单选题Which command can be arouter to verify the layer 3 path to a host?()Atraceroute addressBtracert addressCssh addressDtelnet address

单选题
Which command can be arouter to verify the layer 3 path to a host?()
A

traceroute address

B

tracert address

C

ssh address

D

telnet address


参考解析

解析: 暂无解析

相关考题:

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?() A. all interfaces in the path toward the destinationB. all networks in the path toward the destinationC. adjacent next hop router in the path toward the destinationD. all routers in the path toward the destinationE. all interfaces through which the packets can be routedF. type of service and precedence in the IP packets

Which two of these are characteristics of MPLS VPNs?() A. Layer 3 MPLS VPNs can forward only IP packetsB. Layer 2 MPLS VPNs can forward any network protocolC. MPLS label paths are automatically formed based on Layer 2 framesD. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

Which command can be a router to verify the layer 3 path to a host?() A. traceroute addressB. tracert addressC. ssh addressD. telnet address

Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?() A.ping addressB.tracert addressC.traceroute addressD.arp address

Which command can be used from a PC to verfy the connectivity between host that connect through path?() A.tracert addressB.ping addressC.arp addressD.traceroute address

Which command can be arouter to verify the layer 3 path to a host?() A.traceroute addressB.tracert addressC.ssh addressD.telnet address

At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()A、 Layer 2 modeB、 Layer 3 Edge modeC、 Layer 3 Central modeD、 Layer 3 In-Band mode

Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()A、It is used in multihome network scenarios.B、It can be used with BGP to mitigate DoS and DDoS.C、It does not need to have CEF enabled.D、It is enabled via the interface level command ip verify unicast reverse-path.E、It cannot be used with "classification" access lists.

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A、all interfaces in the path toward the destinationB、all networks in the path toward the destinationC、adjacent next hop router in the path toward the destinationD、all routers in the path toward the destinationE、all interfaces through which the packets can be routedF、type of service and precedence in the IP packets

Layer 3 (the network layer) provides connectivity and path selection between two host systems that may be located on geographically separated networks. Which two devices operate at the network layer?()A、 applicationB、 hubC、 switchD、 bridgeE、 router

Which two of these are characteristics of MPLS VPNs? ()A、 Layer 3 MPLS VPNs can forward only IP packetsB、 Layer 2 MPLS VPNs can forward any network protocolC、 MPL S label paths are automatically formed based on Layer 2 framesD、 Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE、 In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

Which three statements are true about Cisco IOS Firewall?()A、It can be configured to block Java traffic.B、It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.C、It can only examine network layer and transport layer information.D、It can only examine transport layer and application layer information.E、The inspection rules can be used to set timeout values for specified protocols.F、The ip inspect cbac-name command must be configured in global configuration mode.

Which command can be a router to verify the layer 3 path to a host?()A、traceroute addressB、tracert addressC、ssh addressD、telnet address

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()A、show ip access-listB、show access-listC、list ip interfaceD、show interfaceE、show ip interface

Which command can a system administrator use to verify that a tape is in backup format and is readable by the system?()A、tarB、tctlC、tcopyD、restore

Which command can be used to verify all the filesystems that are exported by an NFS server?()A、showmount -e hostnameB、showmount -d hostnameC、showmount -a hostnameD、showmount

Which command can be used to verify that filesystems are being exported by a server?()A、showmount -e ServerNameB、vi /etc/exportsC、startsrc -g nfsD、exportfs -i FileSystemName

Which two are true regarding direct-path exports?()A、Direct-path export is typically faster.B、Direct-path export can be invoked interactively.C、Direct-path export is character set independent.D、Direct-path export bypasses the SQL-command processing layer.E、Direct-path export can be used to export rows containing LOBs and BFILEs.

多选题Which three statements are true about Cisco IOS Firewall?()AIt can be configured to block Java traffic.BIt can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.CIt can only examine network layer and transport layer information.DIt can only examine transport layer and application layer information.EThe inspection rules can be used to set timeout values for specified protocols.FThe ip inspect cbac-name command must be configured in global configuration mode.

单选题Layer 3 (the network layer) provides connectivity and path selection between two host systems that may be located on geographically separated networks. Which two devices operate at the network layer?()A applicationB hubC switchD bridgeE router

多选题When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()Aall interfaces in the path toward the destinationBall networks in the path toward the destinationCadjacent next hop router in the path toward the destinationDall routers in the path toward the destinationEall interfaces through which the packets can be routedFtype of service and precedence in the IP packets

单选题Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?()Aping addressBtracert addressCtraceroute addressDarp address

单选题Which command can be used from a PC to verfy the connectivity between host that connect through path?()Atracert addressBping addressCarp addressDtraceroute address

多选题Which two are true regarding direct-path exports?()ADirect-path export is typically faster.BDirect-path export can be invoked interactively.CDirect-path export is character set independent.DDirect-path export bypasses the SQL-command processing layer.EDirect-path export can be used to export rows containing LOBs and BFILEs.

单选题When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()Ashow ip access-listBshow access-listClist ip interfaceDshow interfaceEshow ip interface

多选题A network administrator has configured access list 172 to prevent Telnet and ICMP traffic from reaching a server with the address if 192.168.13.26. Which command can the administrator issue to verify that the access list is working properly?()ARouter# ping 192.168.13.26BRouter# debug access-list 172CRouter# show open ports 192.168.13.26DRouter# show access-listERouter# show ip interface

多选题Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()AIt is used in multihome network scenarios.BIt can be used with BGP to mitigate DoS and DDoS.CIt does not need to have CEF enabled.DIt is enabled via the interface level command ip verify unicast reverse-path.EIt cannot be used with classification access lists.