单选题Which of the following analyzes the entire subnet to identify all hosts that are active?()APing sweepBPacket snifferCTracerouteDPort scanner
单选题
Which of the following analyzes the entire subnet to identify all hosts that are active?()
A
Ping sweep
B
Packet sniffer
C
Traceroute
D
Port scanner
参考解析
解析:
暂无解析
相关考题:
Your ISP has assigned you the following IP address and subnet mask:IP address: 199.141.27.0Subnet mask: 255.255.255.240Which of the following addresses can be allocated to hosts on the resulting subnet?(Select all that apply)A. 199.141.27.2B. 199.141.27.175C. 199.141.27.13D. 199.141.27.11E. 199.141.27.208F. 199.141.27.112
Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?A. CDPB. SNMPC. DHCPD. ARPE. DNSF. None of the above
A network technician wants to use a packet analyzer to troubleshoot a reported problem with auser‘s workstation with IP address 192.168.1.45. To identify the workstation‘s packets thetechnician wants to use the workstation‘s MAC address.Which of the following protocols would provide the needed information?()A.DHCPB.ARPC.DNSD.PING
Which of the following monitors a server to see which protocols might be in use?() A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer
Which of the following solutions will detect and disable a rogue access point?() A.Port scanB.Packet snifferC.IPSD.IDS
Which of the following is used to identify active hosts along with their network addresses?() A.Port scanB.Ping sweepC.IDSD.NIPS
Refer to the exhibit. Which subnet mask will place all hosts on Network B in the same subnet with the least amount of wasted addresses?() A.255.255.255.0B.255.255.254.0C.255.255.252.0D.255.255.248.0
Which of the following ping parameters will set the size of the outgoing packet?()A、–cB、iC、RD、–s
Which of the following solutions will detect and disable a rogue access point?()A、Port scanB、Packet snifferC、IPSD、IDS
Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer
Which of the following are TACACS+ characteristics?(Choose all that apply.)()A、Cisco proprietaryB、Standards-based protocolC、Provides separate services for authentication, authorization, and accountingD、Encrypts only the passwordE、Uses UDP for a transport layerF、Encrypts the entire packet
Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()A、CDPB、SNMPC、DHCPD、ARPE、DNSF、None of the above
While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()A、ping 192.168.1.255B、ping with sweep optionC、ping 192.168.1.127D、ping 192.168.1.64E、ping with broadcast option
A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING
Which of the following analyzes the entire subnet to identify all hosts that are active?()A、Ping sweepB、Packet snifferC、TracerouteD、Port scanner
Which of the following is used to identify active hosts along with their network addresses?()A、Port scanB、Ping sweepC、IDSD、NIPS
Which of the following tools can be used to identify the location of a network outage?()A、tracerouteB、netstatC、nslookupD、ping
Which of the following commands verifies connectivity between two hosts?()A、chkntfsB、dxdiagC、tracertD、ipconfigE、ping
Which of the following commands should be used to identify packet sequence problems?()A、 ping and arpB、 lsattr and ifconfigC、 netstat and iostatD、 iptrace and tcpdump
单选题Which of the following analyzes the entire subnet to identify all hosts that are active?()APing sweepBPacket snifferCTracerouteDPort scanner
多选题Which of the following are TACACS+ characteristics?(Choose all that apply.)()ACisco proprietaryBStandards-based protocolCProvides separate services for authentication, authorization, and accountingDEncrypts only the passwordEUses UDP for a transport layerFEncrypts the entire packet
单选题Which protocol automates all of the following functions for hosts on a network: IP configuration, IP addresses, subnet masks, default gateways, and DNS server information?()ACDPBSNMPCDHCPDARPEDNSFNone of the above
单选题Which of the following commands should be used to identify packet sequence problems?()A ping and arpB lsattr and ifconfigC netstat and iostatD iptrace and tcpdump
单选题Which of the following is used to identify active hosts along with their network addresses?()APort scanBPing sweepCIDSDNIPS
单选题The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()Aermit all packet smatching the first three octets of the source address to all destinationsBpermit all packet matching the last octet of the destination address and accept all source addressesCpermit all packet matching the host bits in the source address to all destinationsDpermit all packet from the third subnet of the network address to all destinations
单选题The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()Aermit all packets matching the first three octets of the source address to all destinationsBpermit all packet matching the last octet of the destination address and accept all source addressesCpermit all packet matching the host bits in the source address to all destinationsDpermit all packet from the third subnet of the network address to all destinations
单选题Which of the following ping parameters will set the size of the outgoing packet?()A–cBiCRD–s
单选题An administrator needs a network that can support up to 800 hosts on the same subnet. Which of the following is the MINIMUM subnet mask that should be used?()A255.0.0.0B255.255.0.0C255.255.252.0D255.255.255.0