A network admin wants to know every hop the packets take when he accesses cisco.com. Which command is the most appropriate to use?() A.path cisco.comB.debug cisco.comC.trace cisco.comD.traceroute cisco.com

A network admin wants to know every hop the packets take when he accesses cisco.com. Which command is the most appropriate to use?()

A.path cisco.com

B.debug cisco.com

C.trace cisco.com

D.traceroute cisco.com


相关考题:

in the following, which method is not appropriate when you try to act against the students’ indiscipline ? () A. Deal with it quietlyB. Giving linesC. Don’t take things personallyD. Don’t use threats

Which of the following is NOT true?A) When a person tries to help others, he must be clear that there is a real emergency.B) When a person tries to help others, he should know whether they are worth his help.C) A person must take the full responsibility for the safety of those in emergencies if he wants to help.D) A person with a heart attack needs help.

Which of the following is the BEST approach a technician should take when informing a customerabout their findings of any specific computer problem?() A. Use non-technical terms.B. Use the appropriate acronyms.C. Use proper technical terms.D. Use email to ensure a written record.

A network technician wants to use a packet analyzer to troubleshoot a reported problem with auser‘s workstation with IP address 192.168.1.45. To identify the workstation‘s packets thetechnician wants to use the workstation‘s MAC address.Which of the following protocols would provide the needed information?()A.DHCPB.ARPC.DNSD.PING

An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?() A.netstatB.tracerouteC.nbtstatD.ping

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?() A. all interfaces in the path toward the destinationB. all networks in the path toward the destinationC. adjacent next hop router in the path toward the destinationD. all routers in the path toward the destinationE. all interfaces through which the packets can be routedF. type of service and precedence in the IP packets

Refer to the exhibit. Routing updates for the 192.168.1.0 network are being received from all three neighbors. Which statement is correct regarding the result of the con figuration shown? () A. The router will prefer the next hop of 172.16.1.1 for packets destined for the 192.168.1.0 network.B. The router will prefer the next hop of 172.26.1.1 for packets destined for the 192.168.1.0 network.C. The router will adve rtise the 192.168.1.0 network only to 172.30.1.1.D. The router will advertise the 192.168.1.0 network only to 172.26.1.1.E. The router will prefer the next hop of 172.26.1.1 for packets except those destined for the 192.168.1.0 network.

What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()A、The network was originated via redistribution of an interior gateway protocol into BGPB、The network was defined by a static routeC、The network was learned via IBGPD、The network was learned via EBGPE、The network was originated via a network or aggregate command

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A、all interfaces in the path toward the destinationB、all networks in the path toward the destinationC、adjacent next hop router in the path toward the destinationD、all routers in the path toward the destinationE、all interfaces through which the packets can be routedF、type of service and precedence in the IP packets

When rejecting applied an dependent updates on an AIX 5L system, which of the following procedures is most appropriate to follow?()A、Use the install PREVIEW option to view a list of all updates that will be rejectedB、Use the lslpp -d command to view the dependent filesets that will be rejectedC、Select the SMIT option to Verify Software Requisites and Installations first to generate a list of all applied updates.D、Select the SMIT option to List the Maintenance Level of a Software Product to double check the update level that should be removed

A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()A、A large FTP job is in process. B、A network interface was misconfigured. C、The ping command is being used excessively. D、A bad network interface card and/or network cable is in use.

Which of the following conclusions is most appropriate to draw to describe why du shows fewer blocks used than df?()A、 The df command only counts the number of disk blocks and superblocks. B、 The df command ignores space used for inodes, gnodes, and vnodes.C、 The du command does not take into account filesystem metadata. D、 The du command counts indirect blocks and superblocks in its calculations.

An administrator wants to use a Windows system to monitor a server that is rebooting. Which of the following commands should the administrator use to know when the NIC is back online in the server?()A、 ping i 240B、 ping -tC、 ping -aD、 ping w 240

Which of the following is the BEST approach a technician should take when informing a customerabout their findings of any specific computer problem?()A、Use non-technical terms.B、Use the appropriate acronyms.C、Use proper technical terms.D、Use email to ensure a written record.

A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING

An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()A、netstatB、tracerouteC、nbtstatD、ping

An operator just completed a repair to a disk subsystem that contains a disk heartbeat. Before returning the system back into production mode, there is a requirement to verify the disk heartbeat is functioning.  How should the operator determine if the disk heartbeat network functioning?()   A、 Use the clinfo command to monitor the disk heartbeatB、 Use the mail command to check for messages form HACMPC、 Use the dhbread command to verify the disk heartbeat linkD、 Use the clstat command to verify the appropriate network connections are available

Company.com has a three-node cluster with six resource groups. There are two resource groups  for each node. A new hardware component will be added to one of the nodes. The customer wants to move the resource groups to other nodes,but not necessarily in the normal fallover order. Also,the resource groups must be moved at night when there is no one in the computer center. What can be done so that the resource group is moved at the most convenient normal fallover order. Also,the resource groups must be moved at night when there is no one in the computer center.  What can be done so that the resource group is moved at the most convenient time for the customer?()   A、 Create a custom resource group with a custom fallback timer to cause the system shutdown at he appropriate time.B、 Set the system to stop with "shutdown" command at the appropriate time and allow HACMP to relocate the resources.C、 Use a script that calls the cIRGmove command and place it in the cron or a queue to execute at the appropriate time.D、 Change the existing resource groups to a custom type and add a timer to perform a "shutdown -h" command at the appropriate time.

When an ICMP redirect is received from a host that is not the current gateway for the route it is redirecting, which of the following options is the most appropriate to conclude?()A、The redirect will be ignoredB、The routing table will be alteredC、The ping will fail, followed by other network services.D、The host, which sent the ICMP redirect, will begin acting as the gateway

You are planning the configuration of SQL1.You need to use the most appropriate Windows account for the SQL Server service. Which account should you use?()A、a domain user accountB、a local user accountC、the NETWORK SERVICE accountD、the LOCAL SYSTEM account

单选题Which of the following exercises would a teacher most probably use if he/she wants to help students develop discourse competence?AParaphrasing sentences.BTranslating sentences.CUnscrambling sentences.DTransforming sentences.

单选题A network admin wants to know every hop the packets take when he accesses cisco.com. Which command is the most appropriate to use?()Apath cisco.comBdebug cisco.comCtrace cisco.comDtraceroute cisco.com

多选题When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()Aall interfaces in the path toward the destinationBall networks in the path toward the destinationCadjacent next hop router in the path toward the destinationDall routers in the path toward the destinationEall interfaces through which the packets can be routedFtype of service and precedence in the IP packets

单选题A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()AA large FTP job is in process. BA network interface was misconfigured. CThe ping command is being used excessively. DA bad network interface card and/or network cable is in use.

单选题You are planning the configuration of SQL1.You need to use the most appropriate Windows account for the SQL Server service. Which account should you use?()Aa domain user accountBa local user accountCthe NETWORK SERVICE accountDthe LOCAL SYSTEM account

单选题A customer wants to know what version of DirectX the current workstation has installed. Which of the following command line tools would the customer use?()AeditBsysteminfoCgpedit.mscDdxdiag

单选题An administrator wants to use a Windows system to monitor a server that is rebooting. Which of the following commands should the administrator use to know when the NIC is back online in the server?()A ping i 240B ping -tC ping -aD ping w 240