Which fields are included in the TCP header? (Choose three).A. Source PortB. Acknowledgement NumberC. Request NumberD. Destination AddressE. WindowF. Data
Which fields are included in the TCP header? (Choose three).
A. Source Port
B. Acknowledgement Number
C. Request Number
D. Destination Address
E. Window
F. Data
相关考题:
Which two packet attributes contribute to the identification of a session? ()(Choose two.) A. destination portB. TTLC. IP optionsD. protocol number
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.) A. data integrityB. data confidentialityC. data authenticationD. outer IP header confidentialityE. outer IP header authentication
In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.) A. IP protocolB. IP time-to-liveC. source and destination IP addressD. source and destination MAC addressE. source and destination TCP/UDP port
Which two statements are true when source/destination filters are enabled? ()(Choose two.) A. Excluded traffic is not accelerated.B. Excluded traffic is only compressed.C. Source/destination filter applies to all traffic sent from LAN to WAN.D. Source/destination filters work in packet interception mode using RIPv2.
An IPv6 host is configured to request a specific path through the network to reach a destination.Which IPv6 extension header should be used?() A. RoutingB. Hop-by-HopC. FragmentationD. Destination Options
Which three of the following options are NOT fields found in an Ethernet frame?() A.VersionB.TypeC.Source PortD.FlagsE.Data
Regarding PAR (Positive Acknowledgement and Re-transmission), which of the answer choices below are correct?() A. The source device will only retransmit lost packets on the request of the destination device.B. The source device starts a timer when it sends a segment and retransmits if an acknowledgment is not received before the timer expires.C. The destination device acknowledges receipt of a segment by sending a packet with a new sequence number and the ACK bit sent.D. The destination device acknowledges receipt of a segment by sending a packet that indicates the next sequence number it expects.E. If the destination device does not receive a segment, all segments are retransmitted.F. The source device keeps a record of all segments sent and expects and acknowledgment of each.
Which of one the following fields is contained within an IEEE Ethernet frame header?() A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address
Although TCP segments differ from UDP segments, they both contain some common fields. What two segments do they share in common?() A. source addressB. optionsC. sequence numberD. sourcesE. destination portF. checksum
What does a Layer 2 switch use to decide where to forward a received frame?() A. source MAC addressB. source IP addressC. source switch portD. destination IP addressE. destination port addressF. destination MAC address
A standard IP access list is applied to an Ethernet interface of a router. What does this standard access list filter on?() A. The source and destination addressesB. The destination port numberC. The destination addressD. The source addressE. All of the above
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?() A. source portB. output interfaceC. next-hop IP addressD. source MAC addressE. destination IP addressF. next-hop MAC address
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。 A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and destination MAC address
Which of the following descriptions about IP spoofing is correct?()A、IP source address is forgedB、IP destination address is forgedC、IP TCP source port is forgedD、IP TCP destination port is forgedE、None of above
Which fields are included in the TCP header?()A、Source PortB、Acknowledgement NumberC、Request NumberD、Destination AddressE、WindowF、Data
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address
Server load balancing (SLB) is the process of deciding to which server a load-balancing device should send a client request for service. Which predictors are supported on ACE in order to select the best server to fulfill a client request? ()A、 Hash address: Selects the server by using a hash value based on either the source or destination IP address, or bothB、 Hash URL: Selects the server by using a hash value based on the requested URLC、 Hash MAC.Selects the server by using a hash value based on either the source or destination MAC address, or bothD、 Hash header: Selects the server by using a hash value based on the HTTP header nameE、 Hash IP: Selects the server using a hash value based on the IP address
Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address
In JUNOS Software, which three packet elements can be inspected to determine if asession already exists?()A、IP protocolB、IP time-to-liveC、source and destination IP addressD、source and destination MAC addressE、source and destination TCP/UDP port
Which three of the following options are NOT fields found in an Ethernet frame?()A、VersionB、TypeC、Source PortD、FlagsE、Data
In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)A、IP protocolB、IP time-to-liveC、source and destination IP addressD、source and destination MAC addressE、source and destination TCP/UDP port
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
多选题Which fields are included in the TCP header?()ASource PortBAcknowledgement NumberCRequest NumberDDestination AddressEWindowFData
多选题In JUNOS software with enhanced services, which three packet elements are inspected to determineif a session already exists? ()(Choose three.)AIP protocolBIP time-to-liveCsource and destination IP addressDsource and destination MAC addressEsource and destination TCP/UDP port
单选题Which of the following descriptions about IP spoofing is correct?()AIP source address is forgedBIP destination address is forgedCIP TCP source port is forgedDIP TCP destination port is forgedENone of above
单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()Asource and destination MAC addressBsource MAC address and destination network address onlyCsource and destination network address onlyDsource network address and destination MAC addressEsource and destination MAC address and source and destination network address