单选题Which of the following is TRUE about the ping  -f command?()A It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the f in the command line. B It is useful for flooding from slow character based terminals since it only displays a dot . for each packet sent in fast mode. C It is useful for flooding from slow character based terminals since it only displays a dot .       for each packet sent and a backspace on returned in fast mode. D The command can only be run by root.

单选题
Which of the following is TRUE about the ping  -f command?()
A

 It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the f in the command line. 

B

 It is useful for flooding from slow character based terminals since it only displays a dot . for each packet sent in fast mode. 

C

 It is useful for flooding from slow character based terminals since it only displays a dot .       for each packet sent and a backspace on returned in fast mode. 

D

 The command can only be run by root.


参考解析

解析: 暂无解析

相关考题:

Regarding the extended ping command; which of the statements below are true?(Select all valid answer choices)A.The extended ping command is supported from user EXEC mode.B.The extended ping command is available from privileged EXEC mode.C.With the extended ping command you can specify the TCP and UDP port to be pinged.D.With the extended ping command you can specify the timeout value.E.With the extended ping command you can specify the datagram size.

The user SYS creates a job by using the following command:Which two statements are true about the job that was created by the preceding command?() A. The job is enabled by default after creationB. The job is automatically dropped after the end dateC. The job executes with the privileges of the user SYSD.

The user SYS creates a job by using the following command:Which two statements are true about the job that was created by the preceding command? ()(Choose two.) A. The job is enabled by default after creationB. The job is automatically dropped after the end dateC. The job executes with the privileges of the user SYSD. The globalization environment that exists at the time of the job creation prevails at the job runs

Which statement about the WebView submit command is true?() A. The submit command exits the GUI.B. The submit command reboots the WX device.C. The submit command saves and writes the configuration to flash.D. The submit command is the same as the commit CLI command.

Which of the following command line tools can be used to display the default gateway, IP address,and DNS servers currently being used by a host?() A.TRACERTB.IPCONFIG/ALLC.NSLOOKUPD.PING-T

The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?() A. The default administrative distance is used.B. The command is used to establish a static route.C. The command is used to configure the router interfaces.D. The command is used to establish a stub network.E. The subnet mask for the source address is 255.255.255.0

Exhibit: Which of the following are true regarding the command output shown in the display (Choose two.)()。 A.There are at least two routers participating in the RIP process.B.A ping to 192.168.168.2 will be successful.C.A ping to 10.0.15.2 will be successful.D.RtrA has three interfaces participating in the RIP process.

Which of the following statements about language is NOT true?A.Language is a system B.Language is symbol C.Animals also have language D.Language is arbitrary

The following configuration command was issued on router TK1:ip route 172.16.3.0 255.255.255.0 192.168.2.1.Which of the following statements are true regarding this command?()A、The command is used to establish a static route.B、The default administrative distance is used.C、The command is used to configure the default route.D、The subnet mask for the source address is 255.255.255.0E、The command is used to establish a stub network

Which of the following commands would result in the following output: M.M.M()。A、Ping 10.1.1.1 Data Pattern MB、Ping 10.1.1.1 timeout 0C、Ping 10.1.1.1 size 1500 df-bitD、Ping 10.1.1.1 source loopback 0E、Ping 10.1.1.1 size 1500F、Ping 10.1.1.1 size 1500 Strict

A technician is attempting to use a command line prompt to continuously ping a remote server to check availability and reliability of the connection. Which of the following provides the ping command needed to continuously ping the system?()A、ping -aB、ping -fC、ping -rD、ping -t

Which of the following is TRUE about a caching name server?()A、They must have a trusted SSL certificateB、They can be authoritativeC、They cannot be load-balancedD、They can be recursiveE、They require DHCP

Which of the following is TRUE about the ping  -f command?()A、 It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the "f" in the command line. B、 It is useful for flooding from slow character based terminals since it only displays a dot "." for each packet sent in fast mode. C、 It is useful for flooding from slow character based terminals since it only displays a dot "."       for each packet sent and a backspace on returned in fast mode. D、 The command can only be run by root.

Which statement is true about a Smurf attack?()A、It sends ping requests in segments of an invalid sizeB、It intercepts the third step in a TCP three-way handshake to hijack a sessionC、It sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemD、It uses Trojan horse applications to create a distributed collection of "zombie" computers, which can beused to launch a coordinated DDoS attack

The following configuration command was entered into a router:ip route 172.16.3.0 255.255.255.0 192.168.2.4 Which of the following statements are true regarding this configuration change?()A、The default administrative distance is used.B、The command is used to establish a static route.C、The command is used to configure the router interfaces.D、The command is used to establish a stub network.E、The subnet mask for the source address is 255.255.255.0

Which of the following switches in Windows can be used to ping a host until stopped?()A、-lB、-aC、-tD、-f

Which of the following ping commands would a technician use to ping continuously?()A、PING -lB、PING -RC、PING -tD、PING -a

Which of the following command line tools can be used to display the default gateway, IP address,and DNS servers currently being used by a host?()A、TRACERTB、IPCONFIG/ALLC、NSLOOKUPD、PING-T

A site administrator is configuring Command-level access control. Which of the following statements about Command-level access control are true? Command level access control policies: ()A、are mandatoryB、specify action group ExecuteCommandActionGroup for Controller commandsC、specify action group ViewCommandActionGroup for View commandsD、specify resource group ControllerCommandResourceGroup for Controller commandsE、specify resource group ViewCommandResourceGroup for View commands

In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()A、TCPB、UDPC、ICMPD、SMTP

Which statement about the WebView submit command is true?()A、The submit command exits the GUI.B、The submit command reboots the WX device.C、The submit command saves and writes the configuration to flash.D、The submit command is the same as the commit CLI command.

单选题Which of the following is TRUE about the book?AIt is the first world encyclopedic dictionaryBIt can help deaf people know about the world more easilyCIt took them sixteen years to finish the bookDIt includes medicine and art about the life of deaf people

单选题Which statement about the WebView submit command is true?()AThe submit command exits the GUI.BThe submit command reboots the WX device.CThe submit command saves and writes the configuration to flash.DThe submit command is the same as the commit CLI command.

单选题Which of the following switches in Windows can be used to ping a host until stopped?()A-lB-aC-tD-f

单选题A technician is attempting to use a command line prompt to continuously ping a remote server to check availability and reliability of the connection. Which of the following provides the ping command needed to continuously ping the system?()Aping -aBping -fCping -rDping -t

单选题Which of the following is true about the fuel injection with an ordinary diesel engine?()AThe process begins after TDCBThe process ends before TDCCWhen the piston is near to the TDC the fuel injection endsDNone of the above is true

单选题Which statement is true about a Smurf attack?()AIt sends ping requests in segments of an invalid sizeBIt intercepts the third step in a TCP three-way handshake to hijack a sessionCIt sends ping requests to a subnet, requesting that devices on that subnet send ping replies to a targetsystemDIt uses Trojan horse applications to create a distributed collection of zombie computers, which can beused to launch a coordinated DDoS attack