多选题Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true (Choose two.)()。ARouter C will use ICMP to inform Host 1 that Host 2 cannot be reachedBRouter C will use ICMP to inform Router B that Host 2 cannot be reachedCRouter C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reachedDRouter C will send a Destination Unreachable message typeERouter C will send a Router Selection message typeFRouter C will send a Source Quench message type
多选题
Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true (Choose two.)()。
A
Router C will use ICMP to inform Host 1 that Host 2 cannot be reached
B
Router C will use ICMP to inform Router B that Host 2 cannot be reached
C
Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached
D
Router C will send a Destination Unreachable message type
E
Router C will send a Router Selection message type
F
Router C will send a Source Quench message type
参考解析
解析:
暂无解析
相关考题:
There are 2 switches in the Ezonexam LAN, with no routers. Ports 1, 2 3 are assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link. Which of the conditions below would verify trunk and VLAN operation? (Select all valid answers)A.Host 1 on VLAN 1 can ping Host 2 on VLAN 1B.Host 1 on VLAN 1 can ping Host 4 on VLAN 2C.Host 1 on VLAN 1 can not ping Host 2 on VLAN 1D.Host 4 on VLAN 2 can not ping Host 1 on VLAN 1E.Host 4 on VLAN 2 can ping Host 2 on VLAN 2
Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections.How many sessions exist between Host A and Host B?()A.1B.2C.3D.4
A client host uses IPv4 to communicate with one ser ver and IPv6 to communicate with another.Which of the following IPv6 coexistence features is likely at work on the host?() A. Native IPv6B. Point - to -point tunnelsC. Multipoint tunnelsD. NAT - PTE. Dual stacks
There are 2 switches in the Testking LAN, with no routers. Ports 1, 2 3 are assigned to VLAN 1 in switch 1 and 2 and ports 4, 5 6 are assigned to VLAN 2 in both switches. These two switches are connected together via a trunked link.Which of the conditions below would verify trunk and VLAN operation?()A. Host 1 on VLAN 1 can ping Host 2 on VLAN 1B. Host 1 on VLAN 1 can ping Host 4 on VLAN 2C. Host 1 on VLAN 1 can not ping Host 2 on VLAN 1D. Host 4 on VLAN 2 can not ping Host 1 on VLAN 1E. Host 4 on VLAN 2 can ping Host 2 on VLAN 2
You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10
When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to "talk" to?() A. RARP requestB. Show Network Address requestC. Proxy ARP requestD. ARP requestE. Show Hardware Address request
Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?() A.the MAC address of the seiver network interfaceB.the MAC address of host AC.the MAC address of router interface e 1D.the MAC address of router interface e0
The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()A.from host PC1 to host 5.1.1.10B.from host PC1 to host 5.1.3.10C.from host PC2 to host 5.1.2.10D.from host PC2 to host 5.1.3.8
Host1正在试图和Host2联系。RouterC的e0接口是down的,以下选项正确的是?() A.RouterC会使用ICMP通知Host1ldquo;Host2无法到达rdquo;B.RouterC会使用ICMP通知Host1ldquo;Host1无法到达rdquo;C.RouterC会使用ICMP通知Host1,RouterA和RouterBldquo;Host2无法到达rdquo;D.RouterC会发送一个ldquo;DestinationUnreachablerdquo;的消息类型E.RouterC会发送一个ldquo;RouterSelectionrdquo;的消息类型F.RouterC会发送一个ldquo;SourceQuenchrdquo;的消息类型
Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。A、Host 1 addresses the frames to the MAC address of router R1B、Host 1 looks in its ARP cache for the MAC address of router R1C、Host 1 addresses the frames to the MAC address of web server 2D、Host 1 sends the packets to router R1 to be forwarded to web server 2E、Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2
When one connection to a host fails in a full mesh network, which of the following is true?()A、All hosts can communicate.B、No hosts can communicate.C、Half of the hosts will lose communication.D、Only the two hosts between the failed connection will lose communication.
You are designing a Windows Azure application. The application includes processes that communicate by using Windows Communications Foundation (WCF) services. The WCF services must support streaming. You need to recommend a host for the processes and a WCF binding. Which two actions should you recommend?()A、 Host the processes in web roles.B、 Host the processes in worker roles.C、 Use NetTcpBinding for the WCF services.D、 Use WSHttpBinding for the WCF services.
Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true?()A、Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.B、Router C will use ICMP to inform Router B that Host 2 cannot be reached.C、Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.D、Router C will send a Destination Unreachable message type.E、Router C will send a Router Selection message type.F、Router C will send a Source Quench message type.
The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN: access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 any access-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 any What effect will this access list have?()A、All traffic will be allowed to exit E0 except FTP traffic.B、FTP traffic from 192.168.1.22 to any host will be denied.C、FTP traffic from 192.168.1.9 to any host will be denied.D、All traffic exiting E0 will be denied.E、All FTP traffic to network 192.168.1.8/29 from any host will be denied.
A client host uses IPv4 to communicate with one ser ver and IPv6 to communicate with another.Which of the following IPv6 coexistence features is likely at work on the host?()A、Native IPv6B、Point - to -point tunnelsC、Multipoint tunnelsD、NAT - PTE、Dual stacks
When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()A、RARP requestB、Show Network Address requestC、Proxy ARP requestD、ARP requestE、Show Hardware Address request
Which destination addresses will be used by Host A to send data to Host C?()A、the IP address of Switch 1B、the MAC address of Switch 1C、the IP address of Host CD、the MAC address of Host CE、the IP address of the router's E0 interfaceF、the MAC address of the router's E0 interface
You are configuring a new Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 environment to manage your existing virtual infrastructure. The existing infrastructure includes Windows Server 2008 R2 host servers and VMware ESX host servers. You need to add a VMware ESX host server named Host1 to your VMM environment. What should you do?()A、In the Computer name field of the Add VMware VirtualCenter server dialog box, type the fully qualified domain name (FQDN) of Host1.B、In the Computer name field of the Add VMware VirtualCenter server dialog box, type the fully qualified domain name (FQDN) of the VMware VirtualCenter server that manages Host1.C、In the Add Hosts wizard, select the VMware ESX Server host (any location) option. In the Computer name field, type the fully qualified domain name (FQDN) of Host1.D、In the Add Hosts wizard, select the VMware ESX Server host (any location) option. In the Computer name field, type the fully qualified domain name (FQDN) of the VMware VirtualCenter server that manages Host1.
单选题Companycom is trying to communicate with the service processor of the a new p5 590. However, the customer can not access the service processor. What needs to be done to fix this problem?()AEnable DHCP server on the HMCBConfigure host name and IP address on DNS serverCManually set the IP address of the service processorDConnect a RS-232 cable from the HMC to the service processor
单选题A client host uses IPv4 to communicate with one ser ver and IPv6 to communicate with another.Which of the following IPv6 coexistence features is likely at work on the host?()ANative IPv6BPoint - to -point tunnelsCMultipoint tunnelsDNAT - PTEDual stacks
单选题When one connection to a host fails in a full mesh network, which of the following is true?()AAll hosts can communicate.BNo hosts can communicate.CHalf of the hosts will lose communication.DOnly the two hosts between the failed connection will lose communication.
单选题When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()ARARP requestBShow Network Address requestCProxy ARP requestDARP requestEShow Hardware Address request
多选题Which destination addresses will be used by Host A to send data to Host C?()Athe IP address of Switch 1Bthe MAC address of Switch 1Cthe IP address of Host CDthe MAC address of Host CEthe IP address of the router's E0 interfaceFthe MAC address of the router's E0 interface
单选题You are the network administrator at TestKing. You apply the following access list on the E0 outbound interface connected to the 192.168.1.8/29 LAN: access-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 20 any access-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 21 any What will the effect of this access list be?()AAll traffic will be allowed to out of E0 except FTP traffic.BFTP traffic from 192.168.1.22 to any host will be blocked.CFTP traffic from 192.168.1.9 to any host will be blocked.DAll traffic will be prevented from leaving E0.EAll FTP traffic to network 192.168.1.9/29 from any host will be blocked.
单选题Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many sessions exist between Host A and Host B?()A1B2C3D4
单选题You are configuring a new Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 environment to manage your existing virtual infrastructure. The existing infrastructure includes Windows Server 2008 R2 host servers and VMware ESX host servers. You need to add a VMware ESX host server named Host1 to your VMM environment. What should you do?()AIn the Computer name field of the Add VMware VirtualCenter server dialog box, type the fully qualified domain name (FQDN) of Host1.BIn the Computer name field of the Add VMware VirtualCenter server dialog box, type the fully qualified domain name (FQDN) of the VMware VirtualCenter server that manages Host1.CIn the Add Hosts wizard, select the VMware ESX Server host (any location) option. In the Computer name field, type the fully qualified domain name (FQDN) of Host1.DIn the Add Hosts wizard, select the VMware ESX Server host (any location) option. In the Computer name field, type the fully qualified domain name (FQDN) of the VMware VirtualCenter server that manages Host1.