Which of the following analyzes the entire subnet to identify all hosts that are active?()A、Ping sweepB、Packet snifferC、TracerouteD、Port scanner
Which of the following analyzes the entire subnet to identify all hosts that are active?()
- A、Ping sweep
- B、Packet sniffer
- C、Traceroute
- D、Port scanner
相关考题:
Which statement about IDS/IPS design is correct?()A、An IPS should be deployed if the security policy does not support the denial of traffic.B、An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.C、An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.D、Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
Ⅲ. There are four choices following each statement. Mark the choice that can best complete the statement: If a linguistic study describes and analyzes the language people actually use, it is said to be ()A、prescriptiveB、analyticC、descriptiveD、linguistic
Which service component within the prepare phase recommends the appropriate technology strategy to address a business requirement of the customer? Select exactly 1 answer(s) from the following:()。A、identifying what a customer requires from a proposed solutionB、analyzes the customers business requirements and recommends the appropriate Cisco technologies to meet business requirementsC、determining what end-user training a customer requiresD、addressing a customer’s physical requirements
Which of the following is a performance optimization technology?()A、QoSB、TrunkingC、SpanningD、VoIP
Which of the following utilities are used to choose which programs run at startup? ()A、SFCB、SETDEBUGC、MSCONFIGD、REGEDIT
Which of the following commands will be run at a command prompt to determine which WindowsOS is running on the computer?()A、VERB、Device ManagerC、VERIFYD、SET
单选题Which of the following technologies can improve convergence time following a link failure in a serviceprovider network?()AMPLS TE FRBMPLS VPNCBFDDRSVPEVPLSFSNMP
单选题Which statement about IDS/IPS design is correct?()AAn IPS should be deployed if the security policy does not support the denial of traffic.BAn IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.CAn IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.DBandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
单选题Which of the following is not a wind().AGrowlerBNortherCLevanterDMistral