Which of the following is used to identify active hosts along with their network addresses?()A、Port scanB、Ping sweepC、IDSD、NIPS

Which of the following is used to identify active hosts along with their network addresses?()

  • A、Port scan
  • B、Ping sweep
  • C、IDS
  • D、NIPS

相关考题:

Which of the following features would hide internal IP addresses from the Internet?() A. Network Address TranslationB. Port forwardingC. Quality of ServiceD. SSID broadcast

Which of the following is used to identify active hosts along with their network addresses?() A.Port scanB.Ping sweepC.IDSD.NIPS

Which of the following answers are correct characteristics of microsegmentation, in the context of a Local Area Network (LAN)?() A. Dedicated paths between sending and receiving hosts are established.B. Multiple subnetwork broadcast addresses are created.C. Multiple ARP tables are needed.D. The decrease in the number of collision domains.E. Broadcast domains are enhanced.F. Additional bandwidth is used to connect hosts.

Which of the following IP addresses for the network 27.35.16.32/28 can be assigned to hosts?() A.27.35.16.32B.27.35.16.33C.27.35.16.48D.27.35.16.47E.27.35.16.45F.27.35.16.44

Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?() A.15.234.118.63B.92.11.178.93C.134.178.18.56D.192.168.16.87E.201.45.116.159F.217.63.12.192

Which of the following should be used to restrict access to a wireless network?()A、Port forwardingB、Enable SSID broadcastC、Wireless encryptionD、Enable DMZ

Which of the following solutions will detect and disable a rogue access point?()A、Port scanB、Packet snifferC、IPSD、IDS

Which of the following features would hide internal IP addresses from the Internet?()A、Network Address TranslationB、Port forwardingC、Quality of ServiceD、SSID broadcast

A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()A、A large FTP job is in process. B、A network interface was misconfigured. C、The ping command is being used excessively. D、A bad network interface card and/or network cable is in use.

Which of the following commands should be used to list all of the active network interfaces on a system?()A、lscfgB、routeC、netstatD、entstat

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()A、The type of application used on the networkB、The type of system bus used by the computersC、The type of memory installed in each computerD、The type of media used in the network topologyE、The type of protocols used in the networkF、The physical layout of the network hosts

Which of the following analyzes the entire subnet to identify all hosts that are active?()A、Ping sweepB、Packet snifferC、TracerouteD、Port scanner

Which of the following tools can be used to identify the location of a network outage?()A、tracerouteB、netstatC、nslookupD、ping

Which of the following is used to produce the best LCD image on a laptop?()A、Dual scanB、Active matrixC、Passive matrixD、Active scanning

Which of the following commands should be used to identify packet sequence problems?()A、 ping and arpB、 lsattr and ifconfigC、 netstat and iostatD、 iptrace and tcpdump

What is the purpose of a network mask?()A、It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB、It is used to define which parts of the IP address are allocated to host addresses and network prefixesC、It is used to hide subnets from external networks by masking the subnets with NATD、It is used to differentiate a network as a classful network or a classless network

You are the network administrator for your company. A Windows Server 2003 computer named Router11 is used to connect the network to the Internet. You find out that some computers on the network are infected with a worm, which occasionally sends out traffic to various hosts on the Internet. This traffic always uses a certain source TCP port number.You need to identify which computers are infected with the worm. You need to configure a solution on Router11 that will perform the following two tasks: Detect and identify traffic that is sent by the worm.   Immediately send a notification to a network administrator that the infected computer needs to be repaired.  What should you do?()A、Configure a WMI event trigger.B、Configure a Network Monitor capture filter.C、Configure a Network Monitor trigger.D、Configure a System Monitor alert.

单选题Which of the following tools can be used to identify the location of a network outage?()AtracerouteBnetstatCnslookupDping

多选题Which of the following IP addresses for the network 27.35.16.32/28 can be assigned to hosts?()A27.35.16.32B27.35.16.33C27.35.16.48D27.35.16.47E27.35.16.45F27.35.16.44

单选题Which of the following analyzes the entire subnet to identify all hosts that are active?()APing sweepBPacket snifferCTracerouteDPort scanner

单选题Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()ACDPBSNMPCDHCPDARPEDNSFNone of the above

单选题Which of the following commands should be used to identify packet sequence problems?()A ping and arpB lsattr and ifconfigC netstat and iostatD iptrace and tcpdump

单选题Which of the following is used to identify active hosts along with their network addresses?()APort scanBPing sweepCIDSDNIPS

单选题What is the purpose of a network mask?()AIt is used in conjunction with the wildcard mask to determine the number of hosts on a networkBIt is used to define which parts of the IP address are allocated to host addresses and network prefixesCIt is used to hide subnets from external networks by masking the subnets with NATDIt is used to differentiate a network as a classful network or a classless network

单选题A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()AA large FTP job is in process. BA network interface was misconfigured. CThe ping command is being used excessively. DA bad network interface card and/or network cable is in use.

多选题Which of the following answers are correct characteristics of microsegmentation, in the context of a Local Area Network (LAN)?()ADedicated paths between sending and receiving hosts are established.BMultiple subnetwork broadcast addresses are created.CMultiple ARP tables are needed.DThe decrease in the number of collision domains.EBroadcast domains are enhanced.FAdditional bandwidth is used to connect hosts.