ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets? (Choose two)A. They acknowledge receipt of TCP segments.B. They guarantee datagram delivery.C. They can provide hosts with information about netw

题目

ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets? (Choose two)

A. They acknowledge receipt of TCP segments.

B. They guarantee datagram delivery.

C. They can provide hosts with information about network problems.

D. They are encapsulated within IP datagrams.

E. They are encapsulated within UDP datagrams.

F. They are encapsulated within TCP datagrams.


相似考题
更多“ICMP is often used in troubleshooting and verifying network. What statements are true regarding ICMP packets? (Choose two)A. They acknowledge receipt of TCP segments.B. They guarantee datagram delivery.C. They can provide hosts with information about netw”相关问题
  • 第1题:

    Which two statements regarding symmetric key encryption are true?() (Choose two.)

    A. The same key is used for encryption and decryption.

    B. It is commonly used to create digital certificate signatures.

    C. It uses two keys: one for encryption and a different key for decryption.

    D. An attacker can decrypt data if the attacker captures the key used for encryption.


    参考答案:A, D

  • 第2题:

    The Ezonexam network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? (Choose two)

    A.ARP

    B.CDP

    C.DHCP

    D.DNS

    E.ICMP


    正确答案:AE
    解析:Explanation:ARPfindsthehardwareaddressofahostfromaknownIPaddress.Here'showitworks:whenIPhasadatagramtosend,itmustinform.aNetworkAccessprotocol,suchasEthernetorTokenRing,ofthedestination'shardwareaddressonthelocalnetwork.(Ithasalreadybeeninformedbyupper-layerprotocolsofthedestination'sIPaddress.)IfIPdoesn'tfindthedestinationhost'shardwareaddressintheARPcache,itusesARPtofindthisinformation.ICMPworksattheNetworklayerandisusedbyIPformanydifferentservices.ICMPisamanagementprotocolandmessagingserviceproviderforIP.ItsmessagesarecarriedasIPdatagrams.RFC1256isanannextoICMP,whichaffordshosts'extendedcapabilityindiscoveringroutestogateways.Periodically,routeradvertisementsareannouncedoverthenetwork,reportingIPaddressesfortherouter'snetworkinterfaces.Hostslistenforthesenetworkinfomercialstoacquirerouteinformation.Aroutersolicitationisarequestforimmediateadvertisementsandmaybesentbyahostwhenitstartsup.

  • 第3题:

    Which two statements are true regarding the USING clause in table joins?()

    • A、It can be used to join a maximum of three tables 
    • B、It can be used to restrict the number of columns used in a NATURAL join 
    • C、It can be used to access data from tables through equijoins as well as nonequijoins 
    • D、It can be used to join tables that have columns with the same name and compatible data types

    正确答案:B,D

  • 第4题:

    Which two statements about static NAT are true? ()(Choose two.)

    • A、Static NAT can only be used with destination NAT.
    • B、Static NAT rules take precedence over overlapping dynamic NAT rules.
    • C、NAT rules take precedence over overlapping static NAT rules.
    • D、A reverse mapping is automatically created.

    正确答案:B,D

  • 第5题:

    Which statements are true regarding ISDN channels?()

    • A、Each B channel can transmit up to 64 kbps
    • B、The ISDN B channel carries voice or data
    • C、The ISDN D channel transmits control information.
    • D、The D channel transmission rate varies depending on the service used.
    • E、HDLC or PPP can be used to encapsulate D channel information.

    正确答案:A,B,C

  • 第6题:

    Which two statements about MPLS Label Distribution Protocol (LDP) are true? ()

    • A、LDP hello packets are sent to TCP 646.
    • B、LDP session packets are sent to TCP 646.
    • C、LDP session packets are sent to TCP 711.
    • D、LDP hello packets are sent to TCP 711.
    • E、LDP hello packets are sent to UDP 711.
    • F、LDP hello packets are sent to UDP 646.

    正确答案:B,F

  • 第7题:

    Which two statements regarding external authentication servers for firewall user authentication are true?() (Choose two.)

    • A、Up to three external authentication server types can be used simultaneously.
    • B、Only one external authentication server type can be used simultaneously.
    • C、If the local password database is not configured in the authentication order, and the configured authentication server  bypassed.
    • D、If the local password database is not configured in the authentication order, and the configured authentication server authentication is rejected.

    正确答案:B,D

  • 第8题:

    Which two statements are true about the Automatic Diagnostic Repository (ADR)?() 

    • A、 The ADR base keeps all diagnostic information in binary format
    • B、 SQL*Plus provides the ADRI script, which can be used to work with ADR
    • C、 The ADR can be used for problem diagnosis only when the database is open
    • D、 The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to null
    • E、 The ADR can be used for problem diagnosis even when the database instance is down
    • F、 The ADR base is shared across multiple instances

    正确答案:E,F

  • 第9题:

    Which two statements are true about the Automatic Diagnostic Repository (ADR)?() (Choose two.)

    • A、The ADR base keeps all diagnostic information in binary format
    • B、SQL*Plus provides the ADRI script, which can be used to work with ADR
    • C、The ADR can be used for problem diagnosis only when the database is open
    • D、The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to null
    • E、The ADR can be used for problem diagnosis even when the database instance is down
    • F、The ADR base is shared across multiple instances

    正确答案:E,F

  • 第10题:

    多选题
    Which two statements are true regarding the USING clause in table joins?()
    A

    It can be used to join a maximum of three tables

    B

    It can be used to restrict the number of columns used in a NATURAL join

    C

    It can be used to access data from tables through equijoins as well as nonequijoins

    D

    It can be used to join tables that have columns with the same name and compatible data types


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    多选题
    What statements are true regarding ICMP packets?()
    A

    They acknowledge receipt of TCP segments.

    B

    They guarantee datagram delivery.

    C

    They can provide hosts with information about network problems.

    D

    They are encapsulated within IP datagrams.

    E

    They are encapsulated within UDP datagrams.


    正确答案: B,E
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements regarding symmetric key encryption are true?() (Choose two.)
    A

    The same key is used for encryption and decryption.

    B

    It is commonly used to create digital certificate signatures.

    C

    It uses two keys: one for encryption and a different key for decryption.

    D

    An attacker can decrypt data if the attacker captures the key used for encryption.


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    Which two statements regarding traceroute on JUNOS devices are correct?()

    A.Traceroute transmits ICMP echo-request packets.

    B.Traceroute transmits UDP packets.

    C.Traceroute receives ICMP echo-reply packets.

    D.Traceroute receives ICMP port-unreachable packets.


    参考答案:B, D

  • 第14题:

    Which statements are true regarding ISDN channels?()

    A. Each B channel can transmit up to 64 kbps

    B. The ISDN B channel carries voice or data

    C. The ISDN D channel transmits control information.

    D. The D channel transmission rate varies depending on the service used.

    E. HDLC or PPP can be used to encapsulate D channel information.


    参考答案:A, B, C

  • 第15题:

    Which two network attack statements are true?()

    • A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
    • B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
    • C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
    • D、DoS attacks can consist of IP spoofing and DDoS attacks.
    • E、IP spoofing can be reduced through the use of policy-based routing.
    • F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

    正确答案:A,D

  • 第16题:

    Which two statements about the Cisco Nexus 1000V VSM are true?()

    • A、It performs switching decisions and forwarding for the VEM
    • B、It can be run on a virtual machine
    • C、It can be used for remote VEM switching Iine cards

    正确答案:B,C

  • 第17题:

    Choose the most correct statements about SMTP/ESMTP. ()

    • A、 Open mail relays are often used for spamming.
    • B、 ESMTP does NOT provide more security features than SMTP
    • C、 SMTPdoes provide authenticated email sending."
    • D、 Worms often spread via SMTP.

    正确答案:A,D

  • 第18题:

    What statements are true regarding ICMP packets?()

    • A、They acknowledge receipt of TCP segments.
    • B、They guarantee datagram delivery.
    • C、They can provide hosts with information about network problems.
    • D、They are encapsulated within IP datagrams.
    • E、They are encapsulated within UDP datagrams.

    正确答案:C,D

  • 第19题:

    Which two statements regarding symmetric key encryption are true?() (Choose two.)

    • A、The same key is used for encryption and decryption.
    • B、It is commonly used to create digital certificate signatures.
    • C、It uses two keys: one for encryption and a different key for decryption.
    • D、An attacker can decrypt data if the attacker captures the key used for encryption.

    正确答案:A,D

  • 第20题:

    Which two statements are true regarding subqueries? ()

    • A、A subquery can retrieve zero or more rows 
    • B、Only two subqueries can be placed atone level 
    • C、A subquery can be used only in SQL query statements 
    • D、A subquery can appear on either side of a comparison operator 
    • E、There is no limit on the number of subquery levels in the WHERE clause of a SELECT statement 

    正确答案:A,D

  • 第21题:

    Which two statements are true regarding the USING and ON clauses in table joins?()

    • A、Both USING and ON clauses can be used for equijoins and nonequijoins 
    • B、Amaximum of one pair of columns can be joined between two tables using the ON clause 
    • C、The ON clause can be used to join tables on columns that have different names but compatible data types 
    • D、The WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause 

    正确答案:C,D

  • 第22题:

    多选题
    Which two statements are true regarding the USING and ON clauses in table joins?()
    A

    Both USING and ON clauses can be used for equijoins and nonequijoins

    B

    Amaximum of one pair of columns can be joined between two tables using the ON clause

    C

    The ON clause can be used to join tables on columns that have different names but compatible data types

    D

    The WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause


    正确答案: A,C
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements about MPLS Label Distribution Protocol (LDP) are true? ()
    A

    LDP hello packets are sent to TCP 646.

    B

    LDP session packets are sent to TCP 646.

    C

    LDP session packets are sent to TCP 711.

    D

    LDP hello packets are sent to TCP 711.

    E

    LDP hello packets are sent to UDP 711.

    F

    LDP hello packets are sent to UDP 646.


    正确答案: B,A
    解析: 暂无解析