While using the ping command to try and reach a local server, a technician receives a response of “Destination host unreachable”. After confirming that the PC is physically connected to the network, which of the following commands should the technician use to get more detailed information?()A、TRACERTB、GREPC、TELNETD、DIG

While using the ping command to try and reach a local server, a technician receives a response of “Destination host unreachable”. After confirming that the PC is physically connected to the network, which of the following commands should the technician use to get more detailed information?()

  • A、TRACERT
  • B、GREP
  • C、TELNET
  • D、DIG

相关考题:

While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."At which OSI layer is this problem associated with?A.The data link layerB.The application layerC.The access layerD.The session layerE.The network layer

Regarding the extended ping command; which of the statements below are true?(Select all valid answer choices)A.The extended ping command is supported from user EXEC mode.B.The extended ping command is available from privileged EXEC mode.C.With the extended ping command you can specify the TCP and UDP port to be pinged.D.With the extended ping command you can specify the timeout value.E.With the extended ping command you can specify the datagram size.

Which action does the ping 172.18.1.1 size 5 command perform?() A. It sends only five ping requests to the 172.18.1.1 destination.B. It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.C. It sends five rapid ping requests to the 172.18.1.1 destination.D. It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.

Which command is used to debug a ping command?() A.debug icmpB.debug ip icmpC.debug tcpD.debug packet

A technician is troubleshooting a network connectivity issue on a MFD and would like to eliminate the possibility of another device on the network having the same IP address. The technician should:()A、disconnect the MFD and ping the IP address.B、disconnect the MFD and ping the subnet mask.C、disconnect the MFD and ping the loopback address.D、run the ipconfig command from the command prompt.

A technician is attempting to use a command line prompt to continuously ping a remote server to check availability and reliability of the connection. Which of the following provides the ping command needed to continuously ping the system?()A、ping -aB、ping -fC、ping -rD、ping -t

Communication with a remote host has failed.  Which command is LEAST helpful in isolating the failure?()A、 ping RemoteHostName B、 ping RemoteHostIPaddr C、 nslookup RemoteHostName D、 ping lo0

Which action does the ping 172.18.1.1 size 5 command perform?()A、It sends only five ping requests to the 172.18.1.1 destination.B、It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.C、It sends five rapid ping requests to the 172.18.1.1 destination.D、It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.

Which of the following options would best help to reduce packet fragmentation for a TCP application transferring large amounts of data between servers across a path of multiple networks?()A、 Adjust Path MTU attributes, using the no command.B、 Adjust the status queue size on the adapters, using the chdev command.C、 Adjust ipforwarding to enabled, using the no command.D、 Adjust tcp_maxburst to enabled, using the no command.

While applying a service update on a system using SMIT, the system administrates SMIT Command Status screen shows "Command: failed". Which of the following procedures should be performed to investigate the failure?()A、Exit the SMIT session and re-apply the update.B、Select the SMIT option to Clean UP After an Interrupted Installation.C、Examine the installation summary report to determine the cause of the failure.D、Examine the console log to view the error messages generated by the failure.

Which CLI command will ping destination 10.0.29.1 ten times and display the incoming interface of the received packet?()A、ping count 10 10.0.29.1 detailB、ping number 10 10.0.29.1 detailC、ping count 10 10.0.29.1 extensiveD、ping number 10 10.0.29.1 extensive

While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()A、ping 192.168.1.255B、ping with sweep optionC、ping 192.168.1.127D、ping 192.168.1.64E、ping with broadcast option

While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."At which OSI layer is this problem associated with?()A、The data link layerB、The application layerC、The access layerD、The session layerE、The network layer

While configuring a new adapter using cfgmgr, an administrator receives a warning message indicating that some device packages are not installed.  Additionally, the adapter displays in the Defined state.  Which command will resolve the issue and make the adapter available?()  A、shutdown -FrB、cfgmgr -i C、mkdev -l D、mknode /dev/

You have joined a new organization as a Database Administrator. The Security Administrator in your organization has kept human errors, such as erroneously dropping users, tables, and important data, to a minimum by carefully granting only the necessary privileges to each user. As a result of several ongoing transactions within your database, you discover that the flashback logs are rapidly increasing in the flash recovery area. To avoid out-of-space errors, you decide to delete the flashback logs from the flash recovery area. How can you delete the flashback logs from the database if your database is up and running?()A、 Shut down the database using the SHUTDOWN command. Mount the database using the STARTUP MOUNT EXCLUSIVE command and disable Flashback Database using the ALTER DATABASE FLASHBACK OFF statement.B、 Change the parameter setting in the SPFILE for the DB_RECOVERY_FILE_DEST parameter using the ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’’ SCOPE=BOTH statement while the database is up and running.C、 Shut down the database using the SHUTDOWN command. Mount the database using the STARTUP MOUNT EXCLUSIVE command. Change the parameter setting in the SPFILE for the DB_RECOVERY_FILE_DEST parameter using the ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’’ SCOPE=BOTH statement. Disable Flashback Database using the ALTER DATABASE FLASHBACK OFF statement.D、 Change the parameter setting in the SPFILE for the DB_RECOVERY_FILE_DEST parameter using the ALTER SYSTEM SET DB_RECOVERY_FILE_DEST=’’ SCOPE=BOTH statement. Shut down the database using the SHUTDOWN command. Mount the database using the STARTUP MOUNT EXCLUSIVE command and disable Flashback Database using the ALTER DATABASE FLASHBACK OFF statement.

You perform a backup using the following BACKUP command:   RMAN BACKUP AS COMPRESSED BACKUPSET DATABASE;   Which statement is true of this command?()  A、 A different procedure is required to restore a database from compressed backupsB、 The AS COMPRESSED clause of the BACKUP command provided by RMAN is used to create compressed  backup sets and image copies.C、 Using this command to create backups minimizes the bandwidth consumedD、 Using this command to create backups improves the performance of the backup process

多选题Your database in running in the ARCHIVELOG mode. You issue the following command to back up datafile 2 in your database.   RMAN COPY DATAFILE 2 TO ’D:///ORACLE/ORA90/MYNEWDB/DA2.DBF’;   Which two statements are true regarding the backup created using this command?()AThe copy of the datafile created is stored in the RMAN repository.BThe copy of the datafile created can be viewed using the LIST BACKUP command.CThe copy of the datafile created using this COPY command can be placed only on the disk.DThe copy of the datafile created is similar to the backup of the file created using the BACKUP command.EThe copy of the datafile created can be used for recovering the database using the user-managed recovery method.

单选题A technician is attempting to use a command line prompt to continuously ping a remote server to check availability and reliability of the connection. Which of the following provides the ping command needed to continuously ping the system?()Aping -aBping -fCping -rDping -t

单选题While performing a regular check on your recovery catalog you realized that the catalog database is running out of space and you do not have options to increase the space. However, you have another database where more space is available and you want to move your existing recovery catalog to this database. The options that can be considered while moving the recovery catalog are as follows:() 1. Using one of the Oracle expdp utilities to export the catalog data 2. Creating a recovery catalog user and granting the necessary privileges in the other database 3. Creating the recovery catalog using the CREATE CATALOG command 4. Using the corresponding impdp utility to import the catalog data into the other database 5. Registering the target database in the new catalog database using the REGISTER DATABASE command Identify the option with the correct sequence for moving the recovery catalog.A2, 3, 5B1, 2, 4C1, 2, 4, 5D1, 2, 3, 4, 5

单选题While using the ping command to try and reach a local server, a technician receives a response of “Destination host unreachable”. After confirming that the PC is physically connected to the network, which of the following commands should the technician use to get more detailed information?()ATRACERTBGREPCTELNETDDIG

单选题Which command is used to debug a ping command?()Adebug icmpBdebug ip icmpCdebug tcpDdebug packet

单选题You perform a backup using the following BACKUP command:   RMAN BACKUP AS COMPRESSED BACKUPSET DATABASE;   Which statement is true of this command?()A A different procedure is required to restore a database from compressed backupsB The AS COMPRESSED clause of the BACKUP command provided by RMAN is used to create compressed  backup sets and image copies.C Using this command to create backups minimizes the bandwidth consumedD Using this command to create backups improves the performance of the backup process

单选题Adam is working as a Database Administrator (DBA) for TeleSoft Corporation. His database is running in the ARCHIVELOG mode. During database startup, he discovers that one of the disks crashed, resulting in the permanent loss of a read-write USERS tablespace. The USERS01.dbf datafile belongs to the USERS tablespace and is 500 MB in size. He needs to recover the USERS tablespace from the backup. While reviewing the backup details, he discovers that the most recent available backup is five days old. This backup was taken when the USERS tablespace was read-only. After correcting the hardware problem that caused the failure, what should Adam do to recover the USERS tablespace?()A Restore the USERS01.dbf file from the backup, and open the database using the STARTUP command.B Restore the USERS01.dbf file using the RECOVER TABLESPACE command, and open the database using the ALTER DATABASE OPEN statement.C Restore the USERS01.dbf file from the backup, recover the USERS tablespace using the RECOVER TABLESPACE command, and open the database using the ALTER DATABASE OPEN statement.D Restore the USERS01.dbf file from the backup and change the status of the USERS tablespace from read-only to read-write using the ALTER TABLESPACE USERS READ WRITE statement. Then, recover the USERS tablespace using the RECOVER TABLESPACE command, and open the database using the ALTER DATABASE OPEN statement.

单选题Which of the following options would best help to reduce packet fragmentation for a TCP application transferring large amounts of data between servers across a path of multiple networks?()A Adjust Path MTU attributes, using the no command.B Adjust the status queue size on the adapters, using the chdev command.C Adjust ipforwarding to enabled, using the no command.D Adjust tcp_maxburst to enabled, using the no command.

单选题What is a valid option when using the ping command?()Apacket lossBpacket sizeCCRCDTCP port

单选题Which action does the ping 172.18.1.1 size 5 command perform?()AIt sends only five ping requests to the 172.18.1.1 destination.BIt sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.CIt sends five rapid ping requests to the 172.18.1.1 destination.DIt sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.

单选题Communication with a remote host has failed.  Which command is LEAST helpful in isolating the failure?()A ping RemoteHostName B ping RemoteHostIPaddr C nslookup RemoteHostName D ping lo0

单选题While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()Aping 192.168.1.255Bping with sweep optionCping 192.168.1.127Dping 192.168.1.64Eping with broadcast option