Ping sweep
Packet sniffer
Traceroute
Port scanner
第1题:
A.Port scan
B.Packet sniffer
C.IPS
D.IDS
第2题:

A.255.255.255.0
B.255.255.254.0
C.255.255.252.0
D.255.255.248.0
第3题:
Which of the following solutions will detect and disable a rogue access point?()
第4题:
Which of the following are TACACS+ characteristics?(Choose all that apply.)()
第5题:
While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()
第6题:
Which of the following analyzes the entire subnet to identify all hosts that are active?()
第7题:
Which of the following tools can be used to identify the location of a network outage?()
第8题:
Which of the following commands should be used to identify packet sequence problems?()
第9题:
CDP
SNMP
DHCP
ARP
DNS
None of the above
第10题:
Port scan
Ping sweep
IDS
NIPS
第11题:
ermit all packets matching the first three octets of the source address to all destinations
permit all packet matching the last octet of the destination address and accept all source addresses
permit all packet matching the host bits in the source address to all destinations
permit all packet from the third subnet of the network address to all destinations
第12题:
255.0.0.0
255.255.0.0
255.255.252.0
255.255.255.0
第13题:
A.Port scan
B.Ping sweep
C.IDS
D.NIPS
第14题:
Which of the following ping parameters will set the size of the outgoing packet?()
第15题:
Which of the following monitors a server to see which protocols might be in use?()
第16题:
Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()
第17题:
A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()
第18题:
Which of the following is used to identify active hosts along with their network addresses?()
第19题:
Which of the following commands verifies connectivity between two hosts?()
第20题:
Cisco proprietary
Standards-based protocol
Provides separate services for authentication, authorization, and accounting
Encrypts only the password
Uses UDP for a transport layer
Encrypts the entire packet
第21题:
ping and arp
lsattr and ifconfig
netstat and iostat
iptrace and tcpdump
第22题:
ermit all packet smatching the first three octets of the source address to all destinations
permit all packet matching the last octet of the destination address and accept all source addresses
permit all packet matching the host bits in the source address to all destinations
permit all packet from the third subnet of the network address to all destinations
第23题:
–c
i
R
–s