A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。A、10.10.0.1B、10.10.0.2C、199.99.9.33D、199.99.9.57E、200.2.2.17F、200.2.2.18

A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。

  • A、10.10.0.1
  • B、10.10.0.2
  • C、199.99.9.33
  • D、199.99.9.57
  • E、200.2.2.17
  • F、200.2.2.18

相关考题:

There are 2 switches in the Ezonexam LAN, with no routers. Ports 1, 2 3 are assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link. Which of the conditions below would verify trunk and VLAN operation? (Select all valid answers)A.Host 1 on VLAN 1 can ping Host 2 on VLAN 1B.Host 1 on VLAN 1 can ping Host 4 on VLAN 2C.Host 1 on VLAN 1 can not ping Host 2 on VLAN 1D.Host 4 on VLAN 2 can not ping Host 1 on VLAN 1E.Host 4 on VLAN 2 can ping Host 2 on VLAN 2

把主机加入HP存储系统中时需要何种主机信息?() A.WWN of one FCAB.LAN sizeC.Host locationD.Host folder name

At which OSI layer is a logical path created between two host systems named VE1 and VE2 on the Ezonexam LAN?A. PhysicalB. SessionC. Data linkD. TransportE. NetworkF. ApplicationG. Presentation

You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()A. resource access policiesB. Host Enforcer policiesC. source IP enforcement policiesD. IPsec enforcement policies

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? () A. user nameB. password lengthC. certificateD. Host Checker

After connecting a PC to an available port on a switch, you find that the PC can not access any of the resources on the LAN. No other PC's connected to the switch appear to be having any issues. What is the most likely cause for this problem?A.The router lacks a routing table entry for the new hostB.The host switch port is assigned to the incorrect VLANC.The host MAC address is incorrectly configuredD.A STP instance for the new host has not been initializedE.The switch does not have the MAC address hard coded in the CAM table.

Which component should you use to reduce collision issues on a large LAN?() A.SwitchB.RepeaterC.PrinterD.Host

There are 2 switches in the Testking LAN, with no routers. Ports 1, 2 3 are assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link.Which of the conditions below would verify trunk and VLAN operation?()A. Host 1 on VLAN 1 can ping Host 2 on VLAN 1B. Host 1 on VLAN 1 can ping Host 4 on VLAN 2C. Host 1 on VLAN 1 can not ping Host 2 on VLAN 1D. Host 4 on VLAN 2 can not ping Host 1 on VLAN 1E. Host 4 on VLAN 2 can ping Host 2 on VLAN 2

A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。 A.10.10.0.1B.10.10.0.2C.199.99.9.33D.199.99.9.57E.200.2.2.17F.200.2.2.18

Typically, an IP address refers to an individual host on a particular network. IP also accommodates addresses that refer to a group of hosts on one or more networks. Such addresses are referred to as multicast addresses, and the act of sending a packet from a source to the members of a (1)group is referred to as multicasting. Multicasting done (2)the scope of a single LAN segment is straightforward. IEEE 802 and other LAN protocols include provision for MAC-level multicast addresses. A packet with a multicast address is transmitted on a LAN Segment. Those stations that are members of the (3)multicast group recognize the multicast address and (4)the packet. In this case, only a single copy of the packet is ever transmitted. This technique works because of the (5)nature of a LAN: A transmission from any one station is received by all other station on the LAN.空白(5)应选( )。 A. Multicast B. unicast C. broadcastD. multiple unicast

Typically,an IP address refers to an individual host on a particular network. IP also accommodates addresses that refer to a group of hosts on one or more networks.Such addresses are referred to as multicast addresses,and the act of sending a packet from a source to the members of a (71)group is referred to as multicasting. Multicasting done (72) the scope of a single LAN segment is straight forward. IEEE 802 and other LAN protocols include provision for MAC-level multicast addresses. A packet with a multicast address is transmitted on a LAN segment.Those stations that are members of the (73)multicast group recognize the multicast address and (74)the packet.In this case,only a single copy of the packet is ever transmitted.This technique works because of the (本题)nature of a LAN:A transmission from any one station is received by all other stations on the LAN. A .multicastB. unicastC.broadcastD.multiple unicast

Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.

Which component should you use to reduce collision issues on a large LAN?()A、SwitchB、RepeaterC、PrinterD、Host

Which three options are supported as address allocation mechanisms for DHCP on Cisco routers?()A、The IP address can be automatically assigned to a host.B、The IP address can be assigned as a random hash value of the burned - in - address of the lowest - numbered LAN interface on the router.C、The network administrator can assign a speci fic IP address to a specific host MAC address.D、The IP address can be assigned from configured pools in a reverse lexicographical order.E、The IP address can be assigned to a host for a limited time or until the host explicitly releases the address.F、The IP address can be assigned to a host until the host usurps the assigned value using its own dynamic override mechanism.

Which layer of the OSI reference model uses the hardware address of a device to ensure message delivery to the proper host on a LAN?()A、physicalB、data linkC、networkD、transport

下列属于数据存储备份的方式的是()A、Host-Based备份方式B、LAN-Based备份方式C、LAN-Free备份方式D、Server-Free备份方式

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()A、user nameB、password lengthC、certificateD、Host Checker

You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()A、resource access policiesB、Host Enforcer policiesC、source IP enforcement policiesD、IPsec enforcement policies

Your company is main office and a branch office are connected by a slow WAN link. All servers are located in the main office run Windows Server 2008 R2. All client computers run Windows 7. You install an application on a Remote Desktop Session Host (RD Session Host) server. Users in the branch office experience slow performance when accessing the application through Remote Desktop. You need to minimize the bandwidth utilization to the RD Session Host server. What should you do?()A、Configure BranchCache in Hosted Cache mode.B、On the RD Session Host server, configure the RDP-TCP properties to allow only Network Level Authentication.C、On each client computer, configure the Connect Experience settings in the Remote Desktop Connection client.D、On each client computer, configure the Connect From Anywhere settings in the Remote Desktop Connection client.

单选题You create a shared Internet connection on a Windows 2000 Professional computer. Your network has 10 users on the LAN. All of the users can connect to HTTP sites, FTP sites, and streaming audio content on the Internet. One of the computers on your LAN is running an FTP host application. Users on the Internet cannot connect to the FTP host on your network. What should you do?()AConfigure the FTP host to accept incoming requests on service port 80.BConfigure an Internet Connection Sharing application type for FTP to use remote server port 23.CConfigure an Internet Connection Sharing service type for FTP use service port 21 on the FTP host computer.DConfigure an Internet Connection Sharing service type for FTP use service port 23 on the FTP host computer.

单选题Which layer of the OSI reference model uses the hardware address of a device to ensure message delivery to the proper host on a LAN?()AphysicalBdatalinkCnetworkDtransport

单选题You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows  Server 2012 R2 installed.ABC.com has a server, named ABC-SR07, which has four network adapters. ABC.com has two local area networks (LANs). Two of ABC-SR07’s network adapters are connected to the one LAN,while the other two are connected to the other LAN.You are required to configure one of the network adapter pairs into a network adapter team. Which of the following actions should you take?()AYou should consider accessing the Group Policy Management Console (GPMC) on ABC-SR07.BYou should consider accessing the TS Manager console on ABC-SR07.CYou should consider accessing the Server Manager console on ABC-SR07.DYou should consider accessing the Remote Desktop Gateway Manager console on ABC-SR07.

单选题Your company is main office and a branch office are connected by a slow WAN link. All servers are located in the main office run Windows Server 2008 R2. All client computers run Windows 7. You install an application on a Remote Desktop Session Host (RD Session Host) server. Users in the branch office experience slow performance when accessing the application through Remote Desktop. You need to minimize the bandwidth utilization to the RD Session Host server. What should you do?()AConfigure BranchCache in Hosted Cache mode.BOn the RD Session Host server, configure the RDP-TCP properties to allow only Network Level Authentication.COn each client computer, configure the Connect Experience settings in the Remote Desktop Connection client.DOn each client computer, configure the Connect From Anywhere settings in the Remote Desktop Connection client.

单选题A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。A10.10.0.1B10.10.0.2C199.99.9.33D199.99.9.57E200.2.2.17F200.2.2.18

多选题There are 2 switches in the Testking LAN, with no routers. Ports 1, 2 3 are assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link. Which of the conditions below would verify trunk and VLAN operation?()AHost 1 on VLAN 1 can ping Host 2 on VLAN 1BHost 1 on VLAN 1 can ping Host 4 on VLAN 2CHost 1 on VLAN 1 can not ping Host 2 on VLAN 1DHost 4 on VLAN 2 can not ping Host 1 on VLAN 1EHost 4 on VLAN 2 can ping Host 2 on VLAN 2

单选题Which includes an activity to host a workshop that focuses on the identification and configuration of the actual network components (routers, servers, local-area network or LAN, and so on) that will be incorporated to run and support the Cisco Unified Communications system()AImplementBDesignCPlanDPrepare

单选题Why would a network administrator configure port security on a switch?()ATo prevent unauthorized Telnet access to a switch port.BTo limit the number of Layer 2 broadcasts on a particular switch port.CTo prevent unauthorized hosts from accessing the LAN.DTo protect the IP and MAC address of the switch and associated ports.ETo block unauthorized access to the switch management interfaces over common TCP ports.