Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。A、The MAC address of the NIC in Host 1B、The MAC address of the NIC in server 1C、The MAC address of the Fa0/0 interface of router R1D、The MAC address of the s0/0/0 interface of the router R2

Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。

  • A、The MAC address of the NIC in Host 1
  • B、The MAC address of the NIC in server 1
  • C、The MAC address of the Fa0/0 interface of router R1
  • D、The MAC address of the s0/0/0 interface of the router R2

相关考题:

He usually __________from headache. A.enduresB.suffersC.receives

在SQL Server 2008中,设先对MyDB数据库进行了一次完整备份,然后对该数据库进行了一次日志备份,这两次备份均备份在BK设备上。假设BK设备上只有这两次备份的内容。现要从备份中恢复My-DB数据库,正确的恢复过程及语句是( )。A.restore log MyDB from BK with file=1,norecoveryrestore database MyDB from BK with file=2B.restore log MyDB from BK with file=1,norecoveryrestore database MyDB from BK with file=2,norecoveryC.restore database MyDB from BK with file=1.norecoveryrestore log MyDB from BK with file=2,norecoveryD.restore database MyDB from BK with file=1,norecoveryrestore log MyDB from BK with file=2

Click the Exhibit button.A network administrator receives complaints that the application voicecube is timing out after being idle for 30 minutes.Referring to the exhibit, what is a resolution?() A. [edit] user@host# set applications application voicecube inactivity-timeout neverB. [edit] user@host# set applications application voicecube inactivity-timeout 2C. [edit] user@host# set applications application voicecube destination-port 5060D. [edit] user@host# set security policies from-zone trust to-zone trust policy intrazone then timeout never

Click the Exhibit button.A user logs in, is assigned the default role, and successfully loads the Host Enforcer policies shown in the exhibit.Which three statements are true? () A. The local host will respond to ICMP echo-request packets from 192.168.53.10.B. The local host will respond to UDP port 53 requests from 192.168.1.25.C. The local host can send any packet of any type to host 172.16.1.1.D. The local host will accept any packet of any type from host 172.16.1.1.E. The local host can send packets to UDP port512 on server 192.168.53.10.

You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10

Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrators attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A.Host B and the switch need to be in the same subnet.B.The switch needs and appropriate default gateway assigned.C.The switch interface connected to the router is down.D.Host B need to be assigned an IP address in vlan 1.E.The switch interfaces need the appropriate IP addresses assigned.

The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()A.from host PC1 to host 5.1.1.10B.from host PC1 to host 5.1.3.10C.from host PC2 to host 5.1.2.10D.from host PC2 to host 5.1.3.8

Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。A、Host 1 addresses the frames to the MAC address of router R1B、Host 1 looks in its ARP cache for the MAC address of router R1C、Host 1 addresses the frames to the MAC address of web server 2D、Host 1 sends the packets to router R1 to be forwarded to web server 2E、Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2

How should an administrator change the order in which host name lookup is performed so that it reads the host file before using DNS?()  A、Edit the /etc/inetd.conf file so that it reads ’local, bind’.B、Edit the /etc/resolv.conf file so that it reads ’local, bind’.C、Edit the /etc/netsvc.conf file so that it reads ’local, bind’.D、Edit the /etc/nslookup.conf file so that it reads ’local, bind’.

A user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA.  No other users are experiencing the same issue.Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem?()A、User ’joe’ is specified in the /etc/nologin on SYSTEMAB、User ’joe’ is specified in the /etc/nologin on SYSTEMBC、The file permissions on the /home/joe/.rhosts file on SYSTEMA is correct.D、The file permissions on the /home/joe/.rhosts file on SYSTEMB is incorrect.

What should an administrator do to allow the logon of a user to a local system without limitations from the host ‘webserver’?()A、configure the /etc/.rhosts with. webserver userB、configure the root'$HOME/.rhost file with.+webserver userC、configure each user's $HOME/.rhosts file with. webserver userD、configure the root'$HOME/.rhost file with.webserver ip user

The local host on a small network is named Earth. There is also a remote host on the network named Saturn.  The system administrator of the network is in the /u/tmp directory of Earth, and starts an ftp to Saturn as root.  Which of the following sequence of commands issued from the local host, Earth, will:()。 1.Change to the /u/new directory on Saturn.   2.Check to see if there is an a.out file on remote host Saturn. 3.Transfer a.out from Earth to Saturn.A、cd /u/new ls a.out put a.outB、cd /u/new ls a.out get a.outC、lcd /u/new ls a.out put a.outD、lcd /u/new ls a.out get a.out

What should an administrator do to allow the logon of a user to a local system without limitations from the host ’webserver’?()  A、configure the /etc/.rhosts withweb:serverB、configure the root’$HOME/.rhost file with:+webserver C、configure each user’s $HOME/.rhosts file with:webserver D、configure the root’$HOME/.rhost file with:

The following entry has been added to the syslog.conf file: *.emerg;mail,daemon.crit @ sysadmin  Which of the following will result from this entry?()A、 All messages at the emerg priority level and below from all facilities and messages at the crit priority level and below from the mail and daemon facilities are sent to the TTY of the user sysadmin. B、 All messages at the emerg priority level and above from all facilities, all messages at any priority level from the mail facility, and all messages at the crit priority level and above from the daemon facilities are sent to the remote host sysadmin. C、 All messages at the emerg priority level and above from all facilities and messages at the crit priority level and above from the mail and daemon facilities are sent to the remote host sysadmin. D、 All messages at the emerg priority level and above from all facilities except for the mail facility and messages at the crit priority level and above from the daemon facility are sent to the TTY of the user sysadmin.

Which naming method uses the tnsnames.ora file to store the connect descriptor used by the client  whileconnecting to the database instance from a remote machine()A、Host naming methodB、Local naming methodC、External naming methodD、Directory naming method

Which naming method uses the tnsnames.ora file to store the connect descriptor used by the client  while connecting to the database instance from a remote machine()A、host naming methodB、local naming methodC、external naming methodD、directory naming method

You have a server named Server 1.Server1 runs Windows Server 2012 R2. Server1 has a thin provisioned disk named Disk1.You need to expand Disk1.Which two actions should you perform?()A、From File and Storage Services, extend Disk1B、From File and Storage Services, add a physical disk to the storage poolC、From Disk Management, extend the volumeD、From Disk Management, delete the volume, create a new volume, and then format the volumeE、From File and Storage Services, detach Disk1

Your network contains two Web servers named Web1 and Web2. Web1 hosts the companys corporate Web site. Web2 is a test server that contains a copy of the Web site.Users connect to Web1 by using the URL http://www.contoso.com.A Web developer named User1 plans to test updates to the Web site on Web2.You need to ensure that User1 connects to Web2 by using the URL http://www.contoso.com. The solution must ensure that all other computers connect to Web1.What should you do?()A、From User1s computer, create a record in the Hosts file.B、From User1s computer, create a record in the Lmhosts file.C、From a DNS server, create a new Host (A) resource record.D、From a DNS server, create a new Alias (CNAME) resource record.

单选题What should an administrator do to allow the logon of a user to a local system without limitations from the host‘webserver’?()Aconfigure the /etc/.rhosts with:webserverBconfigure the root’$HOME/.rhost file with:+webserverCconfigure each user’s $HOME/.rhosts file with:webserverDconfigure the root’$HOME/.rhost file with:webserver

单选题A banking user with the userid of ’joe’ is unable to rsh from SYSTEMA to SYSTEMB without having to retype their password, but they can rsh from SYSTEMB to SYSTEMA. No other users are experiencing the same issue.  Both systems have a /home/joe/.rhosts file that contain the proper references to the other host. The /home/joe/.rhosts files on both SYSTEMA and SYSTEMB are owned by userid ’joe’.  Which of the following is the most likely cause of this problem()AUser ’joe’ is specified in the /etc/nologin on SYSTEMb.BUser ’joe’ is specified in the /etc/nologin on SYSTEMa.CThe file permissions on the /home/joe/.rhosts file on SYSTEMA are incorrect.DThe file permissions on the /home/joe/.rhosts file on SYSTEMB are incorrect.

单选题Your company has Hyper-V host servers located in datacenters named DataCenter1 and DataCenter2. You manage host servers and virtual machines (VMs) by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. DataCenter1 has a library server named Library1. You cannot provision VMs in DataCenter2 by using Library1. You install a new library server named Library2 in DataCenter2. You need to provision new VMs in DataCenter2 by using Library2. You copy a VHD file from Library1 to Library2, and you refresh Library2. What should you do next?()ARefresh Library1.BIndex the VHD file on Library2.CClone DataCenter1s VMM template.DEdit DataCenter1s VMM template to point to the VHD file in DataCenter2.

单选题An internet is a combination of networks connected by (1). When a datagram goes from a source to a (2), it will probably pass many (3) until it reaches the router attached to the destination network. A router receives a (4) from a network and passes it to another network. A router is usually attached to several networks. When it receives a packet, to which network should it pass the packet? The decision is based on optimization: Which of the available (5) is the optimum pathway? 空白(1)处应选择()AmodemsBroutersCswitcherDcomputers

单选题Can MF/HF radiotelephone receive the MSI sent from the coast stations alone?()ANo, it receives the MSI from ship stationsBYes, it canConly with NBDP terminal, can it receives the MSI sent from coast stationsDNo, it can not receive the MSI sent from coast stations

单选题Which statement describes multihop FCoE function when an FCoE switch receives an FCoE frame from the directly connected FCoE host?()A The switch receives the FCoE frame and forwards it to another switch over its VE port.B The switch receives the FCoE frame, deapsulates it, and sends the Fibre Channel frame to the fabric over its Fibre Channel uplink port.C The switch receives the FCoE frame, deapsulates it, and sends the Fibre Channel frame to the Fibre Channel target over its Fibre Channel port.D The switch receives the FCoE frame and forwards it to another FCoE device over its VN port.

单选题Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。AThe MAC address of the NIC in Host 1BThe MAC address of the NIC in server 1CThe MAC address of the Fa0/0 interface of router R1DThe MAC address of the s0/0/0 interface of the router R2

单选题You need to design a method to ensure that only scripts that are approved by the IT department can run on company computers. Your solution must meet business requirements. What should you do?()ACreate a new software restriction policy in the Default Domain Policy GPO that removes the Microsoft Visual Basic Scripting Edition and the Windows Script Component file types from the File Types listBCreate a new software restriction policy in the Default Domain Policy GPO that disables the use of Wscript.exe and Cscript.exeCConfigure Windows Script Host to not execute Windows Script Component file typesDConfigure Windows Script Host to execute only scripts that are signed by a certificate issued by an approved certification authority (CA)

单选题You are the network administrator for your company. All network servers run Windows Server 2003.The network includes a file server named File1. File1 contains a single disk for system files and two SCSIhard disks that comprise a 72-GB mirrored volume with 65 GB of read-only data. Users connect to thisdata by using shortcuts on their desktops.File1 is scheduled for replacement. You have a scheduled maintenance window to complete this task.Before the maintenance window, you build a new server.You need to bring the new server online with current data and re-establish redundancy as quickly aspossible. You must also ensure that the desktop shortcuts will continue to function.What should you do? ()AName the new server File2. Create a new mirrored volume by using two 72-GB disks. Connect File2 to the network and copy the data from File1. When copying is complete, shut down the old File1.BName the new server File1. Move both disks from the old File1 to the new File1. Scan the disks for changes. Import the disks. Connect the new File1 to the network.CName the new server File1. Break the mirror on the old File1. Move one of the disks from the old File1 to the new File1. Scan the disk for changes. Initialize the disk. Select the spare disk and create the mirror. Connect the new File1 to the network.DName the new server File1. Remove one of the disks in the mirror from the old File1. Move the disk to the new File1. Scan the disk for changes. Import the disk. Shut down the old File1 and connect the new File1 to the network.