多选题A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()Apacket segmentationBserialized checkingCpacket sequencingDparallel checking
多选题
A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()
A
packet segmentation
B
serialized checking
C
packet sequencing
D
parallel checking
参考解析
解析:
暂无解析
相关考题:
To control the execution of a server process when it is receiving bad packets from a potentially malicious client, you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows:SQL ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10;What is the significance of this setting?()A. It terminates the client connection after 10 bad packets and the client cannot reconnect to the same instance.B. It terminates the client connection after 10 bad packets but the client can still reconnect, and attempt the same operation again.C. It terminates the client connection 10 seconds after receiving a bad packet and the client cannot reconnect to the same instance.D. It terminates the client connection after receiving a bad packet and the client can reconnect to the same instance after 10 minutes.
A user opens a webpage that requires the transmission of packets from the Web server to the client‘s browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path.Which two protocol functions allow this type of communication?()A. packet segmentationB. serialized checkingC. packet sequencingD. parallel checking
Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。 A.Host 1 addresses the frames to the MAC address of router R1B.Host 1 looks in its ARP cache for the MAC address of router R1C.Host 1 addresses the frames to the MAC address of web server 2D.Host 1 sends the packets to router R1 to be forwarded to web server 2E.Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a (请作答此空) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were ( ) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.browser-serverB.user- serverC.client-serverD.business -customer
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were (请作答此空) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.command-lineB.graphicalC.automationD.productivity
The Hypertext Transfer Protocol , the Web's ( ) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by (请作答此空) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.exchangingB.changingC.decliningD.removing
The Hypertext Transfer Protocol , the Web's (请作答此空) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by ( ) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.transport-layerB.application-layerC.network-layerD.link-layer
The Dynamic Host Configuration Protocol provides configuration parameters to Internet( ).DHCP consists of two components:a( )for delivering host-specifie configuration parameters from a DHCP server to a host and a mechanism for allocation of network addresses to hosts.DHCP is built on a client-server model,where designated DHCP server hosts allocate network addresses and deliver(本题)parameters to dynamically configured hosts.DHCP supports three mechanisms for IP address allocation.In“automatic allocation”,DHCP assigns a( )IP address to client.In“dynamic allocation”,DHCP assigns an IP address to a client for a limited period of time.In“manual allocation”,a client’s IP address is assigned by the network( ),and DHCP is used simply to convey the assigned address to the client.A.controlB.broadcastC.configurationD.transmission
The Hypertext Transfer Protocol,the Web's(请作答此空)protocol,is at the heart of the Web.HTTP is implemented in two programs:a( )program and a server program.The client program and server program executing on different end systems,talk to each other by( )HTTP messages.HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients.when a user( )a web page,the browser sends http request messages for the objects in the page to the server.The server( )the requests and responds with http response messages that contain the objects.A.transport-layerB.application-layerC.network-layerD.link-layer
What are two things that an access point (AP) does when it receives an 802.11 frame from a Wi-Fi Multimedia (WMM) client? ()A、EAP-FASTEAP-FAS Access Point Protocol (LWAPP) packet is used to generate an 802.1 p priority value in the packets, which are sent to an Ethernet switch by the controllers.B、The AP will police the 802.1 le priority value to ensure it does not exceed the maximum value allowed for the QoS policy that is assigned to that client.C、Once the LWAPP packet is received, the AP generates the IEEE 802.1 p priority value.D、The AP will map the 802.11e priority value to the DSCP value.E、The AP will map the DSCP value to the outer LWAPP frame.
A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()A、packet segmentationB、serialized checkingC、packet sequencingD、parallel checking
You configure Outlook Web App (OWA) to require SSL.A user named User1 reports that when she connects to OWA, she receives a Web site security certificate warning message.You need to prevent User1 from receiving the warning message when she connects to OWA. What should you do?()A、On User1’s computer, install the erver’s root certificate into the Trusted Root CertificatioAuthorities store.B、On the Client Access server, install the server’s root certificate into the Trusted RooCertification Authorities store.C、From the Exchange Management Console (EMC), assign an Outlook Web App mailbox policy to User1.D、From the Exchange Management Console (EMC), open owa (Default Web Site) Properties. Configure the logon format to use the user principal name (UPN).
A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()A、Packet snifferB、MultimeterC、Load balancerD、Throughput tester
A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A、User ID/password fileB、Communications layerC、Client applicationsD、Operating system
In a shared server configuration, which two describe the actions that the listener can take to service a client request?()A、The listener hands the connection request directly to a dispatcher. B、A dedicated server inherits the connection request from the listener. C、The client connects to a dedicated server directly using a protocol address provided by the listener. D、The application initiating the session spawns a dedicated server process for the connection request. E、The listener issues a redirect message to the client, containing the protocol address of a dispatcher. The client then terminates the network session to the listener and establishes a network session to the dispatcher, using the network address provided in the redirect message.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2 and has the Remote Access server role installed. A user named User1 must connect to the network remotely. The client computer of User1 requires Challenge Handshake Authentication Protocol (CHAP) for remote connections. CHAP is enabled on Server1. You need to ensure that User1 can connect to Server1 and authenticate to the domain. What should you do from Active Directory Users and Computers?()A、From the properties of Server1, select Trust this computer for delegation to any service (Kerberos only).B、From the properties of Server1, assign the Allowed to Authenticate permission to User1.C、From the properties of User1, select Use Kerberos DES encryption types for this account.D、From the properties of User1, select Store password using reversible encryption
You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company. You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers. You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails. What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.
Your network contains two Web servers named Web1 and Web2. Web1 hosts the companys corporate Web site. Web2 is a test server that contains a copy of the Web site.Users connect to Web1 by using the URL http://www.contoso.com.A Web developer named User1 plans to test updates to the Web site on Web2.You need to ensure that User1 connects to Web2 by using the URL http://www.contoso.com. The solution must ensure that all other computers connect to Web1.What should you do?()A、From User1s computer, create a record in the Hosts file.B、From User1s computer, create a record in the Lmhosts file.C、From a DNS server, create a new Host (A) resource record.D、From a DNS server, create a new Alias (CNAME) resource record.
You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed. The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts. You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site. Which Web site feature should you configure?()A、AuthenticationB、Authorization RulesC、IIS Manager PermissionsD、SSL Settings
In a two-tier configuration, it is recommended to put which of the following components on different nodes?()A、Database client and database serverB、WebSphere Application Server and Database ServerC、WebSphere Commerce Server and WebSphere Application ServerD、Web server and WebSphere Application Server
多选题Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。AHost 1 addresses the frames to the MAC address of router R1BHost 1 looks in its ARP cache for the MAC address of router R1CHost 1 addresses the frames to the MAC address of web server 2DHost 1 sends the packets to router R1 to be forwarded to web server 2EHost 1 sends a broadcast ARP request to obtain the MAC address of webserver2
单选题To control the execution of a server process when it is receiving bad packets from a potentially malicious client, you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows: SQL ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10; What is the significance of this setting?()AIt terminates the client connection after 10 bad packets and the client cannot reconnect to the same instance.BIt terminates the client connection after 10 bad packets but the client can still reconnect, and attempt the same operation again.CIt terminates the client connection 10 seconds after receiving a bad packet and the client cannot reconnect to the same instance.DIt terminates the client connection after receiving a bad packet and the client can reconnect to the same instance after 10 minutes.
单选题Which control allows you to bind to data items that are returned from a data source and display them?()AListView Web Server ControlBDetailsView Web Server ControlCDataList Web Server ControlDData Web Server Control
多选题You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.The network contains a Web server named Server1 that runs IIS 6.0 and hosts a secure Web site. The Web site is accessible from the intranet, as well as from the Internet. All users must authenticate when they connect to Server1. All users on the Internet must use a secure protocol to connect to the Web site. Users on the intranet do not need to use a secure protocol.You need verify that all users are using a secure protocol to connect to Server1 from the Internet. What are two possible ways to achieve this goal?()AMonitor the events in the application log on Server1.BMonitor the events in the security log on Server1.CMonitor the Web server connections on Server1 by using a performance log.DMonitor network traffic to Server1 by using Network Monitor.EMonitor the IIS logs on Server1.
多选题What are two things that an access point (AP) does when it receives an 802.11 frame from a Wi-Fi Multimedia (WMM) client? ()AEAP-FASTEAP-FAS Access Point Protocol (LWAPP) packet is used to generate an 802.1 p priority value in the packets, which are sent to an Ethernet switch by the controllers.BThe AP will police the 802.1 le priority value to ensure it does not exceed the maximum value allowed for the QoS policy that is assigned to that client.COnce the LWAPP packet is received, the AP generates the IEEE 802.1 p priority value.DThe AP will map the 802.11e priority value to the DSCP value.EThe AP will map the DSCP value to the outer LWAPP frame.
多选题In a shared server configuration, which two describe the actions that the listener can take to service a client request?()AThe listener hands the connection request directly to a dispatcher.BA dedicated server inherits the connection request from the listener.CThe client connects to a dedicated server directly using a protocol address provided by the listener.DThe application initiating the session spawns a dedicated server process for the connection request.EThe listener issues a redirect message to the client, containing the protocol address of a dispatcher. The client then terminates the network session to the listener and establishes a network session to the dispatcher, using the network address provided in the redirect message.
多选题Which two capabilities are granted with the SUPER privilege?()AAllowing a client to kill other client connectionsBAllowing a client to shut down the serverCAllowing change of the server runtime configurationDAllowing client accounts to take over the account of another user