單項(xiàng)選擇題A network administrator is verifying the configuration of a newly installed host by establishing an FTP connection to a remote server. What is the highest layer of the protocol stack that the nework administrator is using for this operation?()

A. application
B. presentation
C. session
D. transport
E. internet
F. data link


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Acknowldgement, Sequencing, and Flow control are characteristics of which OSI layer?()

A. Layer 2
B. Layer 3
C. Layer 4
D. Layer 5
E. Layer 6
F. Layer 7

2.單項(xiàng)選擇題The administrator is unable to establish connectivity between two Cisco routers. Upon reviewing the command output of both routers, what is the most likely caust of the problem?()

A. Authentication needs to be changed to PAP for both routers.
B. Serial IP addresses of routers are not on the same subnet.
C. Username/password is incorrectly configured.
D. Router names are incorrectly configured.

3.單項(xiàng)選擇題What is valid reason for a switch to deny port access to new devices when port security is enabled?()

A. The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.
B. The denied MAC address are statically configured on the port.
C. The minimum MAC threshold has been reached.
D. The absolute aging times for the denied MAC addresses have expired.

4.單項(xiàng)選擇題What is the purpose using the traceroute command?()

A. to map all the devices on a network.
B. to display the current TCP/IP configuration values.
C. to see how a device MAC address is mapped to its IP address.
D. to see the path a packet will take when traveling to a specified destination.
E. to display the MTU values for each router in a specified network path from source to a destination.

5.單項(xiàng)選擇題Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()

A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse

最新試題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項(xiàng)選擇題

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

題型:單項(xiàng)選擇題

An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()

題型:單項(xiàng)選擇題

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

題型:單項(xiàng)選擇題

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

題型:單項(xiàng)選擇題

Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()

題型:單項(xiàng)選擇題

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

題型:單項(xiàng)選擇題

What is the subnetwork address for a host with the IP address 201.100.5.68/28?()

題型:單項(xiàng)選擇題

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

題型:單項(xiàng)選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:單項(xiàng)選擇題