单选题Which of the following functions does the "ifconfig en4 down" perform?()A Removes the en4 interfaceB Removes the en4’s network routeC Stops all traffic through the en4 interfaceD Stops all traffic through the en4 and removes its network route from the 

题目
单选题
Which of the following functions does the "ifconfig en4 down" perform?()
A

Removes the en4 interface

B

Removes the en4’s network route

C

Stops all traffic through the en4 interface

D

Stops all traffic through the en4 and removes its network route from the routing table


相似考题
更多“单选题Which of the following functions does the "ifconfig en4 down" perform?()A Removes the en4 interfaceB Removes the en4’s network routeC Stops all traffic through the en4 interfaceD Stops all traffic through the en4 and removes its network route from the ”相关问题
  • 第1题:

    Based on the following items, which two types of interfaces are found on all network-based IPS sensors?()

    • A、Loopback interface
    • B、Command and control interface
    • C、Monitoring interface
    • D、Management interface

    正确答案:B,C

  • 第2题:

    Which of the following functions does the "ifconfig en0" perform?()

    • A、Shuts down en0
    • B、Displays en0 settings
    • C、Reconfigures en0 using the ODM
    • D、Sends an SNMP alert to the network administrator

    正确答案:B

  • 第3题:

    What are three objectives that the no ip inspect command achieves?()

    • A、removes the entire CBAC configuration
    • B、removes all associated static ACLs
    • C、turns off the automatic audit feature in SDM
    • D、denies HTTP and Java applets to the inside interface but permits this traffic to the DMZ
    • E、resets all global timeouts and thresholds to the defaults
    • F、deletes all existing sessions

    正确答案:A,E,F

  • 第4题:

    What is the difference between thE.remove and thE.purge action with the dpkg command?()

    • A、 -remove removes the program, -purge also removes the config files
    • B、 -remove only removes the program, -purge only removes the config files
    • C、 -remove removes a package, -purge also removes all packages dependent on it
    • D、 -remove removes only the package file itself, -purge removes all files related to the package

    正确答案:A

  • 第5题:

    How does the ERX Edge Router interact with subscriber IP addresses assigned by an external DHCP server?()

    • A、It monitors messages from the external server and updates the routing table as needed.
    • B、It maintains the leases for the DHCP server and reassigns addresses to new subscribers.
    • C、It sends keep alives to the subscriber and makes the address available when the subscriber stops responding.
    • D、It sends keep alives to the subscriber and removes the host route when the subscriber stops responding.

    正确答案:A

  • 第6题:

    You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet.Which of the following describes the results of running this cmdlet?()

    • A、It removes one or more network adapters from a specified NIC team.
    • B、It removes a team interface from a NIC team.
    • C、It removes a specified NIC team from the host.
    • D、It removes a network adapter member from a switch team.

    正确答案:C

  • 第7题:

    多选题
    You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()
    A

    It resembles a Layer 2 bridge.

    B

    Traffic flow through the IPS resembles traffic flow through a Layer 3 router.

    C

    Inline interfaces which have no IP addresses cannot be detected.

    D

    Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.


    正确答案: C,A
    解析: 暂无解析

  • 第8题:

    单选题
    A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()
    A

    NIC filtering is enabled.

    B

    Port security is configured.

    C

    NIC is not in promiscuous mode.

    D

    NIC is in promiscuous mode.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.You are running a training exercise for junior administrators. You are currently discussing what happens when you run the Remove-NetLbfoTeam Windows PowerShell cmdlet.Which of the following describes the results of running this cmdlet?()
    A

    It removes one or more network adapters from a specified NIC team.

    B

    It removes a team interface from a NIC team.

    C

    It removes a specified NIC team from the host.

    D

    It removes a network adapter member from a switch team.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    What does a router do if it has no EIGRP feasible successor route to a destination network and the successor route to that destination network is inactive status?()
    A

    It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.

    B

    It sends a copy of its neighbor table to all adjacent routers.

    C

    It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.

    D

    It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following functions does the "ifconfig en4 down" perform?()
    A

    Removes the en4 interface

    B

    Removes the en4’s network route

    C

    Stops all traffic through the en4 interface

    D

    Stops all traffic through the en4 and removes its network route from the routing table


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()
    A

     Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.

    B

     Allow all inbound VPN traffic to pass through the perimeter firewall only.

    C

     Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.

    D

     Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which of the following BEST describes a hub?()

    • A、Determines the best route to transmit data
    • B、Inspects traffic and accepts or declines transmission
    • C、Broadcasts data to specific network devices
    • D、Broadcasts data to all network devices

    正确答案:D

  • 第14题:

    How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()

    • A、It sends the traffic through one egress port toward its destination
    • B、It sends the traffic through multiple egress ports to all available receivers
    • C、It sends the traffic through an internal link to the RE
    • D、It sends the traffic to the local system for further processing

    正确答案:A

  • 第15题:

    A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()

    • A、NIC filtering is enabled.
    • B、Port security is configured.
    • C、NIC is not in promiscuous mode.
    • D、NIC is in promiscuous mode.

    正确答案:C

  • 第16题:

    Which of the following functions does the "ifconfig en4 down" perform?()

    • A、Removes the en4 interface
    • B、Removes the en4’s network route
    • C、Stops all traffic through the en4 interface
    • D、Stops all traffic through the en4 and removes its network route from the routing table

    正确答案:C

  • 第17题:

    What does the TRUNCATE statement do?()

    • A、Removes the table
    • B、Removes all rows from a table
    • C、Shortens the table to 10 rows
    • D、Removes all columns from a table
    • E、Removes foreign keys from a table

    正确答案:B

  • 第18题:

    You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()

    • A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
    • B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.
    • C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
    • D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

    正确答案:B

  • 第19题:

    单选题
    What is the difference between thE.remove and thE.purge action with the dpkg command?()
    A

     -remove removes the program, -purge also removes the config files

    B

     -remove only removes the program, -purge only removes the config files

    C

     -remove removes a package, -purge also removes all packages dependent on it

    D

     -remove removes only the package file itself, -purge removes all files related to the package


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()
    A

    Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.

    B

    Allow all inbound VPN traffic to pass through the perimeter firewall only.  

    C

    Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.

    D

    Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()
    A

    It sends the traffic through one egress port toward its destination

    B

    It sends the traffic through multiple egress ports to all available receivers

    C

    It sends the traffic through an internal link to the RE

    D

    It sends the traffic to the local system for further processing


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()
    A

     NIC filtering is enabled.

    B

     Port security is configured.

    C

     NIC is not in promiscuous mode.

    D

     NIC is in promiscuous mode.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following functions does the "ifconfig en0" perform?()
    A

    Shuts down en0

    B

    Displays en0 settings

    C

    Reconfigures en0 using the ODM

    D

    Sends an SNMP alert to the network administrator


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following BEST describes a hub?()
    A

    Determines the best route to transmit data

    B

    Inspects traffic and accepts or declines transmission

    C

    Broadcasts data to specific network devices

    D

    Broadcasts data to all network devices


    正确答案: C
    解析: 暂无解析