单选题The monitor traffic command closely resembles which UNIX-based utility?()Aps -xBpasswdCls -a-lDtcpdump

单选题
The monitor traffic command closely resembles which UNIX-based utility?()
A

ps -x

B

passwd

C

ls -a-l

D

tcpdump


参考解析

解析: 暂无解析

相关考题:

When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?() A. snoopB. tcpdumpC. monitorD. tail

Which command would you use to view interface usage details in real time?() A. show interfaces terseB. show interfaces extensiveC. monitor interface trafficD. monitor traffic interface

Which command sequence shows traffic per queue for an interface?() A.show interfaces queue ge-0/0/0B.show statistics queue detailC.show interfaces ge-0/0/0 statistics extensiveD.monitor interface ge-0/0/0 queue

The monitor traffic command provides access to which utility?() A.tcpdumpB.telnetC.tracerouteD.netstat

Which command allows you to decode packets in JUNOS?() A.debug packet interface-nameB.show interface extensiveC.traceoptions interface-nameD.monitor traffic interface interface-name

The monitor traffic command closely resembles which UNIX-based utility?() A.ps -xB.passwdC.ls -a-lD.tcpdump

Which CLI command displays error statistics for an interface in real-time?() A.monitor trafficB.show interfacesC.monitor interfaceD.show interfaces extensive

Which CLI command displays packet and byte counts for an interface in real-time?() A.monitor trafficB.show interfacesC.monitor interfaceD.show traffic counts

An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router

Which two of these are characteristics of an IPS device?() A. passively listens to network trafficB. is an active device in the traffic pathC. has a permissive interface that is used to monitor networksD. traffic arrives on one IPS interface and exits on another

Which two of these are characteristics of an IPS device?()A、 passively listens to network trafficB、 is an active device in the traffic pathC、 has a permissive interface that is used to monitor networksD、 traffic arrives on one IPS interface and exits on another

Which two of these are characteristics of an IDS sensor?()A、passively listens to network trafficB、is an active device in the traffic pathC、has a permissive interface that is used to monitor networksD、traffic arrives on one IDS interface and exits on anotherE、has a promiscuous interface that is used to monitor the network

Which command sequence shows traffic per queue for an interface?()A、show interfaces queue ge-0/0/0B、show statistics queue detailC、show interfaces ge-0/0/0 statistics extensiveD、monitor interface ge-0/0/0 queue

Which CLI command displays error statistics for an interface in real-time?()A、monitor trafficB、show interfacesC、monitor interfaceD、show interfaces extensive

You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()A、It resembles a Layer 2 bridge.B、Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C、Inline interfaces which have no IP addresses cannot be detected.D、Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

Which of the following is the BEST reason to implement a firewall on a server?()A、To watch for bandwidth issuesB、To protect the server from all trafficC、To block certain traffic by portsD、To monitor certain malicious traffic

An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router

Which command would you use to view interface usage details in real time?()A、show interfaces terseB、show interfaces extensiveC、monitor interface trafficD、monitor traffic interface

Which command allows you to decode packets in JUNOS?()A、debug packet interface-nameB、show interface extensiveC、traceoptions interface-nameD、monitor traffic interface interface-name

Which CLI command displays packet and byte counts for an interface in real-time?()A、monitor trafficB、show interfacesC、monitor interfaceD、show traffic counts

多选题Which three configuration tasks are required to successfully deploy NBAR to recognize TCP and UDP stateful protocols? ()Aover leased lines, use the multilink ppp command to reduce latency and jitter, and to create Distributed Link Fragmentation and interleavingBuse the service-policy command to attach a traffic flow to an interface on the routerCuse the ip rsvp bandwidth command to set a strict upper limit on the bandwidth NBAR uses, and to guarantee admission of any flowsDuse the policy-map command to define one or more QoS policies (such as shaping, policing, and so on) to apply to traffic defined by a class mapEuse the random-detect dscp command to modify the default minimum and maximum thresholds for the DSCP valueFuse the class-map command to define one or more traffic classes by specifying the criteria by which traffic is classified

多选题Which two of these are characteristics of an IDS sensor?()Apassively listens to network trafficBis an active device in the traffic pathChas a permissive interface that is used to monitor networksDtraffic arrives on one IDS interface and exits on anotherEhas a promiscuous interface that is used to monitor the network

单选题When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()AsnoopBtcpdumpCmonitorDtail

单选题The monitor traffic command provides access to which utility?()AtcpdumpBtelnetCtracerouteDnetstat

多选题You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()AIt resembles a Layer 2 bridge.BTraffic flow through the IPS resembles traffic flow through a Layer 3 router.CInline interfaces which have no IP addresses cannot be detected.DMalicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

单选题Which of the following most closely represents an image copy? ()AUnix cp command of a fileBBit-by-bit copy of a fileCWindows COPY command of a file DAll of the above

单选题Which of the following is the BEST reason to implement a firewall on a server?()ATo watch for bandwidth issuesBTo protect the server from all trafficCTo block certain traffic by portsDTo monitor certain malicious traffic