Regarding the extended ping command; which of the statements below are true?(Select all valid answer choices)A.The extended ping command is supported from user EXEC mode.B.The extended ping command is available from privileged EXEC mode.C.With the extended ping command you can specify the TCP and UDP port to be pinged.D.With the extended ping command you can specify the timeout value.E.With the extended ping command you can specify the datagram size.

Regarding the extended ping command; which of the statements below are true?

(Select all valid answer choices)

A.The extended ping command is supported from user EXEC mode.

B.The extended ping command is available from privileged EXEC mode.

C.With the extended ping command you can specify the TCP and UDP port to be pinged.

D.With the extended ping command you can specify the timeout value.

E.With the extended ping command you can specify the datagram size.


相关考题:

While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."At which OSI layer is this problem associated with?A.The data link layerB.The application layerC.The access layerD.The session layerE.The network layer

Which CLI command is used to set a Privileged Exec password of my password?() A.AB.BC.CD.D

Which command will allow the creation of a10-character login user name?() A.chlogin -a log_name=10B.chdev -l sys0 -a max_logname=10C.chusr extended_logname=true [userid]D.chuser login_name=10 extended_logname=true [userid]

Which of the following are characteristics of named access lists?() A. Individual statements in a named access list may be deleted.B. They require a numbered range from 1000 to 1099.C. When created, they must be specified as standard or extended.D. They are created with the ip access-list command.E. The entire access list must be deleted before editing.F. They are applied with the ip name-group command.

Refer to the exhibit. IP multicast configuration changes have been made on several routers.However, the IP multicast table displayed in the exhibit still does not reflect the changes. What should be done to display the new routing table information? ()A. Issue the clear ip route * privileged EXEC command.B. Issue the clear ip igmp group privileged EXEC command.C. Issue the no ip mroute - cache privileged EXEC command.D. Issue the clear ip mroute privileged EXEC command.

Which of the following answer choices are correct characteristics of named access list?() A. You can delete individual statements in a named access listB. Named access lists require a numbered range from 1000 to 1099.C. Named access lists must be specified as standard or extended.D. You can use the ip access-list command to create named access lists.E. You cannot delete individual statements in a named access list.F. You can use the ip name-group command to apply named access lists.

The enable secret command is used to secure access to which CLI mode?() A.user EXEC modeB.global configuration modeC.privileged EXEC modeD.auxiliary setup mode

Which command can be used from a PC to verfy the connectivity between host that connect through path?() A.tracert addressB.ping addressC.arp addressD.traceroute address

Exhibit: Which of the following are true regarding the command output shown in the display (Choose two.)()。 A.There are at least two routers participating in the RIP process.B.A ping to 192.168.168.2 will be successful.C.A ping to 10.0.15.2 will be successful.D.RtrA has three interfaces participating in the RIP process.

Which of the following are characteristics of named access lists?()A、Individual statements in a named access list may be deleted.B、They require a numbered range from 1000 to 1099.C、When created, they must be specified as standard or extended.D、They are created with the ip access-list command.E、The entire access list must be deleted before editing.F、They are applied with the ip name-group command.

Which two Cisco AutoQoS configuration statements are true? ()A、the auto discovery qos command is supported on serial interfaces, subinterfaces, and virtual interfacesB、CEF must be enabled before configuring the auto discovery qos commandC、the auto discovery qos privilege EXEC command must be configured on a router for several days to collect a sampling of data trafficD、the auto qos trust command relies on NBAR to provide VoIP classificationE、the auto qos voip command configures the voip classification on routers and switches

A technician is troubleshooting a network connectivity issue on a MFD and would like to eliminate the possibility of another device on the network having the same IP address. The technician should:()A、disconnect the MFD and ping the IP address.B、disconnect the MFD and ping the subnet mask.C、disconnect the MFD and ping the loopback address.D、run the ipconfig command from the command prompt.

Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?()A、ping addressB、tracert addressC、traceroute addressD、arp address

Which command is used to debug a ping command?()A、debug icmpB、debug ip icmpC、debug tcpD、debug packet

The enable secret command is used to secure access to which CLI mode?()A、user EXEC modeB、global configuration modeC、privileged EXEC modeD、auxiliary setup mode

Which of the following answer choices are correct characteristics of named access list?()A、You can delete individual statements in a named access listB、Named access lists require a numbered range from 1000 to 1099.C、Named access lists must be specified as standard or extended.D、You can use the ip access-list command to create named access lists.E、You cannot delete individual statements in a named access list.F、You can use the ip name-group command to apply named access lists.

Which command can be used from a PC to verfy the connectivity between host that connect through path?()A、tracert addressB、ping addressC、arp addressD、traceroute address

A technician is attempting to use a command line prompt to continuously ping a remote server to check availability and reliability of the connection. Which of the following provides the ping command needed to continuously ping the system?()A、ping -aB、ping -fC、ping -rD、ping -t

Which of the following is TRUE about the ping  -f command?()A、 It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the "f" in the command line. B、 It is useful for flooding from slow character based terminals since it only displays a dot "." for each packet sent in fast mode. C、 It is useful for flooding from slow character based terminals since it only displays a dot "."       for each packet sent and a backspace on returned in fast mode. D、 The command can only be run by root.

While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."At which OSI layer is this problem associated with?()A、The data link layerB、The application layerC、The access layerD、The session layerE、The network layer

In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()A、TCPB、UDPC、ICMPD、SMTP

Which command will allow the creation of a10-character login user name?()A、chlogin -a log_name=10B、chdev -l sys0 -a max_logname=10C、chusr extended_logname=true [userid]D、chuser login_name=10 extended_logname=true [userid]

What is a valid option when using the ping command?()A、packet lossB、packet sizeC、CRCD、TCP port

You executed the following command to drop a user: DROP USER scott CASCADE; Which two statements regarding the above command are correct?()A、All the objects of scott are moved to the Recycle Bin.B、Any objects in the Recycle Bin belonging to scott are purged.C、All the objects owned by scott are permanently dropped from the database.D、All the objects of scott in the Recycle Bin must be purged before executing the DROP command.E、Any objects in the Recycle Bin belonging to scott will not be affected by the above DROP command.

The user HR owns the EMP table. The user HR grants privileges to the user SCOTT by using this command:  SQL GRANT SELECT,INSERT,UPDATE ON emp TO scott WITH GRANT OPTION; The user SCOTT executes this command to grant privileges to the user JIM: SQL GRANT SELECT,INSERT,UPDATE ON hr.emp TO jim;  Now, the user HR decides to revoke privileges from JIM using this command: SQL REVOKE SELECT,INSERT,UPDATE ON emp FROM jim; Which statement is true after HR issues the REVOKE command()A、The command fails because SCOTT still has privileges.B、The command succeeds and privileges are revoked from JIM.C、The command fails because HR cannot revoke the privileges from JIM.D、The command succeeds and only HR has the privilege to perform the SELECT, INSERT, and UPDATEoperations on the EMP table.

多选题Which two Cisco AutoQoS configuration statements are true? ()Athe auto discovery qos command is supported on serial interfaces, subinterfaces, and virtual interfacesBCEF must be enabled before configuring the auto discovery qos commandCthe auto discovery qos privilege EXEC command must be configured on a router for several days to collect a sampling of data trafficDthe auto qos trust command relies on NBAR to provide VoIP classificationEthe auto qos voip command configures the voip classification on routers and switches

单选题A technician is attempting to use a command line prompt to continuously ping a remote server to check availability and reliability of the connection. Which of the following provides the ping command needed to continuously ping the system?()Aping -aBping -fCping -rDping -t