单选题Which of the following parameters can prevent packet fragmentation on routers when connecting to remote networks?()AmtuBsb-maxCrfc1323Dtcp_mssdflt

单选题
Which of the following parameters can prevent packet fragmentation on routers when connecting to remote networks?()
A

mtu

B

sb-max

C

rfc1323

D

tcp_mssdflt


参考解析

解析: 暂无解析

相关考题:

Which of the following parameters can prevent packet fragmentation on routers when connecting to remote networks?()A、mtuB、sb-maxC、rfc1323D、tcp_mssdflt

Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()A、Spanning Tree ProtocolB、Shortest path first treeC、Link-state advertisements (LSA)D、Hold-down timersE、Split horizonF、VRP

Routers perform which of the following functions?()A、Packet switchingB、Collision prevention on a LAN segment.C、Packet filteringD、Broadcast domain enlargementE、Broadcast forwardingF、Internetwork communication

Which of the following characteristics applies only to OSPFv3 and not to OSPFv2?()A、Several processes can exist simultaneouslyB、Requires direct connectivity from the backbone area to all other areasC、Has the same packet typesD、Can support multiple subnets on a single linkE、Uses a hierarchical structure divided into areasF、Adjacencies formed with neighbors

Which of the following ping parameters will set the size of the outgoing packet?()A、–cB、iC、RD、–s

Which of the following solutions will detect and disable a rogue access point?()A、Port scanB、Packet snifferC、IPSD、IDS

Which of the following is TRUE about the ping  -f command?()A、 It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the "f" in the command line. B、 It is useful for flooding from slow character based terminals since it only displays a dot "." for each packet sent in fast mode. C、 It is useful for flooding from slow character based terminals since it only displays a dot "."       for each packet sent and a backspace on returned in fast mode. D、 The command can only be run by root.

A customer wants to check whether they have the necessary tools enabled to prevent intrusions andvirus attacks on a Windows Vista workstation. Which of the following tools can be used to display thecurrent configuration? ()A、Security CenterB、Event Viewer Security logC、Windows DefenderD、Windows Firewall

Which one of the following parameters will influence the GSL device utilization the most:()A、PILTIMERB、ALPHAC、CSPSPRIO

Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)

Which of the following describe router functions?()A、Packet switchingB、Collision prevention on a LAN segmentC、Packet filteringD、Broadcast domain enlargementE、Broadcast forwardingF、Internetwork communication

Which of the following can help prevent data loss on a RAID array in the event of a power failure?()A、Using a RAID mirrorB、A battery backed write cacheC、Using RAID with parityD、A battery backed read cache

Which of the following WAN protocols is a packet switching technology?()A、Frame RelayB、POTSC、PSTND、ISDN

Which of the following commands should be used to tune parameters of devices that are displayed with lsattr?()A、 chdevB、 cfgmgrC、 vmtuneD、 schedtune

Firewall filters can perform which two actions?()A、Log packet.B、Count packet.C、Set packet metric.D、Decrement packet TTL.E、Change destination IP address.

多选题Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ

单选题Which of the following can help prevent data loss on a RAID array in the event of a power failure?()AUsing a RAID mirrorBA battery backed write cacheCUsing RAID with parityDA battery backed read cache

单选题It can be inferred that the term “public duty” (pra.2), in the context of the passage, means which of the following?AThe necessity to apprehend perpetratorsBThe responsibility to punish transgressorsCAn obligation to prevent harm to anotherDThe assignment of punishment for harmful action

单选题Which of the following monitors a server to see which protocols might be in use?()APing sweepBIntrusion detection softwareCPort scannerDWireless packet sniffer

多选题To manually configure the SGA components using Oracle Enterprise Manager Memory Advisor, you can set values for which of the following initialization parameters?()ADB_CACHE_SIZEBSHARED_POOL_SIZECLARGE_POOL_SIZEDJAVA_POOL_SIZEESGA_MAX_SIZEFSORT_AREA_SIZE

单选题Which of the following is TRUE about the ping  -f command?()A It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the f in the command line. B It is useful for flooding from slow character based terminals since it only displays a dot . for each packet sent in fast mode. C It is useful for flooding from slow character based terminals since it only displays a dot .       for each packet sent and a backspace on returned in fast mode. D The command can only be run by root.

多选题When configuring the messaging system, which of the following are parameters of the e-mail transport? ()ALocationBProtocolCModeDWeb AddressEHost

多选题Which of the following technologies can be used in distance vector routing protocols to prevent routing loops?()ASpanning Tree ProtocolBShortest path first treeCLink-state advertisements (LSA)DHold-down timersESplit horizonFVRP

多选题Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()Apolicy routingBincrease link capacityCWREDDCBWFQELFIFWFQ

单选题Which of the following type of packets can easily be filtered with a stateful packet filter by enforcing the context or state of the request?以下那个协议很容易的根据请求状态或者环境被状态包过滤设备进行过滤?()ATCPBUDPCIPDICMP

多选题Firewall filters can perform which two actions?()ALog packet.BCount packet.CSet packet metric.DDecrement packet TTL.EChange destination IP address.

单选题Which of the following ping parameters will set the size of the outgoing packet?()A–cBiCRD–s