多选题If you want to test if fragmentation is causing problems on the network, which two ping command options are useful?()AttlBsizeCrapidDdo-not-fragment

题目
多选题
If you want to test if fragmentation is causing problems on the network, which two ping command options are useful?()
A

ttl

B

size

C

rapid

D

do-not-fragment


相似考题
更多“多选题If you want to test if fragmentation is causing problems on the network, which two ping command options are useful?()AttlBsizeCrapidDdo-not-fragment”相关问题
  • 第1题:

    A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?()

    A.ARP

    B.CDP

    C.DHCP

    D.DNS

    E.ICMP


    参考答案:A, E

  • 第2题:

    Which of the following is TRUE about the ping  -f command?()

    • A、 It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the "f" in the command line. 
    • B、 It is useful for flooding from slow character based terminals since it only displays a dot "." for each packet sent in fast mode. 
    • C、 It is useful for flooding from slow character based terminals since it only displays a dot "."       for each packet sent and a backspace on returned in fast mode. 
    • D、 The command can only be run by root.

    正确答案:D

  • 第3题:

    A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? ()

    • A、ARP
    • B、CDP
    • C、DHCP
    • D、DNS
    • E、ICMP

    正确答案:A,E

  • 第4题:

    While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."At which OSI layer is this problem associated with?()

    • A、The data link layer
    • B、The application layer
    • C、The access layer
    • D、The session layer
    • E、The network layer

    正确答案:E

  • 第5题:

    Which command can be used to modify network options?()

    • A、netstat
    • B、ifconfig
    • C、chdev
    • D、no

    正确答案:D

  • 第6题:

    You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

    • A、user name
    • B、password length
    • C、certificate
    • D、Host Checker

    正确答案:C,D

  • 第7题:

    You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure Tom’s computer to run the Magnifier each time he logs on to his computer. Which two interfaces can you use?()

    • A、Utility Manager
    • B、Accessibility Wizard
    • C、Accessibility Options icon in Control Panel
    • D、Users and Passwords icon in Control Panel

    正确答案:A,B

  • 第8题:

    多选题
    A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test?()
    A

    ARP

    B

    CDP

    C

    DHCP

    D

    DNS

    E

    ICMP


    正确答案: B,E
    解析: 暂无解析

  • 第9题:

    多选题
    Which two of the following options are categories of Network Maintenance tasks?()
    A

    Firefighting

    B

    Interrupt-driven

    C

    Policy-based

    D

    Structured

    E

    Foundational


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two content-filtering features does FTP support?() (Choose two.)
    A

    block extension list

    B

    block MIME type

    C

    protocol command list

    D

    notifications-options


    正确答案: C,A
    解析: 暂无解析

  • 第11题:

    多选题
    You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()
    A

    user name

    B

    password length

    C

    certificate

    D

    Host Checker


    正确答案: A,B
    解析: 暂无解析

  • 第12题:

    多选题
    If you want to test if fragmentation is causing problems on the network, which two ping command options are useful?()
    A

    ttl

    B

    size

    C

    rapid

    D

    do-not-fragment


    正确答案: B,A
    解析: 暂无解析

  • 第13题:

    A system administrator is trying to troubleshoot company wide email problems that may be related to DNS.  Which of the following network tools would be MOST useful to determine if it is a DNS issue?()

    • A、netstat
    • B、tracert
    • C、nslookup
    • D、ping

    正确答案:C

  • 第14题:

    A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()

    • A、A large FTP job is in process. 
    • B、A network interface was misconfigured. 
    • C、The ping command is being used excessively. 
    • D、A bad network interface card and/or network cable is in use. 

    正确答案:C

  • 第15题:

    You have two NTP servers 10.1.1.1 & 10.1.1.2 and want to configure a router to use 10.1.1.2 as its NTP server before falling back to 10.1.1.1. Which command will you use?


    正确答案: Ntp server 10.1.1.1
    Ntp server 10.1.1.2 prefer
    (notice the answer with the word “prefer”)

  • 第16题:

    An administrator is configuring an LPAR for a NIM installation and is unsure if the 'Ping Test' option within SMS is a required configuration step. Which statement best describes the 'Ping Test' option?()

    • A、The 'Ping Test' is a recommended step to verify the IP information entered into the RIPL SMS panel.
    • B、The 'Ping Test' is a mandatory step required to commit the IP information entered into the RIPL SMS panel.
    • C、The 'Ping Test' is an optional step to verify network configuration entered into the RIPL SMS panel on older copper-based networks.
    • D、The 'Ping Test' is an optional step to verify network connectivity between client and server, where ICMP traffic is allowed on the connecting network.

    正确答案:D

  • 第17题:

    Where do you configure SCREEN options?()

    • A、zones on which an attack might arrive
    • B、zones you want to protect from attack
    • C、interfaces on which an attack might arrive
    • D、interfaces you want to protect from attack

    正确答案:A

  • 第18题:

    If you want to test if fragmentation is causing problems on the network, which two ping command options are useful?()

    • A、ttl
    • B、size
    • C、rapid
    • D、do-not-fragment

    正确答案:B,D

  • 第19题:

    多选题
    You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure Tom’s computer to run the Magnifier each time he logs on to his computer. Which two interfaces can you use?()
    A

    Utility Manager

    B

    Accessibility Wizard

    C

    Accessibility Options icon in Control Panel

    D

    Users and Passwords icon in Control Panel


    正确答案: A,D
    解析: 暂无解析

  • 第20题:

    问答题
    You have two NTP servers 10.1.1.1 & 10.1.1.2 and want to configure a router to use 10.1.1.2 as its NTP server before falling back to 10.1.1.1. Which command will you use?

    正确答案: Ntp server 10.1.1.1
    Ntp server 10.1.1.2 prefer
    (notice the answer with the word “prefer”)
    解析: 暂无解析

  • 第21题:

    单选题
    A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()
    A

    A large FTP job is in process. 

    B

    A network interface was misconfigured. 

    C

    The ping command is being used excessively. 

    D

    A bad network interface card and/or network cable is in use. 


    正确答案: B
    解析: 暂无解析

  • 第22题:

    多选题
    You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure user Group Policy to achieve these results:    Allow users to view the options in the Offline Files dialog box   Remove the Offline Files tab from the Folder Options dialog box   Disable the Settings button in the Offline Files Status dialog box   Remove the Settings command from the Offline Files shortcut menu    Your proposed solution is to enable the group policy setting Disable user configuration of Offline Files.    Which results does the proposed solution provide?()
    A

    Users can view the options in the Offline Files dialog box

    B

    The Offline Files tab is removed from the Folder Options dialog box

    C

    The Settings button in the Offline Files Status dialog box is disabled

    D

    The Settings command is removed from the Offline Files shortcut menu


    正确答案: A,C
    解析: 暂无解析

  • 第23题:

    单选题
    Which command can be used to modify network options?()
    A

    netstat

    B

    ifconfig

    C

    chdev

    D

    no


    正确答案: A
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following is TRUE about the ping  -f command?()
    A

     It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the f in the command line. 

    B

     It is useful for flooding from slow character based terminals since it only displays a dot . for each packet sent in fast mode. 

    C

     It is useful for flooding from slow character based terminals since it only displays a dot .       for each packet sent and a backspace on returned in fast mode. 

    D

     The command can only be run by root.


    正确答案: A
    解析: 暂无解析