niusouti.com

Regarding the extended ping command; which of the statements below are true?(Select all valid answer choices)A.The extended ping command is supported from user EXEC mode.B.The extended ping command is available from privileged EXEC mode.C.With the extende

题目

Regarding the extended ping command; which of the statements below are true?

(Select all valid answer choices)

A.The extended ping command is supported from user EXEC mode.

B.The extended ping command is available from privileged EXEC mode.

C.With the extended ping command you can specify the TCP and UDP port to be pinged.

D.With the extended ping command you can specify the timeout value.

E.With the extended ping command you can specify the datagram size.


相似考题
更多“Regarding the extended ping command; which of the statements below are true?(Select all valid answer choices)A.The extended ping command is supported from user EXEC mode.B.The extended ping command is available from privileged EXEC mode.C.With the extende”相关问题
  • 第1题:

    Refer to the exhibit. IP multicast configuration changes have been made on several routers.However, the IP multicast table displayed in the exhibit still does not reflect the changes. What should be done to display the new routing table information? ()

    A. Issue the clear ip route * privileged EXEC command.

    B. Issue the clear ip igmp group privileged EXEC command.

    C. Issue the no ip mroute - cache privileged EXEC command.

    D. Issue the clear ip mroute privileged EXEC command.


    参考答案:D

  • 第2题:

    The enable secret command is used to secure access to which CLI mode?()

    A.user EXEC mode

    B.global configuration mode

    C.privileged EXEC mode

    D.auxiliary setup mode


    参考答案:C

  • 第3题:

    Exhibit: Which of the following are true regarding the command output shown in the display (Choose two.)()。

    A.There are at least two routers participating in the RIP process.

    B.A ping to 192.168.168.2 will be successful.

    C.A ping to 10.0.15.2 will be successful.

    D.RtrA has three interfaces participating in the RIP process.


    参考答案:A, C

  • 第4题:

    Which two Cisco AutoQoS configuration statements are true? ()

    • A、the auto discovery qos command is supported on serial interfaces, subinterfaces, and virtual interfaces
    • B、CEF must be enabled before configuring the auto discovery qos command
    • C、the auto discovery qos privilege EXEC command must be configured on a router for several days to collect a sampling of data traffic
    • D、the auto qos trust command relies on NBAR to provide VoIP classification
    • E、the auto qos voip command configures the voip classification on routers and switches

    正确答案:B,E

  • 第5题:

    Which command can be used from a PC to verify the connectivity between hosts that connect through a switch in the same LAN?()

    • A、ping address
    • B、tracert address
    • C、traceroute address
    • D、arp address

    正确答案:A

  • 第6题:

    The enable secret command is used to secure access to which CLI mode?()

    • A、user EXEC mode
    • B、global configuration mode
    • C、privileged EXEC mode
    • D、auxiliary setup mode

    正确答案:C

  • 第7题:

    Which command can be used from a PC to verfy the connectivity between host that connect through path?()

    • A、tracert address
    • B、ping address
    • C、arp address
    • D、traceroute address

    正确答案:A

  • 第8题:

    Which of the following is TRUE about the ping  -f command?()

    • A、 It is useful for diagnosing data dependent problems by filling the packet with the byte pattern following the "f" in the command line. 
    • B、 It is useful for flooding from slow character based terminals since it only displays a dot "." for each packet sent in fast mode. 
    • C、 It is useful for flooding from slow character based terminals since it only displays a dot "."       for each packet sent and a backspace on returned in fast mode. 
    • D、 The command can only be run by root.

    正确答案:D

  • 第9题:

    In a TCP/IP network, which of the following protocols is involved when a user issues a ping command?()

    • A、TCP
    • B、UDP
    • C、ICMP
    • D、SMTP

    正确答案:C

  • 第10题:

    What is a valid option when using the ping command?()

    • A、packet loss
    • B、packet size
    • C、CRC
    • D、TCP port

    正确答案:B

  • 第11题:

    The user HR owns the EMP table. The user HR grants privileges to the user SCOTT by using this command:  SQL> GRANT SELECT,INSERT,UPDATE ON emp TO scott WITH GRANT OPTION; The user SCOTT executes this command to grant privileges to the user JIM: SQL> GRANT SELECT,INSERT,UPDATE ON hr.emp TO jim;  Now, the user HR decides to revoke privileges from JIM using this command: SQL> REVOKE SELECT,INSERT,UPDATE ON emp FROM jim; Which statement is true after HR issues the REVOKE command()

    • A、The command fails because SCOTT still has privileges.
    • B、The command succeeds and privileges are revoked from JIM.
    • C、The command fails because HR cannot revoke the privileges from JIM.
    • D、The command succeeds and only HR has the privilege to perform the SELECT, INSERT, and UPDATEoperations on the EMP table.

    正确答案:C

  • 第12题:

    单选题
    A technician is attempting to use a command line prompt to continuously ping a remote server to check availability and reliability of the connection. Which of the following provides the ping command needed to continuously ping the system?()
    A

    ping -a

    B

    ping -f

    C

    ping -r

    D

    ping -t


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Which of the following answer choices are correct characteristics of named access list?()

    A. You can delete individual statements in a named access list

    B. Named access lists require a numbered range from 1000 to 1099.

    C. Named access lists must be specified as standard or extended.

    D. You can use the ip access-list command to create named access lists.

    E. You cannot delete individual statements in a named access list.

    F. You can use the ip name-group command to apply named access lists.


    参考答案:A, C, D

  • 第14题:

    Which command can be used from a PC to verfy the connectivity between host that connect through path?()

    A.tracert address

    B.ping address

    C.arp address

    D.traceroute address


    参考答案:A

  • 第15题:

    Which of the following are characteristics of named access lists?()

    • A、Individual statements in a named access list may be deleted.
    • B、They require a numbered range from 1000 to 1099.
    • C、When created, they must be specified as standard or extended.
    • D、They are created with the ip access-list command.
    • E、The entire access list must be deleted before editing.
    • F、They are applied with the ip name-group command.

    正确答案:A,C,D

  • 第16题:

    A technician is troubleshooting a network connectivity issue on a MFD and would like to eliminate the possibility of another device on the network having the same IP address. The technician should:()

    • A、disconnect the MFD and ping the IP address.
    • B、disconnect the MFD and ping the subnet mask.
    • C、disconnect the MFD and ping the loopback address.
    • D、run the ipconfig command from the command prompt.

    正确答案:A

  • 第17题:

    Which command is used to debug a ping command?()

    • A、debug icmp
    • B、debug ip icmp
    • C、debug tcp
    • D、debug packet

    正确答案:B

  • 第18题:

    Which of the following answer choices are correct characteristics of named access list?()

    • A、You can delete individual statements in a named access list
    • B、Named access lists require a numbered range from 1000 to 1099.
    • C、Named access lists must be specified as standard or extended.
    • D、You can use the ip access-list command to create named access lists.
    • E、You cannot delete individual statements in a named access list.
    • F、You can use the ip name-group command to apply named access lists.

    正确答案:A,C,D

  • 第19题:

    A technician is attempting to use a command line prompt to continuously ping a remote server to check availability and reliability of the connection. Which of the following provides the ping command needed to continuously ping the system?()

    • A、ping -a
    • B、ping -f
    • C、ping -r
    • D、ping -t

    正确答案:D

  • 第20题:

    While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."At which OSI layer is this problem associated with?()

    • A、The data link layer
    • B、The application layer
    • C、The access layer
    • D、The session layer
    • E、The network layer

    正确答案:E

  • 第21题:

    Which command will allow the creation of a10-character login user name?()

    • A、chlogin -a log_name=10
    • B、chdev -l sys0 -a max_logname=10
    • C、chusr extended_logname=true [userid]
    • D、chuser login_name=10 extended_logname=true [userid]

    正确答案:B

  • 第22题:

    You executed the following command to drop a user: DROP USER scott CASCADE; Which two statements regarding the above command are correct?()

    • A、All the objects of scott are moved to the Recycle Bin.
    • B、Any objects in the Recycle Bin belonging to scott are purged.
    • C、All the objects owned by scott are permanently dropped from the database.
    • D、All the objects of scott in the Recycle Bin must be purged before executing the DROP command.
    • E、Any objects in the Recycle Bin belonging to scott will not be affected by the above DROP command.

    正确答案:B,C

  • 第23题:

    多选题
    Which two Cisco AutoQoS configuration statements are true? ()
    A

    the auto discovery qos command is supported on serial interfaces, subinterfaces, and virtual interfaces

    B

    CEF must be enabled before configuring the auto discovery qos command

    C

    the auto discovery qos privilege EXEC command must be configured on a router for several days to collect a sampling of data traffic

    D

    the auto qos trust command relies on NBAR to provide VoIP classification

    E

    the auto qos voip command configures the voip classification on routers and switches


    正确答案: E,C
    解析: 暂无解析