At which of the following layers does the ICMP protocol operate?()A、Layer 1B、Layer 3C、Layer 4D、Layer 5
At which of the following layers does the ICMP protocol operate?()
- A、Layer 1
- B、Layer 3
- C、Layer 4
- D、Layer 5
相关考题:
Which of the following would MOST likely be used to punch down LAN cables before connecting them to the main switch?()A、IDFB、66 blockC、MDFD、110 block
A user reports that their machine seems to be running slower than usual. The user states that the computer has become progressively worse as more applications are installed. Which of the following is the FIRST step the technician should take?()A、Run the CHKDSK utilityB、Run the disk defragmenter utilityC、Increase the capacity on the system volumeD、Convert to a dynamic drive on the system
Which of the following would BEST provide cooling to a processor?()A、Case fanB、HeatsinkC、Liquid cooling systemD、CPU fan
Before installing a firmware update on a RAID controller which of the following should be done?()A、 Check for corresponding driver updates.B、 Rebuild any arrays on the controller.C、 Check for corresponding OS updates.D、 Install a redundant BIOS on the controller.
Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()A、Disable TELNETB、Disable IGMP snoopingC、Enable TELNET but not SSLD、Disable ICMP/ping on device
Which of the following is an environmental server maintenance task that should be performed every three months?()A、Replace the rubber mats in the server roomB、Clean the servers to limit dust buildupC、Wash the outside of the serversD、Replace the server fans
An administrator receives a call from a user who is unable to receive email. After checking the workstation and email settings the administrator is still not able to determine the problem. Which of thefollowing is the NEXT step that the administrator should take? ()A、 Create an action plan.B、 Escalate the issue.C、 Reboot the mail server.D、 Document the solution.
What is the difference between thE.remove and thE.purge action with the dpkg command?()A、 -remove removes the program, -purge also removes the config filesB、 -remove only removes the program, -purge only removes the config filesC、 -remove removes a package, -purge also removes all packages dependent on itD、 -remove removes only the package file itself, -purge removes all files related to the package
Which of the following wireless standards can be used to avoid the 2.4GHz range?() (Select TWO).A、802.11gB、802.1XC、802.11bD、802.1nE、802.11a
向网卡应用新驱动程序后,服务器重启但无法正常启动。以下哪项是解决这一问题的最佳方法?()A、使用恢复控制台启动并恢复之前的驱动程序。B、启动服务器,按F8并访问最后一次正确配置。C、使用上次的备份磁带还原服务器。D、用ASR选项启动服务器。
Recently traffic to the company web server has more than doubled, resulting in slower response times from the server. An administrator has decided to add a second, identical 10/100/1000 NIC to the server. The server is presently connected to a 10/100/1000 switch, with four open ports on the switch. Which of the following is the BEST solution to speed up web traffic?()A、Free up more ports on the switchB、Enable server load balancingC、Move the second network adapter to a new subnetD、Enable network adapter teaming