单选题The monitor traffic command closely resembles which UNIX-based utility?()Aps -xBpasswdCls -a-lDtcpdump

单选题
The monitor traffic command closely resembles which UNIX-based utility?()
A

ps -x

B

passwd

C

ls -a-l

D

tcpdump


参考解析

解析: 暂无解析

相关考题:

When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?() A. snoopB. tcpdumpC. monitorD. tail

Which command would you use to view interface usage details in real time?() A. show interfaces terseB. show interfaces extensiveC. monitor interface trafficD. monitor traffic interface

The monitor traffic command provides access to which utility?() A.tcpdumpB.telnetC.tracerouteD.netstat

Which command allows you to decode packets in JUNOS?() A.debug packet interface-nameB.show interface extensiveC.traceoptions interface-nameD.monitor traffic interface interface-name

The monitor traffic command closely resembles which UNIX-based utility?() A.ps -xB.passwdC.ls -a-lD.tcpdump

Which CLI command displays packet and byte counts for an interface in real-time?() A.monitor trafficB.show interfacesC.monitor interfaceD.show traffic counts

Which command should be used to capture network traffic between the localhost and a host named ‘webserver’?() A.tcpdump webserverB.tcpdump host webserverC.tcpdump -hostname webserverD.tcpdump -print -h webserver

You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device() A. It resembles a Layer 2 bridge.B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C. Inline interfaces which have no IP addresses cannot be detected.D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

Which two of these are characteristics of an IDS sensor?()A、passively listens to network trafficB、is an active device in the traffic pathC、has a permissive interface that is used to monitor networksD、traffic arrives on one IDS interface and exits on anotherE、has a promiscuous interface that is used to monitor the network

Which command sequence shows traffic per queue for an interface?()A、show interfaces queue ge-0/0/0B、show statistics queue detailC、show interfaces ge-0/0/0 statistics extensiveD、monitor interface ge-0/0/0 queue

The monitor traffic command closely resembles which UNIX-based utility?()A、ps -xB、passwdC、ls -a-lD、tcpdump

Which command should be used to capture network traffic between the localhost and a host named ‘webserver’?()A、tcpdump webserverB、tcpdump host webserverC、tcpdump -hostname webserverD、tcpdump -print -h webserver

An administrator is evaluating an application for application monitoring. What command should be  Used to determine if the application can be monitored with a process monitor?()  A、 pa auxB、 ps -elC、 ps -efD、 ps -pl

Which command would you use to view interface usage details in real time?()A、show interfaces terseB、show interfaces extensiveC、monitor interface trafficD、monitor traffic interface

The monitor traffic command provides access to which utility?()A、tcpdumpB、telnetC、tracerouteD、netstat

When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()A、snoopB、tcpdumpC、monitorD、tail

Which command allows you to decode packets in JUNOS?()A、debug packet interface-nameB、show interface extensiveC、traceoptions interface-nameD、monitor traffic interface interface-name

Which CLI command displays packet and byte counts for an interface in real-time?()A、monitor trafficB、show interfacesC、monitor interfaceD、show traffic counts

多选题You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()AIt resembles a Layer 2 bridge.BTraffic flow through the IPS resembles traffic flow through a Layer 3 router.CInline interfaces which have no IP addresses cannot be detected.DMalicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

单选题Which of the following most closely represents an image copy? ()AUnix cp command of a fileBBit-by-bit copy of a fileCWindows COPY command of a file DAll of the above

单选题An administrator is evaluating an application for application monitoring. What command should be  Used to determine if the application can be monitored with a process monitor?()A pa auxB ps -elC ps -efD ps -pl

单选题The monitor traffic command provides access to which utility?()AtcpdumpBtelnetCtracerouteDnetstat

单选题Which utility is used to assign a flow of data to a traffic class?()Aip profileBpolicy-listCclassifier-listDrate-limit-profile

单选题When using the monitor traffic command on Junos devices, which UNIX-based utility is accessed?()AsnoopBtcpdumpCmonitorDtail

单选题An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()AHubBBridgeCSwitchDRouter

单选题Which of the following is the BEST reason to implement a firewall on a server?()ATo watch for bandwidth issuesBTo protect the server from all trafficCTo block certain traffic by portsDTo monitor certain malicious traffic

单选题Which IOS command shows the detailed error report?()Aerrpt -A Berrpt -a Cerrlog -a Derrlog -ls