when the system upon which a transport entity is running fails and subsequently reatarts,the()information of all active connections is lost.the affected connections become half-open,as the side that did not fail does not yet realize the promble. The still

题目

when the system upon which a transport entity is running fails and subsequently reatarts,the()information of all active connections is lost.the affected connections become half-open,as the side that did not fail does not yet realize the promble. The still active side of a half-open connections using a()timer.this timer measures the time transport machine will continue to await an()of a transmitted segment after the segment has been retransmitted the maximum number of times.when the timer(),the transport entity assumes that either the other transport entity or the intervening network has failed.as a result,the timer closes the connection,and signals an abnormal close to the TS user. In the event that a transport entity fails and quickly restart,half-open connections can be teminated more quickly by the use of the RST segment.the failed side returns an RST I to every segment I that it receives.when the RST I reaches the other side,it must be checked for validity dased on the ()number I,as the RST could be in response to an old segment .if the reset is valid,the transport entity performs an abnormal termination.

A.data B.state C.signal D.control A.give-up B.abandon C.quit D.connection A.reset B.acknowledgment C.sequence D.synchroizer A.stops B.restarts C.expires D.abandons A.sequence B.acknowledgment C.connection D.message


相似考题
更多“when the system upon which a transport entity is running fails and subsequently reatarts,the()information of all active connections is lost.the affected connections become half-open,as the side that did not fail does not yet realize the promble. The still”相关问题
  • 第1题:

    Which is true when describing a connection replication in Cisco ACE?()

    • A、 It is not supported for SSL connections.
    • B、 It is not supported for non-SSL connections.
    • C、 It can only be configured manually.
    • D、 It has a maximum limit of 50,000 replicated connections.

    正确答案:A

  • 第2题:

    Which of the following is TRUE about the ate program?()

    • A、When running ate for the first time it will prompt for all the required information and configure all the required devices
    • B、The program is used by cu to communicate to a remote system
    • C、The program is used for remote communications between the host and a remote system using a modem or null modem via a tty port
    • D、The program ate calls cu to communicate with the remote system

    正确答案:C

  • 第3题:

    Which command shows your active Telnet connections?()

    • A、show session
    • B、show cdp neighbors
    • C、show users
    • D、show queue

    正确答案:A

  • 第4题:

    Which of the following commands will show all active TCP/IP network connections?()

    • A、PING
    • B、NETSTAT
    • C、NET
    • D、TRACERT

    正确答案:B

  • 第5题:

    You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command:   LSNRCTL>STATUS listener1   Which information will NOT be displayed when you issue the above command?() 

    • A、 whether the password is set in the listener or a file or not
    • B、 the number of client connections the service handler has refused
    • C、 the information will be displayed whether the instance can accept connections or not
    • D、 the protocol addresses on which the listener is configured to listen

    正确答案:B

  • 第6题:

    You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to get a list of all the open connections on the server and all the port numbers used by the connections. Which tool should you use?()

    • A、Nbtstat
    • B、Netsh
    • C、Netstat
    • D、Nslookup

    正确答案:C

  • 第7题:

    多选题
    A Mysql instance is running on a dedicated server. Developers access the server from the same network subnet. Users access the database through an application that is running on a separate server in a DMZ. Which two will optimize the security of this setup?()
    A

    Disabling connections from named pipes or socket files (depending on the operating system of the server)

    B

    Enabling and using SSL for connections to the Mysql database

    C

    Installing Mysql on the application server, and running the database and application on the same server

    D

    Starting the server with – bind- address=0.0.0.0 specified

    E

    Running the server with – skip-networking specified

    F

    Limiting logins to originate from the application server or the server's subnet'


    正确答案: A,E
    解析: 暂无解析

  • 第8题:

    单选题
    When Robert discovered that the company was engaged in dishonest business, he immediately _____ all connections with it.
    A

    offset

    B

    separated

    C

    severed

    D

    vanquished


    正确答案: C
    解析:
    sever意为“切断、分开”。offset意为“补偿”和compensate及make up意思相同。separate意为“分开,分居”。vanquish意为“打败,克服”。句意为:当他发现公司在从事不诚信交易后,立即断绝了与公司的一切联系。

  • 第9题:

    多选题
    Which two statements are true regarding the starting of the database instance using the following command?() SQL>STARTUP UPGRADE
    A

    It enables all system triggers.

    B

    It allows only SYSDBA connections.

    C

    It ensures that all job queues remain active during the upgrade process.

    D

    It sets system initialization parameters to specific values that are required to enable database upgrade scripts to be run.


    正确答案: C,B
    解析: 暂无解析

  • 第10题:

    What is meant by the term "firewall sandwich"?()

    • A、multiple layers of firewalling
    • B、a method of operating firewalls from multiple vendors
    • C、firewall connections in either an active or standby state
    • D、an architecture in which all traffic between firewalls goes through application-specific servers
    • E、an architecture in which all traffic between firewalls goes through application-specific gateways

    正确答案:A

  • 第11题:

    How does the Juniper DX accelerate web servers? ()

    • A、by translating HTTP requests to HTTPS
    • B、by refusing client connections that are unnecessarily refreshed by end users
    • C、by multiplexing numerous client-side connections to fewer server-side connections
    • D、by multiplexing numerous server-side connections to fewer client-side connections

    正确答案:C

  • 第12题:

    When the system upon which a transport entity is running fails and subsequently restarts,the(21) information of all active connections is lost. The affected connections become half-open, as the side that did not fail does not yet realize the problem.The still active side of a half-open connections can close the connection using a(22)timer. This timer measures the time the transport machine will continue to await an (23) of a transmitted segment after the segment has been retransmitted the maximum number of times.When the timer (24),the transport entity assumes that either the other transport entity or the intervening network has failed. As a result, the timer closes the connection, and signals an abnormal close to the TS user. In the event that a transport entity fails and quickly restarts, half-open connections can be terminated more quickly by the use of the RST segment, the failed side returns an RST i to every segment i that it receives. When the RST i reaches the other side, it must be checked for validity based on the (25) number i, as the RST could be in response to an old segment. If the reset is valid, the transport entity performs an abnormal termination. 空白处(25)应选择()

    • A、sequence
    • B、acknowledgment
    • C、connection
    • D、message

    正确答案:A

  • 第13题:

    An administrator adds a new SATA hard drive into a functional server and attempts to boot the server. The server will no longer boot into the operating system. The administrator checks all the connections and reboots the server. The server still will not load the operating system.  Which of the following is the MOST probable cause?()

    • A、The BIOS is set with the wrong boot order.
    • B、The jumpers have not been set on the hard drive.
    • C、The hard drive is not compatible with the system board.
    • D、The boot.ini file needs to be modified.

    正确答案:A

  • 第14题:

    Which two statements are true regarding the starting of the database instance using the following command?() SQL>STARTUP UPGRADE  

    • A、 It enables all system triggers.
    • B、 It allows only SYSDBA connections.
    • C、 It ensures that all job queues remain active during the upgrade process.
    • D、 It sets system initialization parameters to specific values that are required to enable database upgrade scripts to be run.

    正确答案:B,D

  • 第15题:

    You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()

    • A、Encrypt customer information when it is stored and when it is being transmitted
    • B、Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network
    • C、Encrypt all marketing information on file servers and client computers
    • D、Require encrypted connections to all file servers

    正确答案:A

  • 第16题:

    单选题
    You are maintaining the database of a company. The listener process, listener1, is configured for remote access. You have issued the following command:   LSNRCTL>STATUS listener1   Which information will NOT be displayed when you issue the above command?()
    A

     whether the password is set in the listener or a file or not

    B

     the number of client connections the service handler has refused

    C

     the information will be displayed whether the instance can accept connections or not

    D

     the protocol addresses on which the listener is configured to listen


    正确答案: B
    解析: 暂无解析

  • 第17题:

    单选题
    Which is true when describing a connection replication in Cisco ACE?()
    A

     It is not supported for SSL connections.

    B

     It is not supported for non-SSL connections.

    C

     It can only be configured manually.

    D

     It has a maximum limit of 50,000 replicated connections.


    正确答案: B
    解析: 暂无解析

  • 第18题:

    单选题
    What is meant by the term "firewall sandwich"?()
    A

    multiple layers of firewalling

    B

    a method of operating firewalls from multiple vendors

    C

    firewall connections in either an active or standby state

    D

    an architecture in which all traffic between firewalls goes through application-specific servers

    E

    an architecture in which all traffic between firewalls goes through application-specific gateways


    正确答案: C
    解析: 暂无解析