单选题A gateway machine has access to the Internet and is trying to reach a machine on the Internet called cactus.org. Although the gateway machine cannot reach cactus.org, another network across town is able to reach cactus.org. Furthermore, the gateway machine can reach the network across town, but cannot ping the cactus.org. Which of the following tools will best help diagnose the location of the problem?()AiptraceBnetstatCtcpdumpDtraceroute

单选题
A gateway machine has access to the Internet and is trying to reach a machine on the Internet called cactus.org. Although the gateway machine cannot reach cactus.org, another network across town is able to reach cactus.org. Furthermore, the gateway machine can reach the network across town, but cannot ping the cactus.org. Which of the following tools will best help diagnose the location of the problem?()
A

iptrace

B

netstat

C

tcpdump

D

traceroute


参考解析

解析: 暂无解析

相关考题:

Peter has been trying for an hour, but his car still ( )start. A、wouldn’tB、hasn'tC、didn'tD、won't

代理服务器很为重要的一点就是它有一种防火墙的功能,从而一定程度上保证了安全性。而这种功能是由()决定的。 A.Internet链路级网关(Gateway)B.Internet控制级网关(Gateway)C.Internet局部级网关(Gateway)D.Internet逻辑级网关(Gateway)

In your database, the LDAP_DIRECTORY_SYSAUTH initialization parameter has been set to YES and the users who need to access the database as DBAs have been granted SYSDBA enterprise role in Oracle Internet Directory (OID). SSL and the password file have been configured. A user SCOTT with the SYSDBA privilege tries to connect to the database instance from a remote machine using the command:Which authentication method would be used first?()A. authentication by password fileB. authentication by using certificates over SSLC. authentication by using the Oracle Internet DirectoryD. authentication by using the local OS of the database server

A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters.Which of the following can be implemented to provide Internet access for all the employees?()A. MulticastingB. Proxy serverC. NATD. Subnetting

For client computers to access the Internet when using DHCP, the DHCP server must have configurations for at LEAST which of the following? () A. Gateway addressB. SNA serverC. Mail serverD. Web serverE. Subnet mask

TestKing has 25 computers and decides to connect the network to the Internet.TestKing would like for all of the computers to have access to the Internet at the same time, but TestKing only has four usable publicly routable IP addresses.What should be configured on the router so that all computers can connect to the Internet simultaneously?()A. Static NATB. Global NATC. Dynamic NATD. Static NAT with ACLsE. Dynamic NAT with overload

代理服务器很为重要的一点就是它有一种防火墙的功能,从而一定程度上保证了安全性。而这种功能是由()决定的。A、Internet链路级网关(Gateway)B、Internet控制级网关(Gateway)C、Internet局部级网关(Gateway)D、Internet逻辑级网关(Gateway)

A new server was installed. Most clients are located in the same subnet as the server and can successfully access the server. Clients located on different subnets have been unable to access the server, but have no trouble accessing other servers on their subnet.  Which of the following is the reason that these clients are unable to access the server?()A、 DHCP has assigned the wrong addresses.B、 Incorrect default gateway on the server.C、 DNS entries were not created.D、 WINS server is not responding.

our company has a main office and one branch office. All servers run Windows Server 2003 Service Pack 2 (SP2). The main office has a third-party gateway device named Gateway1.  Gateway1 is connected to the internal network and the Internet. Gateway1 supports IPSec. In the branch office, you have a server named Server1. You create an IPSec policy on Server1. You need to ensure that Server1 can establish an IPSec tunnel to Gateway1.  What should you use to configure the IPSec policy?()A、an IP filter that allows only Internet Control Message Protocol (ICMP) trafficB、an IP filter that allows only TCP traffic on port 1701C、a pre-shared key for authenticationD、Kerberos authentication

The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()A、A new default gateway has been setup.B、A new Internet shortcut has been added.C、A new web browser has been installed and is now the default.D、A proxy server has been enabled.

TestKing has 25 computers and decides to connect the network to the Internet.TestKing would like for all of the computers to have access to the Internet at the same time, but TestKing only has four usable publicly routable IP addresses.What should be configured on the router so that all computers can connect to the Internet simultaneously?()A、Static NATB、Global NATC、Dynamic NATD、Static NAT with ACLsE、Dynamic NAT with overload

A virus has been removed from the user’s machine, but the user still cannot access the Internet.Which of the following should the technician check NEXT?()A、Disable port forwarding on the router.B、Reboot to Safe Mode and see if the Internet is accessible.C、Format the machine and reinstall the OS.D、Check the web browser’s proxy settings.

For client computers to access the Internet when using DHCP, the DHCP server must have configurations for at LEAST which of the following? ()A、 Gateway addressB、 SNA serverC、 Mail serverD、 Web serverE、 Subnet mask

A technician notices a machine’s performance has degraded. The machine has constant errorswhen trying to read data from the drive. Which of the following should be used to repair the disk errors?()A、DEFRAGB、MSCONFIGC、EDITD、CHKDSK

Which of the following has NO effect on controlling the access permissions needed to run the "date" command on the remote machine "Earth" using the following syntax?rsh Earth date()。A、The local file: /etc/.netrcB、The remote file: ~/ .rhostsC、The securetcpip commandD、The remote file: /etc/hosts.equiv

A machine must have the most direct access possible to two different networks.  However, it cannot act as a router between the networks.  Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()A、ipforwarding turned on and two adaptersB、One adapter, with a route to a default gatewayC、An adapter in each network, and ipforwarding offD、An adapter in each network, with a route only to the default gateway

A gateway machine has access to the Internet and is trying to reach a machine on the Internet called cactus.org. Although the gateway machine cannot reach cactus.org, another network across town is able to reach cactus.org. Furthermore, the gateway machine can reach the network across town, but cannot ping the cactus.org. Which of the following tools will best help diagnose the location of the problem?()A、iptraceB、netstatC、tcpdumpD、traceroute

Cer-tech .com has a Windows Server 2008 server named S1. You have installed Web Server (IIS) serverrole on S1. The server has an SMTP gateway that connects to the internet. You have an internal firewallinstalled on the network which prevents all client machines from establishing a connection to the internetexcept the SMTP gateway over TCP port 25.You configure the SMTP gateway to relay e-mail for S1. What should you do to configure a website on S1 to send email to internet users?()A、Install and configure SMTP server feature on S1B、Configure the SMTP email feature for the website on S1C、Create a DNS server on S1 and configure the SMTP mail serviceD、Create an MX record for the SMTP gateway on an internal DNS serverE、None of the above

Your company runs Remote Desktop Services. You have a Remote Desktop Web Access (RD Web Access) server. You publish several applications on the internal networ k by using RD Web Access. You need to ensure that the published applications are accessible from the Internet via an HTTPS connection over port 443. What should you do first?()A、Use Internet Information Services (IIS) Manager to disable Forms Authentication .B、Use Internet Information Services (IIS) Manager to enable Windows Authentication.C、Install and configure the Remote Desktop Gateway (RD Gateway) role service on the RD Web Access server.D、Install and configure the Remote Desktop Connection Broker (RD Connection Broker) role service on the RD Web Access server.

You want to connect to your company network from your Windows 2000 Professional computer at home. You have an ISDN line that is used for internet connectivity. You create a VPN connection and are able to connect successfully to the company network. While connected to the company network, you are unable to access the Internet.   What must you do so that you can access the Internet?()A、Configure the ISDN connection to use SLIP instead of PPP.B、Select the Enable Internet Connection Sharing for this connection check box in the ISDN connection properties.C、Clear the Use default gateway on remote network check box.D、Install and configure the SAP Agent service.

You have a server that runs Windows Server 2008. The server has the Terminal Services Gateway (TS Gateway) role service installed.  You need to provide a security group access to the TS Gateway server. What should you do?()A、Add the security group to the Remote Desktop Users group.B、Add the security group to the TS Web Access Computers group.C、Create and configure a Resource Authorization Policy.D、Create and configure a Connection Authorization Policy.

单选题our company has a main office and one branch office. All servers run Windows Server 2003 Service Pack 2 (SP2). The main office has a third-party gateway device named Gateway1.  Gateway1 is connected to the internal network and the Internet. Gateway1 supports IPSec. In the branch office, you have a server named Server1. You create an IPSec policy on Server1. You need to ensure that Server1 can establish an IPSec tunnel to Gateway1.  What should you use to configure the IPSec policy?()Aan IP filter that allows only Internet Control Message Protocol (ICMP) trafficBan IP filter that allows only TCP traffic on port 1701Ca pre-shared key for authenticationDKerberos authentication

单选题You need to recommend a solution for controlling access to the Internet.The solution must meet the museum’s security polic. What should you include in the recommendation?()AFile Server Resource Manager (FSRM) file screens and Group Policy objects (GPOs)BMicrosoft Forefront Threat Management Gateway (TMG) 2010CMicrosoft Forefront Unified Access Gateway (UAG) 2010DWindows Firewall with Advanced Security and Group Policy objects (GPOs)

单选题A new company has been given one public IP address. The company employs 200 users requiring Internet access from the headquarters. Which of the following can be implemented to provide Internet access for all the employees?()AMulticastingBProxy serverCNATDSubnetting

单选题A machine must have the most direct access possible to two different networks.  However, it cannot act as a router between the networks.  Which of the following arrangements is most appropriate to facilitate the machine’s accessibility?()Aipforwarding turned on and two adaptersBOne adapter, with a route to a default gatewayCAn adapter in each network, and ipforwarding offDAn adapter in each network, with a route only to the default gateway

单选题Which Cisco product is a software component that blocks unwanted connections and provides other gateway security functions for small business?()ACisco Internetwork Operating System (IOS) FirewallBCisco Secure Access Control Server (ACS)CCisco Firewall Services Module (FWSM)DCisco Private Internet Exchange (PIX) Firewall

单选题The technician has suspicions that a browser has been hijacked. Which of the following should the technician look for in this situation?()AA new default gateway has been setup.BA new Internet shortcut has been added.CA new web browser has been installed and is now the default.DA proxy server has been enabled.

单选题TestKing has 25 computers and decides to connect the network to the Internet.TestKing would like for all of the computers to have access to the Internet at the same time, but TestKing only has four usable publicly routable IP addresses.What should be configured on the router so that all computers can connect to the Internet simultaneously?()AStatic NATBGlobal NATCDynamic NATDStatic NAT with ACLsEDynamic NAT with overload