参考答案和解析
正确答案: C
解析: 暂无解析
更多“单选题Which of the following analyzes the entire subnet to identify all hosts that are active?()A Ping sweepB Packet snifferC TracerouteD Port scanner”相关问题
  • 第1题:

    Which of the following solutions will detect and disable a rogue access point?()

    A.Port scan

    B.Packet sniffer

    C.IPS

    D.IDS


    参考答案:C

  • 第2题:

    Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?()

    A.255.255.255.0

    B.255.255.254.0

    C.255.255.252.0

    D.255.255.248.0


    参考答案:B

  • 第3题:

    Which of the following solutions will detect and disable a rogue access point?()

    • A、Port scan
    • B、Packet sniffer
    • C、IPS
    • D、IDS

    正确答案:C

  • 第4题:

    Which of the following are TACACS+ characteristics?(Choose all that apply.)()

    • A、Cisco proprietary
    • B、Standards-based protocol
    • C、Provides separate services for authentication, authorization, and accounting
    • D、Encrypts only the password
    • E、Uses UDP for a transport layer
    • F、Encrypts the entire packet

    正确答案:A,C,F

  • 第5题:

    While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()

    • A、ping 192.168.1.255
    • B、ping with sweep option
    • C、ping 192.168.1.127
    • D、ping 192.168.1.64
    • E、ping with broadcast option

    正确答案:C

  • 第6题:

    Which of the following analyzes the entire subnet to identify all hosts that are active?()

    • A、Ping sweep
    • B、Packet sniffer
    • C、Traceroute
    • D、Port scanner

    正确答案:A

  • 第7题:

    Which of the following tools can be used to identify the location of a network outage?()

    • A、traceroute
    • B、netstat
    • C、nslookup
    • D、ping

    正确答案:A

  • 第8题:

    Which of the following commands should be used to identify packet sequence problems?()

    • A、 ping and arp
    • B、 lsattr and ifconfig
    • C、 netstat and iostat
    • D、 iptrace and tcpdump

    正确答案:D

  • 第9题:

    单选题
    Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()
    A

    CDP

    B

    SNMP

    C

    DHCP

    D

    ARP

    E

    DNS

    F

    None of the above


    正确答案: E
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following is used to identify active hosts along with their network addresses?()
    A

    Port scan

    B

    Ping sweep

    C

    IDS

    D

    NIPS


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()
    A

    ermit all packets matching the first three octets of the source address to all destinations

    B

    permit all packet matching the last octet of the destination address and accept all source addresses

    C

    permit all packet matching the host bits in the source address to all destinations

    D

    permit all packet from the third subnet of the network address to all destinations


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    An administrator needs a network that can support up to 800 hosts on the same subnet. Which of the following is the MINIMUM subnet mask that should be used?()
    A

    255.0.0.0

    B

    255.255.0.0

    C

    255.255.252.0

    D

    255.255.255.0


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which of the following is used to identify active hosts along with their network addresses?()

    A.Port scan

    B.Ping sweep

    C.IDS

    D.NIPS


    参考答案:B

  • 第14题:

    Which of the following ping parameters will set the size of the outgoing packet?()

    • A、–c
    • B、i
    • C、R
    • D、–s

    正确答案:D

  • 第15题:

    Which of the following monitors a server to see which protocols might be in use?()

    • A、Ping sweep
    • B、Intrusion detection software
    • C、Port scanner
    • D、Wireless packet sniffer

    正确答案:B

  • 第16题:

    Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()

    • A、CDP
    • B、SNMP
    • C、DHCP
    • D、ARP
    • E、DNS
    • F、None of the above

    正确答案:C

  • 第17题:

    A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()

    • A、DHCP
    • B、ARP
    • C、DNS
    • D、PING

    正确答案:B

  • 第18题:

    Which of the following is used to identify active hosts along with their network addresses?()

    • A、Port scan
    • B、Ping sweep
    • C、IDS
    • D、NIPS

    正确答案:B

  • 第19题:

    Which of the following commands verifies connectivity between two hosts?()

    • A、chkntfs
    • B、dxdiag
    • C、tracert
    • D、ipconfig
    • E、ping

    正确答案:C,E

  • 第20题:

    多选题
    Which of the following are TACACS+ characteristics?(Choose all that apply.)()
    A

    Cisco proprietary

    B

    Standards-based protocol

    C

    Provides separate services for authentication, authorization, and accounting

    D

    Encrypts only the password

    E

    Uses UDP for a transport layer

    F

    Encrypts the entire packet


    正确答案: A,E
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following commands should be used to identify packet sequence problems?()
    A

     ping and arp

    B

     lsattr and ifconfig

    C

     netstat and iostat

    D

     iptrace and tcpdump


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()
    A

    ermit all packet smatching the first three octets of the source address to all destinations

    B

    permit all packet matching the last octet of the destination address and accept all source addresses

    C

    permit all packet matching the host bits in the source address to all destinations

    D

    permit all packet from the third subnet of the network address to all destinations


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following ping parameters will set the size of the outgoing packet?()
    A

    –c

    B

    i

    C

    R

    D

    –s


    正确答案: A
    解析: 暂无解析