What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()A、default gatewayB、DNS serversC、FTP serverD、helper addressE、subnet maskF、TFTP server

What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()

  • A、default gateway
  • B、DNS servers
  • C、FTP server
  • D、helper address
  • E、subnet mask
  • F、TFTP server

相关考题:

网管与网关网元通信采用的是什么协议(),网元之间通信采用()协议 A、ECC,ECCB、TCP/IP,FTPC、TCP/IP,ECCD、TCP/IP,TCP/IP

You configure your Windows 2000 Professional computer for Internet Connection Sharing and for TCP/IP filtering as shown in the exhibit.You test your TCP/IP filtering configuration from another client computer. You can access web sites, but you cannot access FTP sites.What should you do to be able to access FTP sites?A.Add Port 21 to the TCP Ports section.B.Add Port 138 to the TCP Ports section.C.Add Port 21 to the IP Ports section.D.Add Port 138 to the IP Ports section.

Above is the output from show ip bgp neighbors command. What is line 21 stating about the BGP connection?() A. the number of consecutive TCP connections to the specified remote neig hborB. the number of total TCP connections that the router hasC. the number of times the router has established a TCP connectionD. the number of neighbors that the router has

关于TCP/IP协议的描述,哪些是正确的,()A. TCP是传输控制协议B.TCP/IP协议中只有TCP协议和IP协议C.IP是网络互联协议D.TCP/IP协议中除了TCP协议和IP协议外,还包括许多其他的协议

The TCP/IP stack is a complete set of networking protocols.The OSI Model was meant to be a standardized way of connecting devices together,and most protocols have some direct correlation to the OSI Model.The OSI Model has 7 layers,the fourth layer is called______.A.physical layerB.data link layerC.application layerD.transport layer

TCP/IP只包含了TCP和IP。

What is the port number of an IPsec Encapsulating Security Payfoad packet?()A、UOP port 50B、IP protocol 51C、TCP port 51D、TCP port 50E、IP protocol 50F、UDP port51

What is the port number of the IPsec Authentication Header packet?()A、IP protocol 50B、TCP port 51C、UDP port 50D、IP protocol 51E、UDP port 51F、TCP port 50

What should you set the Client Configuration to when configuring the ODBC Data Source for the Database Subsystem?()A、TCP/IP  B、Multiprotocol  C、Named Pipes  D、NWLink IPX/SPX

In the context of MPLS,what is the correct action to be performed when an aggregate label is received ?()A、It adds the VPN label into the top label in the MPLS label stackB、It replaces the top label in the MPLS label stack with a VPN label and propagatesC、It replaces the bottom label in the MPLS label stack with a VPN label and propagatesD、It removes the top label in the MPLS label stack and does a Layer 3 lookup on underlying IP packetsE、None of above

What is the action of "pop" in the context of MPLS switching?()A、It removes the top label in the MPLS label stack.B、It adds a top label in MPLS label stack.C、It replaces the top label in the MPLS label stack with another value.D、It replaces the top label in the MPLS label stack with a set of labels.E、None of above.

计算机中,有关TCP/IP协议的操作包括()等部分。A、TCP/IP协议的安装B、TCP/IP协议的配置C、TCP/IP协议的纠错D、TCP/IP协议的删除E、TCP/IP协议安装的检测

What is the port number of an IPsec Encapsulating Security Payload packet?()A、IP protocol 50B、IP protocol 51C、TCP port 50D、TCP port 51E、UDP port 50F、UDP port 51

An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configured.D、The PC has connectivity up to Layer 5 of the OSI model.E、The PC has the TCP/IP protocol stack correctly installed.

An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC.If a reply is received, what does this confirm?()A、The PC has connectivity with a local host.B、The PC has connectivity with a Layer 3 device.C、The PC has a default gateway correctly configuredD、The PC has connectivity up to Layer 5 of the OSI modelE、The PC has the TCP/IP protocol stack correctly installed.

Which of the following IP addresses would a technician ping to verify the integrity of the local TCP/IP stack?()A、10.0.0.1B、127.0.0.1C、169.254.0.1D、192.168.0.1

What is required during the initial creation of a cluster?()A、 Nothing,because HACMP will discover the configurationB、 The cluster name and a TCP/IP path to each of the nodesC、 The cluster name and ID and a TCP/IP path to each of the nodesD、 The cluster name and ID node names and a TCP/IP path to each of the nodes

单选题What is a benefit of Internet protocol (IP) telephony?()ASynchronizes password exchanges for call setupBEliminates the need for physical cabling in a TCP/IP networkCEnables two-way voice transmission over a packet-switched TCP/IP networkDCreates an encrypted tunnel for voice through a Transmission Control Protocol (TCP)/IP network

多选题What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()Adefault gatewayBDNS serversCFTP serverDhelper addressEsubnet maskFTFTP server

单选题An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。AThe PC has connectivity with a local host.BThe PC has connectivity with a Layer 3 device.CThe PC has a default gateway correctly configured.DThe PC has connectivity up to Layer 5 of the OSI model.EThe PC has the TCP/IP protocol stack correctly installed.

单选题You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()ASource TCP portBSource IP addressCDestination TCP portDDestination IP address

多选题What are the four fields in an MPLS label?()AversionBexperimentalClabelDprotocolETTLFbottom-of-stack indicato

单选题What is the action of "pop" in the context of MPLS switching?()AIt removes the top label in the MPLS label stack.BIt adds a top label in MPLS label stack.CIt replaces the top label in the MPLS label stack with another value.DIt replaces the top label in the MPLS label stack with a set of labels.ENone of above.

单选题Your Company upgrades its network to 100 Mbps. You remove the old network adapter and install a new 10/100 Mbps network adapter into a Windows 2000 Professional computer. You configure the TCP/IP protocol settings to be the same as they were for the previously installed network adapter.   When you restart eh computer, however, you cannot access the network. You try to ping your network adapter’s TCP/IP address locally. You receive the following error message. “Request timed out.” Next, you try to ping 127.0.0.1 and receive the same error message.   What must you do?()AConfigure a different TCP/IP addressBEnable DHCP in the TCP/IP propertiesCEnable DNS in the TCP/IP propertiesDConfigure the network adapter to run at 100 Mbps onlyEReplace the network adapter.

单选题Which of the following IP addresses would a technician ping to verify the integrity of the local TCP/IP stack?()A10.0.0.1B127.0.0.1C169.254.0.1D192.168.0.1

单选题In the context of MPLS,what is the correct action to be performed when an aggregate label is received ?()AIt adds the VPN label into the top label in the MPLS label stackBIt replaces the top label in the MPLS label stack with a VPN label and propagatesCIt replaces the bottom label in the MPLS label stack with a VPN label and propagatesDIt removes the top label in the MPLS label stack and does a Layer 3 lookup on underlying IP packetsENone of above

单选题What is required during the initial creation of a cluster?()A Nothing,because HACMP will discover the configurationB The cluster name and a TCP/IP path to each of the nodesC The cluster name and ID and a TCP/IP path to each of the nodesD The cluster name and ID node names and a TCP/IP path to each of the nodes