单选题Which of the following is used to identify active hosts along with their network addresses?()APort scanBPing sweepCIDSDNIPS

单选题
Which of the following is used to identify active hosts along with their network addresses?()
A

Port scan

B

Ping sweep

C

IDS

D

NIPS


参考解析

解析: 暂无解析

相关考题:

Which of the following terms is used to identify the pressure of the liquid entering a pump?A.Suction headB.Pump headC.Discharge headD.Total head

Which of the following is used to identify active hosts along with their network addresses?() A.Port scanB.Ping sweepC.IDSD.NIPS

Which of the following tools is used to show the active routes on a workstation?() A.nbstatB.arp -aC.arp pingD.netstat -r

When selecting a Network Interface Card (NIC), which of the following factors need to be considered?() A. The type of application used on the networkB. The type of system bus used by the computersC. The type of memory installed in each computerD. The type of media used in the network topologyE. The type of protocols used in the networkF. The physical layout of the network hosts

Which of the following IP hosts would be valid for PC users, assuming that a /27 network mask was used for all of the networks?() A.15.234.118.63B.83.121.178.93C.134.178.18.56D.192.168.19.37E.201.45.116.159F.217.63.12.192

What is the purpose of a network mask?()A、It is used to identify the maximum hop count of a subnetworkB、It is used to identify an IP address as either private or publicC、It is used to identify the network to which an IP address belongsD、It is used to identify the total number of bits present in an IP address

An administrator needs a network that can support up to 800 hosts on the same subnet. Which of the following is the MINIMUM subnet mask that should be used?()A、255.0.0.0B、255.255.0.0C、255.255.252.0D、255.255.255.0

When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()A、The type of application used on the networkB、The type of system bus used by the computersC、The type of memory installed in each computerD、The type of media used in the network topologyE、The type of protocols used in the networkF、The physical layout of the network hosts

Which of the following analyzes the entire subnet to identify all hosts that are active?()A、Ping sweepB、Packet snifferC、TracerouteD、Port scanner

Which of the following is used to identify active hosts along with their network addresses?()A、Port scanB、Ping sweepC、IDSD、NIPS

A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()A、Cable testerB、MultimeterC、Loop back plugsD、Crossover cable

Which of the following tools can be used to identify the location of a network outage?()A、tracerouteB、netstatC、nslookupD、ping

Which of the following is used to produce the best LCD image on a laptop?()A、Dual scanB、Active matrixC、Passive matrixD、Active scanning

When dividing an existing Class B network into 2 subnets of 32,766 hosts each, which of the following subnet masks should be used?()A、128.0.0.0B、255.128.0.0C、255.254.0.0D、255.255.128.0

Which of the following commands should be used to identify packet sequence problems?()A、 ping and arpB、 lsattr and ifconfigC、 netstat and iostatD、 iptrace and tcpdump

Which of the following command can be used to identify all PCI hot plug slots on a server and their characteristics()A、lsattr -l pciB、lscfg -vl pciC、lsdev -c slotD、lsslot -c pci -a

Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。A、~/ .rhostsB、$HOME/.netrcC、/etc/hosts.equivD、/etc/security/user

Which of the following commands can be used to identify all PCI hot plug slots on a server and their characteristics?()A、lsattr -l pciB、lscfg -Cc pciC、lsconn -p pci -aD、lsslot -c pci -a

A system administrator has a server that is performing poorly. The vmstat command identifies that high CPU usage is the problem. Which of the following commands can be used to identify the eight most active processes running on the server?()A、ps -ef -t8B、sar -u -p 8C、vmstat -t 8D、topas -p8 -n0 -d0

What is the purpose of a network mask?()A、It is used to identify the maximum hop count of a subnetwork.B、It is used to identify an IP address as either private or public.C、It is used to identify the network to which an IP address belongs.D、It is used to identify the total number of bits present in an IP address.

单选题Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。A~/ .rhostsB$HOME/.netrcC/etc/hosts.equivD/etc/security/user

多选题When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()AThe type of application used on the networkBThe type of system bus used by the computersCThe type of memory installed in each computerDThe type of media used in the network topologyEThe type of protocols used in the networkFThe physical layout of the network hosts

单选题Which of the following commands should be used to identify packet sequence problems?()A ping and arpB lsattr and ifconfigC netstat and iostatD iptrace and tcpdump

多选题Which of the following IP hosts would be valid for PC users, assuming that a /27 network mask was used for all of the networks?()A15.234.118.63B83.121.178.93C134.178.18.56D192.168.19.37E201.45.116.159F217.63.12.192

单选题What is the purpose of a network mask?()AIt is used to identify the maximum hop count of a subnetworkBIt is used to identify an IP address as either private or publicCIt is used to identify the network to which an IP address belongsDIt is used to identify the total number of bits present in an IP address

单选题What is the purpose of a network mask?()AIt is used to identify the maximum hop count of a subnetwork.BIt is used to identify an IP address as either private or public.CIt is used to identify the network to which an IP address belongs.DIt is used to identify the total number of bits present in an IP address.

单选题Which of the following routing components is used for sending messages to other SMTP hosts?()ARouting groupBSend connectorCDNSDDelivery agent

单选题Which of the following commands should be used to list all of the active network interfaces on a system?()AlscfgBrouteCnetstatDentstat