参考答案和解析
正确答案: B
解析: 暂无解析
更多“Which of the following is used to identify active hosts alon”相关问题
  • 第1题:

    Which of the following IP hosts would be valid for PC users, assuming that a /27 network mask was used for all of the networks?()

    A.15.234.118.63

    B.83.121.178.93

    C.134.178.18.56

    D.192.168.19.37

    E.201.45.116.159

    F.217.63.12.192


    参考答案:B, C, D

  • 第2题:

    An administrator needs a network that can support up to 800 hosts on the same subnet. Which of the following is the MINIMUM subnet mask that should be used?()

    • A、255.0.0.0
    • B、255.255.0.0
    • C、255.255.252.0
    • D、255.255.255.0

    正确答案:C

  • 第3题:

    Which of the following analyzes the entire subnet to identify all hosts that are active?()

    • A、Ping sweep
    • B、Packet sniffer
    • C、Traceroute
    • D、Port scanner

    正确答案:A

  • 第4题:

    A technician is called for a computer that is not connecting to the network. Which of the following would be the MOST common tool used to identify the issue? ()

    • A、Cable tester
    • B、Multimeter
    • C、Loop back plugs
    • D、Crossover cable

    正确答案:A

  • 第5题:

    Which of the following is used to produce the best LCD image on a laptop?()

    • A、Dual scan
    • B、Active matrix
    • C、Passive matrix
    • D、Active scanning

    正确答案:B

  • 第6题:

    Which of the following commands should be used to identify packet sequence problems?()

    • A、 ping and arp
    • B、 lsattr and ifconfig
    • C、 netstat and iostat
    • D、 iptrace and tcpdump

    正确答案:D

  • 第7题:

    Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。

    • A、~/ .rhosts
    • B、$HOME/.netrc
    • C、/etc/hosts.equiv
    • D、/etc/security/user

    正确答案:B

  • 第8题:

    A system administrator has a server that is performing poorly. The vmstat command identifies that high CPU usage is the problem. Which of the following commands can be used to identify the eight most active processes running on the server?()

    • A、ps -ef -t8
    • B、sar -u -p 8
    • C、vmstat -t 8
    • D、topas -p8 -n0 -d0

    正确答案:D

  • 第9题:

    单选题
    Which of the following local files is used to run the date command on the remote machine "Earth" using the following rexec command without request for a password? rexec Earth date()。
    A

    ~/ .rhosts

    B

    $HOME/.netrc

    C

    /etc/hosts.equiv

    D

    /etc/security/user


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following commands should be used to identify packet sequence problems?()
    A

     ping and arp

    B

     lsattr and ifconfig

    C

     netstat and iostat

    D

     iptrace and tcpdump


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    What is the purpose of a network mask?()
    A

    It is used to identify the maximum hop count of a subnetwork

    B

    It is used to identify an IP address as either private or public

    C

    It is used to identify the network to which an IP address belongs

    D

    It is used to identify the total number of bits present in an IP address


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following routing components is used for sending messages to other SMTP hosts?()
    A

    Routing group

    B

    Send connector

    C

    DNS

    D

    Delivery agent


    正确答案: D
    解析: 暂无解析

  • 第13题:

    What is the purpose of a network mask?()

    • A、It is used to identify the maximum hop count of a subnetwork
    • B、It is used to identify an IP address as either private or public
    • C、It is used to identify the network to which an IP address belongs
    • D、It is used to identify the total number of bits present in an IP address

    正确答案:C

  • 第14题:

    When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()

    • A、The type of application used on the network
    • B、The type of system bus used by the computers
    • C、The type of memory installed in each computer
    • D、The type of media used in the network topology
    • E、The type of protocols used in the network
    • F、The physical layout of the network hosts

    正确答案:B,D,F

  • 第15题:

    Which of the following is used to identify active hosts along with their network addresses?()

    • A、Port scan
    • B、Ping sweep
    • C、IDS
    • D、NIPS

    正确答案:B

  • 第16题:

    Which of the following tools can be used to identify the location of a network outage?()

    • A、traceroute
    • B、netstat
    • C、nslookup
    • D、ping

    正确答案:A

  • 第17题:

    When dividing an existing Class B network into 2 subnets of 32,766 hosts each, which of the following subnet masks should be used?()

    • A、128.0.0.0
    • B、255.128.0.0
    • C、255.254.0.0
    • D、255.255.128.0

    正确答案:D

  • 第18题:

    Which of the following command can be used to identify all PCI hot plug slots on a server and their characteristics()

    • A、lsattr -l pci
    • B、lscfg -vl pci
    • C、lsdev -c slot
    • D、lsslot -c pci -a

    正确答案:D

  • 第19题:

    Which of the following commands can be used to identify all PCI hot plug slots on a server and their characteristics?()

    • A、lsattr -l pci
    • B、lscfg -Cc pci
    • C、lsconn -p pci -a
    • D、lsslot -c pci -a

    正确答案:D

  • 第20题:

    What is the purpose of a network mask?()

    • A、It is used to identify the maximum hop count of a subnetwork.
    • B、It is used to identify an IP address as either private or public.
    • C、It is used to identify the network to which an IP address belongs.
    • D、It is used to identify the total number of bits present in an IP address.

    正确答案:C

  • 第21题:

    多选题
    When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()
    A

    The type of application used on the network

    B

    The type of system bus used by the computers

    C

    The type of memory installed in each computer

    D

    The type of media used in the network topology

    E

    The type of protocols used in the network

    F

    The physical layout of the network hosts


    正确答案: B,E
    解析: 暂无解析

  • 第22题:

    多选题
    Which of the following IP hosts would be valid for PC users, assuming that a /27 network mask was used for all of the networks?()
    A

    15.234.118.63

    B

    83.121.178.93

    C

    134.178.18.56

    D

    192.168.19.37

    E

    201.45.116.159

    F

    217.63.12.192


    正确答案: A,F
    解析: 暂无解析

  • 第23题:

    单选题
    What is the purpose of a network mask?()
    A

    It is used to identify the maximum hop count of a subnetwork.

    B

    It is used to identify an IP address as either private or public.

    C

    It is used to identify the network to which an IP address belongs.

    D

    It is used to identify the total number of bits present in an IP address.


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following commands should be used to list all of the active network interfaces on a system?()
    A

    lscfg

    B

    route

    C

    netstat

    D

    entstat


    正确答案: C
    解析: 暂无解析