单选题Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A The FTP server sends back an acknowledgment (ACK) to the clientB The FTP server allocates a port touse for the data channel and transmit that port number to the clientC The FTP server opens the data channel to the client using the port number indicated by the clientD The FTP client opens the data channel to the FTP server on Port 20E The FTP client opens the datachannel to the FTP server on Port 21
单选题
Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()
A
The FTP server sends back an acknowledgment (ACK) to the client
B
The FTP server allocates a port touse for the data channel and transmit that port number to the client
C
The FTP server opens the data channel to the client using the port number indicated by the client
D
The FTP client opens the data channel to the FTP server on Port 20
E
The FTP client opens the datachannel to the FTP server on Port 21
参考解析
解析:
暂无解析
相关考题:
在使用FTP工具向OMC服务器(Linux操作系统)中上传文件时,应选用『____』传送模式。(Using the FTP tool upload file to the OMC server (Linux operating system),the transfer mode should be used in『____』.)
What are two characteristics of a switch that is configured as a VTP client?() A.if a switch that is configured to operate in client mode cannot access a VTP server,then the switch reverts to transparent mode.B.The local vlan configuration is updated only when an update that has a higher configuration revision number is received.C.Vtp advertisements are not forwarded to neighboring switches that are configured in vtp transparent mode.D.When switches in vtp client mode are rebooted,they send a vtp advertisement request to the vtp servers.E.Vtp client is the default vtp modeF.On switches that are configured to operate in client mode ,vlans can be created,deleted,or renamed locally
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a (请作答此空) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were ( ) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.browser-serverB.user- serverC.client-serverD.business -customer
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were (请作答此空) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.command-lineB.graphicalC.automationD.productivity
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were ( ) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in (请作答此空) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.systemB.activeC.passiveD.active or passive
Which statement about the S-Series native FTP proxy is not true?() A、 both active and passive modes FTP are supportedB、 by default the FTP proxy uses port 8021C、 access polices may apply to native FTP trafficD、 data loss prevention policies may apply to native FTP trafficE、 authentication is supported in transparent mode
Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A、 The FTP server sends back an acknowledgment (ACK) to the clientB、 The FTP server allocates a port touse for the data channel and transmit that port number to the clientC、 The FTP server opens the data channel to the client using the port number indicated by the clientD、 The FTP client opens the data channel to the FTP server on Port 20E、 The FTP client opens the datachannel to the FTP server on Port 21
When NIC teaming is used, how are Loops avoided in a virtual switch?()A、By using active / passive teaming with spanning tree on the active IinkB、By using active / passive teaming with onIy the active Iink in useC、By using active / activate teaming with VM utilizing both uplink ports
Switch R1 has been configured with DTP using the desirable option. Which statement describes Dynamic Trunking Protocol (DTP) desirable mode?()A、 The interface actively attempts to convert the link to a trunk link.B、 The interface is put into permanent trunking mode but prevented from generating DTP frames. C、 The interface is put into permanent trunking mode and negotiates to convert the link into a trunk link.D、 The interface is put into a passive mode, waiting to convert the link to a trunk link. E、 None of the other alternatives apply
Which statement correctly describes a wireless client Layer 2 roam from AP1 to AP2 while joined to a multicast stream using Cisco WLC running v5.2?()A、Client issues an IGMP join after association with AP2, allowing AP2 to request a multicast stream from Cisco WLC after AP1 issues an IGMP query.B、Client issues an IGMP join after association with AP2, allowing AP2 to request a multicast stream from Cisco WLC independent of AP1 multicast member status.C、Client resumes multicast after association with AP2, because multicast information is sent in mobility exchanges and AP2 is already a member of the multicast group, provided that another client has already joined that multicast.D、Client resumes multicast after association with AP2, because multicast information is sent in mobility exchanges and AP2 is already a member of the multicast group, regardless if any other clients have already joined that multicast.
How is NIC teaming configured when port channels are not in use in a Cisco Nexus 1000V?()A、active / active using spanning treeB、active / activeC、active / passive using spanning treeD、active / passive
When using IP SLA FTP operation, which two FTP modes are supported? ()A、Only the FTP PUT operation type is supported.B、Active mode is supported.C、Passive FTP transfer modes are supported.D、FTP URL specified for the FTP GET operation is not supported.
As a candidate for CCNA examination, when you are familiar with the basic commands, if you input thecommand "enable secret level 5 password" in the global mode , what does it indicate?()A、Set the enable secret command to privilege level 5B、The enable secret password is hashed using MD5C、The enable secret password is for accessing exec privilege level 5D、The enable secret password is hashed using SHAE、The enable secret password is encrypted using Cisco proprietary level 5 encryption
Which statement about active and passive surveys is incorrect?()A、Active mode does not require the client to be specifically confguredB、Passive mode can survey more than one access point at a timeC、Active mode yields signal-quality information such as packet retries and lost packetsD、Active mode requires more time to survey but yields more information results than passive mode does
After using the alt_disk_install command to clone a system image to another disk, the system administrator noticed a large number of defined devices not allocated to the LPAR. Which of the following is the most likely cause of this situation?()A、The cfgmgr command was not run to reconfigure the devicesB、The machine was not booted into SMS MultiBoot mode after configurationC、The machine was not in full system partition mode when the volume was createdD、The alt_disk_install command was not run with the -O option to remove references in the ODM
After an HACMP migration, which included a large number of shared disks,cluster testing is performed. During testing, it becomes apparent that Fast Disk Takeover is not working properly. Which of the following is the most likely cause of the problem?() A、 The shared volume groups have not been converted to Big VGs.B、 The ’t factor" needs to be set on the volume group using chvg -t 2 vgname.C、 The shared volume groups have not been converted to enhanced concurrent mode.D、 The shared volume groups need to be varied on using the passive varyon option on all nodes.
单选题Switch R1 has been configured with DTP using the desirable option. Which statement describes Dynamic Trunking Protocol (DTP) desirable mode?()A The interface actively attempts to convert the link to a trunk link.B The interface is put into permanent trunking mode but prevented from generating DTP frames. C The interface is put into permanent trunking mode and negotiates to convert the link into a trunk link.D The interface is put into a passive mode, waiting to convert the link to a trunk link. E None of the other alternatives apply
单选题As a candidate for CCNA examination, when you are familiar with the basic commands, if you input thecommand "enable secret level 5 password" in the global mode , what does it indicate?()ASet the enable secret command to privilege level 5BThe enable secret password is hashed using MD5CThe enable secret password is for accessing exec privilege level 5DThe enable secret password is hashed using SHAEThe enable secret password is encrypted using Cisco proprietary level 5 encryption
多选题In your database, all the tablespaces are locally managed. You started Recovery Manager (RMAN) using recovery catalog and restored the control file by using the following command: RMAN RESTORE CONTROLFILE; Which two operations do you need to perform after restoring the control file from backup?()Ashut down and restart the instanceBadd new tempfiles to the temporary tablespaces after recoveryCperform a media recovery and open the database with the RESETLOGS optionDperform a media recovery and bring the database to NOARCHIVELOG mode
多选题When using IP SLA FTP operation,which two FTP modes are supported?()AOnly the FTP PUT operation type is supported.BActive mode is supported.CPassive FTP transfer modes are supported.DFTP URL specified for the FTP GET operation is not supported.
单选题When NIC teaming is used ,how are loops avoided in a virtual switch?()ABy using active / passive teaming with spanning tree on the active linkBBy using active / passive teaming with only the active link in useCBy using active / active teaming with VM utilizing both uplink ports
多选题What are two characteristics of a switch that is configured as a VTP client?()Aif a switch that is configured to operate in client mode cannot access a VTP server,then the switch reverts to transparent mode.BThe local vlan configuration is updated only when an update that has a higher configuration revision number is received.CVtp advertisements are not forwarded to neighboring switches that are configured in vtp transparent mode.DWhen switches in vtp client mode are rebooted,they send a vtp advertisement request to the vtp servers.EVtp client is the default vtp modeFOn switches that are configured to operate in client mode ,vlans can be created,deleted,or renamed locally
单选题After using the alt_disk_install command to clone a system image to another disk, the system administrator noticed a large number of defined devices not allocated to the LPAR. Which of the following is the most likely cause of this situation?()AThe cfgmgr command was not run to reconfigure the devicesBThe machine was not booted into SMS MultiBoot mode after configurationCThe machine was not in full system partition mode when the volume was createdDThe alt_disk_install command was not run with the -O option to remove references in the ODM
单选题After an HACMP migration, which included a large number of shared disks,cluster testing is performed. During testing, it becomes apparent that Fast Disk Takeover is not working properly. Which of the following is the most likely cause of the problem?()A The shared volume groups have not been converted to Big VGs.B The ’t factor needs to be set on the volume group using chvg -t 2 vgname.C The shared volume groups have not been converted to enhanced concurrent mode.D The shared volume groups need to be varied on using the passive varyon option on all nodes.
单选题Which statement about the S-Series native FTP proxy is not true?()A both active and passive modes FTP are supportedB by default the FTP proxy uses port 8021C access polices may apply to native FTP trafficD data loss prevention policies may apply to native FTP trafficE authentication is supported in transparent mode
单选题Which statement about active and passive surveys is incorrect?()AActive mode does not require the client to be specifically confguredBPassive mode can survey more than one access point at a timeCActive mode yields signal-quality information such as packet retries and lost packetsDActive mode requires more time to survey but yields more information results than passive mode does