A.tracert address
B.ping address
C.arp address
D.traceroute address
第1题:
A.ping address
B.tracert address
C.traceroute address
D.arp address
第2题:
When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()
第3题:
A network administrator issues the ping 192.168.2.5 command and successfully tests connectivity to a host that has been newly connected to the network. Which protocols were used during the test? ()
第4题:
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC. If a reply is received, what does this confirm()。
第5题:
Which command can be a router to verify the layer 3 path to a host?()
第6题:
Which of the following command line tools can be used to display the default gateway, IP address,and DNS servers currently being used by a host?()
第7题:
application
hub
switch
bridge
router
第8题:
all interfaces in the path toward the destination
all networks in the path toward the destination
adjacent next hop router in the path toward the destination
all routers in the path toward the destination
all interfaces through which the packets can be routed
type of service and precedence in the IP packets
第9题:
ping address
tracert address
traceroute address
arp address
第10题:
ARP
CDP
DHCP
DNS
ICMP
第11题:
The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()
A.from host PC1 to host 5.1.1.10
B.from host PC1 to host 5.1.3.10
C.from host PC2 to host 5.1.2.10
D.from host PC2 to host 5.1.3.8
第12题:
What is the use of an "all configuration" backup in Cisco UCS?()
第13题:
Layer 3 (the network layer) provides connectivity and path selection between two host systems that may be located on geographically separated networks. Which two devices operate at the network layer?()
第14题:
An administrator issues the command ping 127.0.0.1 from the command line prompt on a PC.If a reply is received, what does this confirm?()
第15题:
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()
第16题:
Which command should be used to capture network traffic between the localhost and a host named ‘webserver’?()
第17题:
The PC has connectivity with a local host.
The PC has connectivity with a Layer 3 device.
The PC has a default gateway correctly configured.
The PC has connectivity up to Layer 5 of the OSI model.
The PC has the TCP/IP protocol stack correctly installed.
第18题:
Routing
Hop-by-Hop
Fragmentation
Destination Options
第19题:
tracert address
ping address
arp address
traceroute address