet has an IP address, which encodes its
A.host number
B.host number and socket
C.network number
D.host number and network number
第2题:
Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections.How many sessions exist between Host A and Host B?()
A.1
B.2
C.3
D.4
第3题:
A.host userpc 10.10.0.156 ftp usermypass
B.host userpc 10.10.0.156 tftp usermypass
C.host nameuserpc 10.10.0.156 ftp usermypass
D.host nameuserpc 10.10.0.156 tftp usermypass
第4题:
A.yyyymmdd_HHMMSS_host-name_juniper.conf.gz
B.host-name_juniper.conf.gz_yyyymmdd_HHMMSS
C.yyyymmdd_HHMMSS_host-name_juniper.conf
D.host-name_juniper.conf_yyyymmdd_HHMMSS
第5题:
There are 2 switches in the Testking LAN, with no routers. Ports 1, 2 & 3 are assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 & 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link.Which of the conditions below would verify trunk and VLAN operation?()
A. Host 1 on VLAN 1 can ping Host 2 on VLAN 1
B. Host 1 on VLAN 1 can ping Host 4 on VLAN 2
C. Host 1 on VLAN 1 can not ping Host 2 on VLAN 1
D. Host 4 on VLAN 2 can not ping Host 1 on VLAN 1
E. Host 4 on VLAN 2 can ping Host 2 on VLAN 2
第6题:
The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()
A.from host PC1 to host 5.1.1.10
B.from host PC1 to host 5.1.3.10
C.from host PC2 to host 5.1.2.10
D.from host PC2 to host 5.1.3.8
第7题:
A network host is configured as follows: Host IP address: 192.168.16.183 Subnet mask: 255.255.255.224 Default gateway: 192.168.16.190 Which of the following statements describe the network to which this host is attached?()
第8题:
What happens when Host Checker is configured to perform checks every "0" minutes? ()
第9题:
The sysdumpdev command can be used to configure remote dump devices. Which of the following conditions is NOT used for a remote dump device configuration?()
第10题:
You would like to configure your PC’s IP address of 10.10.0.156 as an FTP host with au ser name of user anda password of mypass.Which configuration command accomplishes this goal?()
第11题:
Drop the data.
Send the data frames to the default gateway.
Create an ARP request to get a MAC address for the receiving host.
Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.
第12题:
1
2
3
4
第13题:
Every host and router on the Internet has an IP address, which encodes its(12).
A.host number
B.network number
C.host number and socket
D.host number and network number
第14题:
A. The local host will respond to ICMP echo-request packets from 192.168.53.10.
B. The local host will respond to UDP port 53 requests from 192.168.1.25.
C. The local host can send any packet of any type to host 172.16.1.1.
D. The local host will accept any packet of any type from host 172.16.1.1.
E. The local host can send packets to UDP port512 on server 192.168.53.10.
第15题:
A.ip host routes
B.ip access-routes
C.host routes enabled
D.access-routes enabled
第16题:
A Scheme://host:port/path
B host:// Scheme:port/path
C host:// Scheme: path/ port
D Scheme://host: path/ port
第17题:
You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command "ip access-group 101 in" to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()
A. Telnet sessions from host A to host 5.1.1.10
B. Telnet sessions from host A to host 5.1.3.10
C. Telnet sessions from host B to host 5.1.2.10
D. Telnet sessions from host B to host 5.1.3.8
E. Telnet sessions from host C to host 5.1.3.10
F. Telnet sessions from host F to host 5.1.1.10
第18题:
What is the first thing that happens when IPv6 is enabled on an interface on a host?()
第19题:
Which profile configuration command dynamically creates a host route in the routing table?()
第20题:
DHCP代表什么?()
第21题:
What is the correct order to create an object in a new IBM System Storage DS8000 to get a LUN provided to a host()
第22题:
Dynamic Host Configuration Protocol
Dynamic Host Connection Protocol
Dynamic Hot Connection Protocol
Denial Host Configuration Protocol
第23题:
Router C will use ICMP to inform Host 1 that Host 2 cannot be reached
Router C will use ICMP to inform Router B that Host 2 cannot be reached
Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached
Router C will send a Destination Unreachable message type
Router C will send a Router Selection message type
Router C will send a Source Quench message type
第24题:
The default gateway is configured on a different subnet form this host.
The host is a member of the fifth usable subnet of the 192.168.16.0 network.
The subnetwork address for this host is 192.168.16.160/28.
The address of the next higher subnet is 192.168.16.192.
The address of the router interface that is attached to this subnetwork is 192.168.16.190.
There are 60 usable host addresses on this subnet.