单选题Which action does the ping 172.18.1.1 size 5 command perform?()A It sends only five ping requests to the 172.18.1.1 destination.B It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.C It sends five rapid ping req

题目
单选题
Which action does the ping 172.18.1.1 size 5 command perform?()
A

It sends only five ping requests to the 172.18.1.1 destination.

B

It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.

C

It sends five rapid ping requests to the 172.18.1.1 destination.

D

It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.


相似考题
更多“单选题Which action does the ping 172.18.1.1 size 5 command perform?()A It sends only five ping requests to the 172.18.1.1 destination.B It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.C It sends five rapid ping req”相关问题
  • 第1题:

    Which command is used to debug a ping command?()

    • A、debug icmp
    • B、debug ip icmp
    • C、debug tcp
    • D、debug packet

    正确答案:B

  • 第2题:

    Which of the following ping parameters will set the size of the outgoing packet?()

    • A、–c
    • B、i
    • C、R
    • D、–s

    正确答案:D

  • 第3题:

    Communication with a remote host has failed.  Which command is LEAST helpful in isolating the failure?()

    • A、 ping RemoteHostName 
    • B、 ping RemoteHostIPaddr 
    • C、 nslookup RemoteHostName 
    • D、 ping lo0

    正确答案:D

  • 第4题:

    A router receives an IPv6 packet which is 2000 bytes in length. The MTU of the outgoing interface is 1500 bytes. What action will the router take?()

    • A、forwards the packet
    • B、fragments the packet
    • C、drops the packet silently
    • D、drops the packet and sends an ICMP message

    正确答案:D

  • 第5题:

    采用PING方式进行城区DT短呼测试时,每次PING包测试(成功或超时)间隔为10秒,PING包超时时间为5秒,PING包长为32Bytes。


    正确答案:错误

  • 第6题:

    While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()

    • A、ping 192.168.1.255
    • B、ping with sweep option
    • C、ping 192.168.1.127
    • D、ping 192.168.1.64
    • E、ping with broadcast option

    正确答案:C

  • 第7题:

    What happens when you issue the ping 172.19.102.2 count 5 command?()

    • A、ICMP echo requests are sent to 172.19.102.2 in five-millisecond intervals.
    • B、ICMP echo requests are sent to 172.19.102.2 until five packets are dropped.
    • C、ICMP echo requests are sent to 172.19.102.2 five times.
    • D、ICMP echo requests are sent continuously to 172.19.102.2 for five seconds.

    正确答案:C

  • 第8题:

    单选题
    Which command is used to debug a ping command?()
    A

    debug icmp

    B

    debug ip icmp

    C

    debug tcp

    D

    debug packet


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    What happens when you issue the ping 172.19.102.2 count 5 command?()
    A

    ICMP echo requests are sent to 172.19.102.2 in five-millisecond intervals.

    B

    ICMP echo requests are sent to 172.19.102.2 until five packets are dropped.

    C

    ICMP echo requests are sent to 172.19.102.2 five times.

    D

    ICMP echo requests are sent continuously to 172.19.102.2 for five seconds.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    If the PFE does not have a route to the destination address of a packet, which action will be taken?()
    A

    The PFE floods the packet out of all interfaces.

    B

    The PFE drops the packet and sends a destination unreachable notification back to source device.

    C

    The PFE forwards the packet to the routing engine for furtherprocessing.

    D

    The PFE queues the packet and sends are quest for a layer3 lookup to the routing engine.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which action does the ping 172.18.1.1 size 5 command perform?()
    A

    It sends only five ping requests to the 172.18.1.1 destination.

    B

    It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.

    C

    It sends five rapid ping requests to the 172.18.1.1 destination.

    D

    It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following ping parameters will set the size of the outgoing packet?()
    A

    –c

    B

    i

    C

    R

    D

    –s


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which of the following commands would result in the following output: M.M.M()。

    • A、Ping 10.1.1.1 Data Pattern M
    • B、Ping 10.1.1.1 timeout 0
    • C、Ping 10.1.1.1 size 1500 df-bit
    • D、Ping 10.1.1.1 source loopback 0
    • E、Ping 10.1.1.1 size 1500
    • F、Ping 10.1.1.1 size 1500 Strict

    正确答案:C

  • 第14题:

    A technician is attempting to use a command line prompt to continuously ping a remote server to check availability and reliability of the connection. Which of the following provides the ping command needed to continuously ping the system?()

    • A、ping -a
    • B、ping -f
    • C、ping -r
    • D、ping -t

    正确答案:D

  • 第15题:

    Which action does the ping 172.18.1.1 size 5 command perform?()

    • A、It sends only five ping requests to the 172.18.1.1 destination.
    • B、It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.
    • C、It sends five rapid ping requests to the 172.18.1.1 destination.
    • D、It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.

    正确答案:B

  • 第16题:

    Which CLI command will ping destination 10.0.29.1 ten times and display the incoming interface of the received packet?()

    • A、ping count 10 10.0.29.1 detail
    • B、ping number 10 10.0.29.1 detail
    • C、ping count 10 10.0.29.1 extensive
    • D、ping number 10 10.0.29.1 extensive

    正确答案:A

  • 第17题:

    Which statement is true about a Smurf attack?()

    • A、It sends ping requests in segments of an invalid size
    • B、It intercepts the third step in a TCP three-way handshake to hijack a session
    • C、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem
    • D、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

    正确答案:C

  • 第18题:

    Which of the following ping commands would a technician use to ping continuously?()

    • A、PING -l
    • B、PING -R
    • C、PING -t
    • D、PING -a

    正确答案:C

  • 第19题:

    If the PFE does not have a route to the destination address of a packet, which action will be taken?()

    • A、The PFE floods the packet out of all interfaces.
    • B、The PFE drops the packet and sends a destination unreachable notification back to source device.
    • C、The PFE forwards the packet to the routing engine for furtherprocessing.
    • D、The PFE queues the packet and sends are quest for a layer3 lookup to the routing engine.

    正确答案:B

  • 第20题:

    单选题
    A router receives an IPv6 packet which is 2000 bytes in length. The MTU of the outgoing interface is 1500 bytes. What action will the router take?()
    A

    forwards the packet

    B

    fragments the packet

    C

    drops the packet silently

    D

    drops the packet and sends an ICMP message


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    Click the Exhibit button. Based on the exhibit, client PC 192.168.10.10 cannot ping 1.1.1.2. Which is a potential cause for this problem?()
    A

    The untrust zone does not have a management policy configured.

    B

    The trust zone does not have ping enabled as host-inbound-traffic service.

    C

    The security policy from the trust zone to the untrust zone does not permit ping.

    D

    No security policy exists for the ICMP reply packet from the untrust zone to the trust zone.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    Which statement is true about a Smurf attack?()
    A

    It sends ping requests in segments of an invalid size

    B

    It intercepts the third step in a TCP three-way handshake to hijack a session

    C

    It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystem

    D

    It uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Communication with a remote host has failed.  Which command is LEAST helpful in isolating the failure?()
    A

     ping RemoteHostName 

    B

     ping RemoteHostIPaddr 

    C

     nslookup RemoteHostName 

    D

     ping lo0


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    A technician is attempting to use a command line prompt to continuously ping a remote server to check availability and reliability of the connection. Which of the following provides the ping command needed to continuously ping the system?()
    A

    ping -a

    B

    ping -f

    C

    ping -r

    D

    ping -t


    正确答案: D
    解析: 暂无解析