多选题What are two rules for compacting IPv6 addresses?()AThe maximum number of times a double colon can replace a 16-bit segment that consists of all zeroes is twoBThe leading zeroes in any 16-bit segment do not have to be written.CEvery 16-bit segment that

题目
多选题
What are two rules for compacting IPv6 addresses?()
A

The maximum number of times a double colon can replace a 16-bit segment that consists of all zeroes is two

B

The leading zeroes in any 16-bit segment do not have to be written.

C

Every 16-bit segment that consists of all zeroes can be represented with a single colon

D

The trailing zeroes in any 16-bit segment do not have to be written.

E

Any single, continuous string of one or more 16-bit segments that consists of all zeroes can be represented with a double colon

F

Two zeroes in the middle of any 16-bit segment do not have to be written


相似考题
参考答案和解析
正确答案: B,E
解析: 暂无解析
更多“多选题What are two rules for compacting IPv6 addresses?()AThe maximum number of times a double colon can replace a 16-bit segment that consists of all zeroes is twoBThe leading zeroes in any 16-bit segment do not have to be written.CEvery 16-bit segment that”相关问题
  • 第1题:

    When the system upon which a transport entity is running fails and subsequently restarts, the(66)information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.The still active side of a half-open connection can close the connection using a(67)timer. This timer measures the time the transport machine will continue to await an(68)of a transmitted segment after the segment has been retransmitted the maximum number of times. When the timer(69), the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user.In the event that a transport entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment. The failed side returns an RST i to every segment i that it receives. When the RST i reaches the other side, it must be checked for validity based on the(70)number i, as the RST could be in response to an old segment. If the reset is valid, the transport entity performs an abnormal termination.

    A.data

    B.state

    C.signal

    D.control


    正确答案:B
    解析:当传输实体所在的系统失效并且重新启动后,所有活动连接的状态信息都会丢失。受其影响的连接形成了半开通状态,但是没有失效的一方,还没有认识到这个问题。半连接中仍旧活动的一方可以使用放弃定时器关闭连接。这种定时器测量一个段重发最大次数后等待应答的时间。当定时器超时后,传输实体假定对方传输实体或中间的网络已经失效。结果是,定时器关闭连接,并向传输用户发出非正常关闭的通知。在一个传输实体失效并且很快重启动的情况下,使用RST 段可以更快地终止半连接。失效一方对它接收到的每一个段i,返回一个RST i。当RST i 到达另一边时,应该验证它的序列号i,因为RST 有可能是对老数据段的响应。如果重启是有效的,传输实体将完成非正常终止过程。

  • 第2题:

    Which statement is correct regarding IPv6 addresses?()

    • A、An IPv6 address consists of 128 bits separated into eight 16-bit hexadecimal sections.
    • B、An IPv6 address consists of 64 bits separated into four 16-bit hexadecimal sections.
    • C、An IPv6 address consists of 128 bits separated into sixteen 8-bit hexadecimal sections.
    • D、An IPv6 address consists of 64 bits separated into eight 8-bit hexadecimal sections.

    正确答案:A

  • 第3题:

    When the system upon which a transport entity is running fails and subsequently restarts,the(21) information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.The still active side of a half-open connections can close the connection using a(22)timer. This timer measures the time the transport machine will continue to await an (23) of a transmitted segment after the segment has been retransmitted the maximum number of times.When the timer (24),the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user. In the event that a transport entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment, the failed side returns an RST i to every segment i that it receives. When the RST i reaches the other side, it must be checked for validity based on the (25) number i, as the RST could be in response to an old segment. If the reset is valid, the transport entity performs an abnormal termination. 空白处(25)应选择()

    • A、sequence
    • B、acknowledgment
    • C、connection
    • D、message

    正确答案:A

  • 第4题:

    Which two statements are true regarding transactions in an Oracle database()

    • A、Multiple transactions can use the same undo segment.
    • B、A transaction is assigned an undo segment when it is started.
    • C、More than one transaction cannot share the same extent in the undo tablespace.
    • D、The transactions use system undo segment to store undo data if all the segments in the undo tablespaceare used.

    正确答案:A,B

  • 第5题:

    Your company is designing its public network. The network will use an IPv4 range of 131.107.40.0/22.The network must be configured as shown in the following exhibit.You need to configure subnets for each segment. Which network addresses should you assign?()

    • A、Segment A: 131.107.40.0/23    Segment B: 131.107.42.0/24    Segment C: 131.107.43.0/25    Segment D: 131.107.43.128/27
    • B、Segment A: 131.107.40.0/25    Segment B: 131.107.40.128/26    Segment C: 131.107.43.192/27    Segment D: 131.107.43.224/30
    • C、Segment A: 131.107.40.0/23    Segment B: 131.107.41.0/24    Segment C: 131.107.41.128/25    Segment D: 131.107.43.0/27
    • D、Segment A: 131.107.40.128/23    Segment B: 131.107.43.0/24    Segment C: 131.107.44.0/25    Segment D: 131.107.44.128/27

    正确答案:A

  • 第6题:

    You have a single network segment. All servers run Windows Server 2003 Service Pack 2 (SP2). You have a DHCP server named Server1. Client computers receive IP addresses from Server1. You add a second network segment separated by a RFC 1542-compliant router. You need to ensure that computers in the new network segment can receive their IP configurations from Server1. You make the appropriate configuration changes on the router.  What should you do on Server1?()

    • A、Create a new scope.
    • B、Configure a DHCP Relay Agent.
    • C、Add an Extensions Path scope option.
    • D、Create a new exclusion range in the existing scope.

    正确答案:A

  • 第7题:

    单选题
    What is true regarding the OSPF Type 2 LSA?()
    A

    The DR floods this to describe the local stub network segment.

    B

    The ABR floods this to describe the local stub network segment.

    C

    The DR floods this to describe the local transit network segment.

    D

    Each OSPF router floods this to describe its interfaces and metrics.

    E

    The DR and BDR flood this to describe the local transit network segment.


    正确答案: E
    解析: 暂无解析

  • 第8题:

    单选题
    You specified segment space management as automatic for a tablespace. What effect would this have on space management?()
    A

    Extents would be managed by the freelists.

    B

    The segment would be managed by bitmaps.

    C

    The segment would be managed by the freelists.

    D

    Free space would be managed by the data dictionary.


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    The Testking corporate LAN consists of one large flat network. You decide to segment this LAN into two separate networks with a router. What will be the affect of this change?()
    A

    The number of broadcast domains will be decreased.

    B

    It will make the broadcasting of traffic between domains more efficient between segments.

    C

    It will increase the number of collisions.

    D

    It will prevent segment 1's broadcasts from getting to segment 2.

    E

    It will connect segment 1's broadcasts to segment 2.


    正确答案: E
    解析: 暂无解析

  • 第10题:

    多选题
    Regarding PAR (Positive Acknowledgement and Re-transmission), which of the answer choices below are correct?()
    A

    The source device will only retransmit lost packets on the request of the destination device.

    B

    The source device starts a timer when it sends a segment and retransmits if an acknowledgment is not received before the timer expires.

    C

    The destination device acknowledges receipt of a segment by sending a packet with a new sequence number and the ACK bit sent.

    D

    The destination device acknowledges receipt of a segment by sending a packet that indicates the next sequence number it expects.

    E

    If the destination device does not receive a segment, all segments are retransmitted.

    F

    The source device keeps a record of all segments sent and expects and acknowledgment of each.


    正确答案: A,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements about bigfile tablespaces are true? ()
    A

    The bigfile tablespace have only one data file.

    B

    The segment space management is automatic.

    C

    The extent management is dictionary managed.

    D

    The database can have only one bigfile tablespace.

    E

    The bigfile tablespace can be converted to a smallfile tablespace.


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements correctly describe the relation between a data file and the logical database structures()
    A

    An extent cannot spread across data files.

    B

    A segment cannot spread across data files.

    C

    A data file can belong to only one tablespace.

    D

    A data file can have only one segment created in it.

    E

    A data block can spread across multiple data files as it can consist of multiple operating system (OS)blocks


    正确答案: B,C
    解析: 暂无解析

  • 第13题:

    Which two statements correctly describe the relation between a data file and the logical databasestructures()

    • A、An extent cannot spread across data files.
    • B、A segment cannot spread across data files.
    • C、A data file can belong to only one tablespace.
    • D、A data file can have only one segment created in it.
    • E、A data block can spread across multiple data files as it can consist of multiple operating system (OS) blocks.

    正确答案:A,C

  • 第14题:

    What are two rules for compacting IPv6 addresses?()

    • A、The maximum number of times a double colon can replace a 16-bit segment that consists of all zeroes is two
    • B、The leading zeroes in any 16-bit segment do not have to be written.
    • C、Every 16-bit segment that consists of all zeroes can be represented with a single colon
    • D、The trailing zeroes in any 16-bit segment do not have to be written.
    • E、Any single, continuous string of one or more 16-bit segments that consists of all zeroes can be represented with a double colon
    • F、Two zeroes in the middle of any 16-bit segment do not have to be written

    正确答案:B,E

  • 第15题:

    You specified segment space management as automatic for a tablespace. What effect would this have on space management?()

    • A、Extents would be managed by the freelists.
    • B、The segment would be managed by bitmaps.
    • C、The segment would be managed by the freelists.
    • D、Free space would be managed by the data dictionary.

    正确答案:B

  • 第16题:

    You have a long-running process you want to assign to a specific UNDO segment brought online for that express purpose. You are not using automatic UNDO management. What statement can be used for this task? ()

    • A、ALTER DATABASE 
    • B、SET TRANSACTION 
    • C、ALTER ROLLBACK SEGMENT 
    • D、ALTER TABLE

    正确答案:B

  • 第17题:

    You are the administrator of a Windows XP Professional computer. You run five 16-bit applications on the computer. You want to monitor the performance of the computer when all five applications run at the same time. You use System Monitor to collect the performance data. The performance counters you want to include in your analysis are IO Read Bytes/sec, IO Write Bytes/sec, and Page Faults/sec. You want to ensure that you can collect these counters for each application. What should you do?() 

    • A、Run the five 16-bit applications in one process. Monitor each thread of Ntvdm.exe. 
    • B、Run each of the five 16-bit applications in its own memory space. Monitor each instance of Ntvdm.exe.  
    • C、Run the five 16-bit applications in Windows 95 compatibility mode. Monitor each instance of the applications. 
    • D、Start the five 16-bit applications by using the Start /normal command. Monitor each instance of the applications.

    正确答案:B

  • 第18题:

    单选题
    Your company is designing its public network. The network will use an IPv4 range of 131.107.40.0/22.The network must be configured as shown in the following exhibit.You need to configure subnets for each segment. Which network addresses should you assign?()
    A

    Segment A: 131.107.40.0/23    Segment B: 131.107.42.0/24    Segment C: 131.107.43.0/25    Segment D: 131.107.43.128/27

    B

    Segment A: 131.107.40.0/25    Segment B: 131.107.40.128/26    Segment C: 131.107.43.192/27    Segment D: 131.107.43.224/30

    C

    Segment A: 131.107.40.0/23    Segment B: 131.107.41.0/24    Segment C: 131.107.41.128/25    Segment D: 131.107.43.0/27

    D

    Segment A: 131.107.40.128/23    Segment B: 131.107.43.0/24    Segment C: 131.107.44.0/25    Segment D: 131.107.44.128/27


    正确答案: A
    解析: 暂无解析

  • 第19题:

    多选题
    Which two statements are true regarding transactions in an Oracle database()
    A

    Multiple transactions can use the same undo segment.

    B

    A transaction is assigned an undo segment when it is started.

    C

    More than one transaction cannot share the same extent in the undo tablespace.

    D

    The transactions use system undo segment to store undo data if all the segments in the undo tablespaceare used.


    正确答案: B,D
    解析: 暂无解析

  • 第20题:

    单选题
    Which statement is correct regarding IPv6 addresses?()
    A

    An IPv6 address consists of 128 bits separated into eight 16-bit hexadecimal sections.

    B

    An IPv6 address consists of 64 bits separated into four 16-bit hexadecimal sections.

    C

    An IPv6 address consists of 128 bits separated into sixteen 8-bit hexadecimal sections.

    D

    An IPv6 address consists of 64 bits separated into eight 8-bit hexadecimal sections.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    多选题
    What are two rules for compacting IPv6 addresses?()
    A

    The maximum number of times a double colon can replace a 16-bit segment that consists of all zeroes is two

    B

    The leading zeroes in any 16-bit segment do not have to be written.

    C

    Every 16-bit segment that consists of all zeroes can be represented with a single colon

    D

    The trailing zeroes in any 16-bit segment do not have to be written.

    E

    Any single, continuous string of one or more 16-bit segments that consists of all zeroes can be represented with a double colon

    F

    Two zeroes in the middle of any 16-bit segment do not have to be written


    正确答案: D,E
    解析: 暂无解析

  • 第22题:

    单选题
    Three IS-IS routers on a broadcast segment have different priority values configured. Which router is elected the DIS on that broadcast segment?()
    A

    the router with the lowest priority

    B

    the router with the highest priority

    C

    the router with the highest System ID

    D

    the router with the highest IP address


    正确答案: A
    解析: 暂无解析

  • 第23题:

    多选题
    What are two rules for compacting IPv6 addresses?()
    A

    Every 16 - bit segment segment that consists of all zeroes can be represented with a single colon.

    B

    The trailing zeroes in any 16 - bit  segment do not have to be written.

    C

    The leading zeroes in any 16 - bit segment do not have to be written.

    D

    Any single, continuous string of one or more 16 - bit segments that consists of all zeroes can be represented with a double colon.

    E

    The maximum number of times a double colon can replace a 16 - bit segment that consists of all zeroes is two.

    F

    Two zeroes in the middle of any 16 -bit segment do not have to be written.


    正确答案: E,C
    解析: 暂无解析

  • 第24题:

    单选题
    It can be inferred from the passage that which of the following is true for most consumer-goods markets?
    A

    The program target and the program audience are not usually identical.

    B

    The program audience and the market segment are usually identical.

    C

    The market segment and the program target are usually identical.

    D

    The program target is larger than the market segment.


    正确答案: C
    解析:
    由“mass marketing—a marketing approach that aims at a wide audience… marketing program exclusively to the program target.”得知消费品并不能实现只出售给计划目标,许多人都会受到他们并不感兴趣的产品营销的打扰。