单选题Which of the following analyzes the entire subnet to identify all hosts that are active?()APing sweepBPacket snifferCTracerouteDPort scanner

单选题
Which of the following analyzes the entire subnet to identify all hosts that are active?()
A

Ping sweep

B

Packet sniffer

C

Traceroute

D

Port scanner


参考解析

解析: 暂无解析

相关考题:

Your ISP has assigned you the following IP address and subnet mask:IP address: 199.141.27.0Subnet mask: 255.255.255.240Which of the following addresses can be allocated to hosts on the resulting subnet?(Select all that apply)A. 199.141.27.2B. 199.141.27.175C. 199.141.27.13D. 199.141.27.11E. 199.141.27.208F. 199.141.27.112

Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?A. CDPB. SNMPC. DHCPD. ARPE. DNSF. None of the above

A network technician wants to use a packet analyzer to troubleshoot a reported problem with auser‘s workstation with IP address 192.168.1.45. To identify the workstation‘s packets thetechnician wants to use the workstation‘s MAC address.Which of the following protocols would provide the needed information?()A.DHCPB.ARPC.DNSD.PING

Which of the following monitors a server to see which protocols might be in use?() A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer

Which of the following solutions will detect and disable a rogue access point?() A.Port scanB.Packet snifferC.IPSD.IDS

Which of the following is used to identify active hosts along with their network addresses?() A.Port scanB.Ping sweepC.IDSD.NIPS

Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?() A.255.255.255.0B.255.255.254.0C.255.255.252.0D.255.255.248.0

Which of the following ping parameters will set the size of the outgoing packet?()A、–cB、iC、RD、–s

Which of the following solutions will detect and disable a rogue access point?()A、Port scanB、Packet snifferC、IPSD、IDS

Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer

Which of the following are TACACS+ characteristics?(Choose all that apply.)()A、Cisco proprietaryB、Standards-based protocolC、Provides separate services for authentication, authorization, and accountingD、Encrypts only the passwordE、Uses UDP for a transport layerF、Encrypts the entire packet

Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()A、CDPB、SNMPC、DHCPD、ARPE、DNSF、None of the above

While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()A、ping 192.168.1.255B、ping with sweep optionC、ping 192.168.1.127D、ping 192.168.1.64E、ping with broadcast option

A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING

Which of the following analyzes the entire subnet to identify all hosts that are active?()A、Ping sweepB、Packet snifferC、TracerouteD、Port scanner

Which of the following is used to identify active hosts along with their network addresses?()A、Port scanB、Ping sweepC、IDSD、NIPS

Which of the following tools can be used to identify the location of a network outage?()A、tracerouteB、netstatC、nslookupD、ping

Which of the following commands verifies connectivity between two hosts?()A、chkntfsB、dxdiagC、tracertD、ipconfigE、ping

Which of the following commands should be used to identify packet sequence problems?()A、 ping and arpB、 lsattr and ifconfigC、 netstat and iostatD、 iptrace and tcpdump

多选题Which of the following are TACACS+ characteristics?(Choose all that apply.)()ACisco proprietaryBStandards-based protocolCProvides separate services for authentication, authorization, and accountingDEncrypts only the passwordEUses UDP for a transport layerFEncrypts the entire packet

单选题Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()ACDPBSNMPCDHCPDARPEDNSFNone of the above

单选题Which of the following commands should be used to identify packet sequence problems?()A ping and arpB lsattr and ifconfigC netstat and iostatD iptrace and tcpdump

单选题Which of the following is used to identify active hosts along with their network addresses?()APort scanBPing sweepCIDSDNIPS

单选题The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()Aermit all packet smatching the first three octets of the source address to all destinationsBpermit all packet matching the last octet of the destination address and accept all source addressesCpermit all packet matching the host bits in the source address to all destinationsDpermit all packet from the third subnet of the network address to all destinations

单选题The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()Aermit all packets matching the first three octets of the source address to all destinationsBpermit all packet matching the last octet of the destination address and accept all source addressesCpermit all packet matching the host bits in the source address to all destinationsDpermit all packet from the third subnet of the network address to all destinations

单选题Which of the following ping parameters will set the size of the outgoing packet?()A–cBiCRD–s

单选题An administrator needs a network that can support up to 800 hosts on the same subnet. Which of the following is the MINIMUM subnet mask that should be used?()A255.0.0.0B255.255.0.0C255.255.252.0D255.255.255.0