单选题What is a valid option when using the ping command?()Apacket lossBpacket sizeCCRCDTCP port

单选题
What is a valid option when using the ping command?()
A

packet loss

B

packet size

C

CRC

D

TCP port


参考解析

解析: 暂无解析

相关考题:

Regarding the extended ping command; which of the statements below are true?(Select all valid answer choices)A.The extended ping command is supported from user EXEC mode.B.The extended ping command is available from privileged EXEC mode.C.With the extended ping command you can specify the TCP and UDP port to be pinged.D.With the extended ping command you can specify the timeout value.E.With the extended ping command you can specify the datagram size.

What will happen after redistributing other routing protocol routes into OSPF? () A. miss the metric option in the redistribute command.B. misconfigure the metric- type option in t he redistribute command to type - 1.C. miss the subnet option in the redistribute command.D. miss the tag option in the redistribute command.

When configuring a multipoint GRE (mGRE) tunnel interface, which one of the following is NOT a valid configuration option:()A、 tunnel sourceB、 tunnel destinationC、 tunnel keyD、 ip addressE、 tunnelvrf

What is the main reason for using the "ip ips deny-action ips-interface" IOS command?()A、 To selectively apply drop actions to specific interfacesB、 To enable IOS to droptraffic for signatures configured with the Drop actionC、 To support load-balancing configurations in which traffic can arrive via multipleinterfaces D、 This is nota valid IOS command

When configuring the Cisco VPN Client,what action is required prior to installing Mutual Group Authentication?()A、Transparent tunneling must be enabled.B、A valid root certificate must be installed.C、A group pre-shared secret must be properly configured.D、The option to "Allow Local LAN Access" must be selected.

How  can  a  directory  named  /dirl  be  excluded  during  a  restore  of  files backed  up  by  name  with  the  backup command()A、By using the restore -x option followed by /dirlB、By adding an entry in the /etc/restore.exclude fileC、By using the restore -i option to enter interactive mode and executing the command:delete /dirlD、By using the restore -i option when running restore to specify a text file containing ’/dirl1 as one of the  lines in it

When you display the routing table by entering the show route command, what does the* indicate?()A、The route is a direct route.B、The route was selected as active.C、The route is a default route.D、The route was learned using a dynamic routing protocol.

An Active Directory database is installed on the C volume of a domain controller. You need to move the Active Directory database to a new volume What should you do()A、Move the ntds,dit file to the new volume by using Windows Explorer.B、Copy the ntds,dit file to the new volume by using the ROBOCOPY command.C、Move the ntds,dit file to the new volume by using the Files option in the Ntdsutil utility .D、Move the ntds,dit file to the new volume by running the Move-item command in Microsoft Windows powerShell.

In the context of configuring dial-on-demand routing using ISDN, what is the purpose of the dialer-list command?()A、to identify valid numbers for incoming callsB、to define the type of ISDN switch at the central officeC、to specify the list of outgoing phone numbers used by the routerD、to associate a dial configuration with a physical interfaceE、to define interesting traffic that will enable the link

While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()A、ping 192.168.1.255B、ping with sweep optionC、ping 192.168.1.127D、ping 192.168.1.64E、ping with broadcast option

When running a Windows server, which option is used with the ping command to convert numerical addresses to host names?()A、 -rB、 -aC、 -vD、 -n

When running a Windows server, which option is used with the ping command to define the number of packets transmitted?()A、 -nB、 -aC、 -rD、 -v

After using the alt_disk_install command to clone a system image to another disk, the system administrator noticed a large number of defined devices not allocated to the LPAR. Which of the following is the most likely cause of this situation?()A、The cfgmgr command was not run to reconfigure the devicesB、The machine was not booted into SMS MultiBoot mode after configurationC、The machine was not in full system partition mode when the volume was createdD、The alt_disk_install command was not run with the -O option to remove references in the ODM

How can a directory named /dir1 be excluded during a restore of files backed up by name with the backup command?()A、By using the restore -x option followed by /dir1B、By adding an entry in the /etc/restore.exclude fileC、By using the restore -i option to enter interactive mode and executing the command:delete /dir1D、By using the restore -i option when running restore to specify a text file containing ’/dir1’ as one of the lines in it.

In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()A、TCPB、UDPC、ICMPD、SMTP

You issued the following RMAN command:  RMAN CONFIGURE CONTROLFILE AUTOBACKUP ON;     What is NOT an impact of using the above command?()A、 When a successful backup is recorded in the RMAN repository, then a backup of the current control file is performed.B、 When a structural change is made to the database, then a backup of the current control file is performed.C、 When a successful backup is performed in the RMAN repository, then a backup of the spfile is performed.D、 When a structural change is made to the database, then a backup of the alert log file will be performed.

单选题When running a Windows server, which option is used with the ping command to convert numerical addresses to host names?()A-rB-aC-vD-n

单选题You issued the following RMAN command:  RMAN CONFIGURE CONTROLFILE AUTOBACKUP ON;     What is NOT an impact of using the above command?()A When a successful backup is recorded in the RMAN repository, then a backup of the current control file is performed.B When a structural change is made to the database, then a backup of the current control file is performed.C When a successful backup is performed in the RMAN repository, then a backup of the spfile is performed.D When a structural change is made to the database, then a backup of the alert log file will be performed.

单选题How  can  a  directory  named  /dirl  be  excluded  during  a  restore  of  files backed  up  by  name  with  the  backup command()ABy using the restore -x option followed by /dirlBBy adding an entry in the /etc/restore.exclude fileCBy using the restore -i option to enter interactive mode and executing the command:delete /dirlDBy using the restore -i option when running restore to specify a text file containing ’/dirl1 as one of the  lines in it

单选题What is the main reason for using the "ip ips deny-action ips-interface" IOS command?()A To selectively apply drop actions to specific interfacesB To enable IOS to droptraffic for signatures configured with the Drop actionC To support load-balancing configurations in which traffic can arrive via multipleinterfaces D This is nota valid IOS command

单选题After using the alt_disk_install command to clone a system image to another disk, the system administrator noticed a large number of defined devices not allocated to the LPAR. Which of the following is the most likely cause of this situation?()AThe cfgmgr command was not run to reconfigure the devicesBThe machine was not booted into SMS MultiBoot mode after configurationCThe machine was not in full system partition mode when the volume was createdDThe alt_disk_install command was not run with the -O option to remove references in the ODM

单选题When running a Windows server, which option is used with the ping command to define the number of packets transmitted?()A -nB -aC -rD -v

单选题You are creating an application using Visual Studio 2010. The application consumes a Windows Communication Foundation (WCF) service.You are adding a service reference to the WCF service. You need to ensure that the generated proxy does not block the calling thread when executing a service method. What should you do when adding the service reference? ()ASet the Collection type to ObservableCollection.BSelect the Reuse types in all referenced assemblies option.CSelect the Generate asynchronous operations option.DSelect the Always generate message contracts option.

单选题How can a directory named /dir1 be excluded during a restore of files backed up by name with the backup command?()ABy using the restore -x option followed by /dir1BBy adding an entry in the /etc/restore.exclude fileCBy using the restore -i option to enter interactive mode and executing the command:delete /dir1DBy using the restore -i option when running restore to specify a text file containing ’/dir1’ as one of the lines in it.

单选题What is a valid option when using the ping command?()Apacket lossBpacket sizeCCRCDTCP port

单选题When configuring the Cisco VPN Client,what action is required prior to installing Mutual Group Authentication?()ATransparent tunneling must be enabled.BA valid root certificate must be installed.CA group pre-shared secret must be properly configured.DThe option to Allow Local LAN Access must be selected.

单选题While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()Aping 192.168.1.255Bping with sweep optionCping 192.168.1.127Dping 192.168.1.64Eping with broadcast option

单选题When running a Windows server, which option is used with the ping command to convert numerical addresses to host names?()A -rB -aC -vD -n