多选题Which two statements regarding traceroute on JUNOS devices are correct?()ATraceroute transmits ICMP echo-request packets.BTraceroute transmits UDP packets.CTraceroute receives ICMP echo-reply packets.DTraceroute receives ICMP port-unreachable packets.

多选题
Which two statements regarding traceroute on JUNOS devices are correct?()
A

Traceroute transmits ICMP echo-request packets.

B

Traceroute transmits UDP packets.

C

Traceroute receives ICMP echo-reply packets.

D

Traceroute receives ICMP port-unreachable packets.


参考解析

解析: 暂无解析

相关考题:

TCP/IP协议组的网际网层(网络层)含有四个重要的协议,它们是( )。A. IP, ICMP, ARP, UDPB. TCP, ICMP , UDP , ARPC. IP, ICMP,ARP , RARPD. UDP, IP, ICMP. RARP

ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets? (Choose two)A. They acknowledge receipt of TCP segments.B. They guarantee datagram delivery.C. They can provide hosts with information about network problems.D. They are encapsulated within IP datagrams.E. They are encapsulated within UDP datagrams.F. They are encapsulated within TCP datagrams.

Which two statements regarding traceroute on JUNOS devices are correct?() A.Traceroute transmits ICMP echo-request packets.B.Traceroute transmits UDP packets.C.Traceroute receives ICMP echo-reply packets.D.Traceroute receives ICMP port-unreachable packets.

Internet的网络层含有四个重要的协议,分别为( )A.IP,ICMP,ARP,UDPB.TCP,ICMP,UDP,ARPC.IP,ICMP,ARP,RARPD.UDP,IP,ICMP,RABP

The ______ transmits own ship data cyclically via two defined VHF channels and receives the same data of the other ships and objects that are equipped with AIS systems.A.AISB.ECDISC.GPSD.VDR

ping命令和traceroute命令基于相同的ICMP功能。

Traceroute程序用来显示报文到目的地经过的网关地址,Traceroute依靠ICMP的()信息来获取网关地址?A、ICMP目的地址不可达B、ICMP超时C、ICMP端口不可达D、ICMP网络不可达

TCP/IP协议组的网际网层(网络层)含有四个重要的协议,它们是()。A、IP,ICMP,ARP,UDPB、TCP,ICMP,UDP,ARPC、IP,ICMP,ARP,RARPD、UDP,IP,ICMP,RARP

TCP/IP协议组的网际网层(网络层)含有四个要的协,它们是()。A、IP,ICMP,ARP,UDPB、TCP,ICMP,UDP,ARPC、IP,ICMP,ARP,RARPD、UDP,IP,ICMP,RARP247

Internet网络层使用的四个重要协议是()A、IP、ICMP、ARP、UDPB、IP、ICMP、ARP、RARPC、TCP、UDP、ARP、RARPD、UDP、ARP、RARP

What command verifies connectivity between two hosts by sending and receiving ICMP echo messages?()A、pingB、tracertC、netstatD、show cdp neighbors detailE、show ip routeF、traceroute

Which two network attack statements are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.D、DoS attacks can consist of IP spoofing and DDoS attacks.E、IP spoofing can be reduced through the use of policy-based routing.F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

Which two statements are correct when you use the reject parameter as the next-hop value for a static route?()A、The packet is dropped and the packet's source is marked with the no-readvertise parameter.B、The system sends the packet back to the source.C、The packet is dropped from the network.D、The system sends an ICMP message back to the source of the packet.

A router receives an IPv6 packet which is 2000 bytes in length. The MTU of the outgoing interface is 1500 bytes. What action will the router take?()A、forwards the packetB、fragments the packetC、drops the packet silentlyD、drops the packet and sends an ICMP message

以下哪个命令不使用ICMP协议?()A、pingB、ipconfigC、tracertD、traceroute

下列哪个应用是基于ICMP实现的?()A、PINGB、TracertC、NslookunD、Traceroute

When running IP SLA, which application type should be used if you want to know round-trip delay, jitter, and packet loss for the full path?()A、ICMP path echoB、UDP echoC、ICMP path jitterD、Application Performance MonitorE、TCP connect

Which statement is true when ICMP echo and echo-reply are disabled on edge devices?()A、Pings are allowed only to specific devices.B、CDP information is not exchanged.C、Port scans can no longer be run.D、Some network diagnostic data is lost.E、Wireless devices need to be physically connected to the edge device.F、OSPF routing needs the command ip ospf network non-broadcast enabled.

What statements are true regarding ICMP packets?()A、They acknowledge receipt of TCP segments.B、They guarantee datagram delivery.C、They can provide hosts with information about network problems.D、They are encapsulated within IP datagrams.E、They are encapsulated within UDP datagrams.

Internet的网络层含有四个重要的协议,分别为()A、IP,ICMP,ARP,UDPB、TCP,ICMP,UDP,ARPC、IP,ICMP,ARP,RARPD、UDP,IP,ICMP,RARP

多选题Which two statements are correct when you use the reject parameter as the next-hop value for a static route?()AThe packet is dropped and the packet's source is marked with the no-readvertise parameter.BThe system sends the packet back to the source.CThe packet is dropped from the network.DThe system sends an ICMP message back to the source of the packet.

多选题What statements are true regarding ICMP packets?()AThey acknowledge receipt of TCP segments.BThey guarantee datagram delivery.CThey can provide hosts with information about network problems.DThey are encapsulated within IP datagrams.EThey are encapsulated within UDP datagrams.

单选题Internet的网络层含有四个重要的协议,分别为()AIP,ICMP,ARP,UDPBTCP,ICMP,UDP,ARPCIP,ICMP,ARP,RARPDUDP,IP,ICMP,RARP

单选题TCP/IP协议组的网际网层(网络层)含有四个要的协,它们是()。AIP,ICMP,ARP,UDPBTCP,ICMP,UDP,ARPCIP,ICMP,ARP,RARPDUDP,IP,ICMP,RARP247

多选题Which statements are true concerning NAT? ()ANAT provides 1 to manyaddress mapping.BNAT provides 1 to 1 address mapping.CNAT is only useful forTCP/UDP and ICMP traffic.DNAT can be used for all IP traffic.

多选题Which two network attack statements are true?()AAccess attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.BAccess attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.CDoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.DDoS attacks can consist of IP spoofing and DDoS attacks.EIP spoofing can be reduced through the use of policy-based routing.FIP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

单选题TCP/IP协议组的网际网层(网络层)含有四个重要的协议,它们是()。AIP,ICMP,ARP,UDPBTCP,ICMP,UDP,ARPCIP,ICMP,ARP,RARPDUDP,IP,ICMP,RARP