更多"Which of the protocols below use TC"的相关试题:
[单项选择]Which protocol below uses TCP port 443?()
A. HTML
B. HTTPS
C. TFTP
D. Telnet
E. SMTP
[多项选择]Which of the following services use TCP?()
A. DHCP
B. SMTP
C. SNMP
D. FTP
E. HTTP
F. TFTP
[单项选择]Which of the following protocols use both TCP and UDP ports?()
A. FTP
B. SMTP
C. Telnet
D. DNS
E. All of the above
[单项选择]Which TCP port does LDP use for its protocol communications?()
A. 464
B. 466
C. 644
D. 646
[多项选择]Which of the commands below can you use to configure a default route?()
A. TK1(config)# ip route 0.0.0.0 0.0.0.0 E0
B. TK1(config)# ip route 0.0.0.0 255.255.255.255 S0
C. TK1(config-interface)# ip route 255.255.255.255 0.0.0.0 192.168.1.21
D. TK1(config)# ip route 0.0.0.0 0.0.0.0 192.168.1.21
E. TK1(config)# ip route 0.0.0.0 192.168.1.21 255.255.255.255
F. TK1# ip default-network 0.0.0.0 192.168.1.21 255.255.255.255
[单项选择]Which of the following TCP/IP addresses is a Class C address?()
A. 10.0.0.1
B. 12.78.1.1
C. 172.16.1.1
D. 192.168.1.1
[单项选择]Which layer in the TCP/IP model is responsible for delivering packets to their destination?()
A. Application Layer
B. Transport Layer
C. Internet Layer
D. Network Access Layer
[单项选择]Which of the following uses TCP?()
A. DHCP
B. SNMP
C. TFTP
D. IMAP4
[单项选择]A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
A. BPDU
B. Port security
C. RSTP
D. STP
E. VTP
F. Blocking mode
[多项选择]Which two statements are true about TCP communication?()
A. The receiver acknowledges the final packet in each communications stream.
B. The receiver adds sequencing numbers to the packets received.
C. The sender adds sequencing numbers to the packets it sends.
D. The receiver acknowledges each packet it receives from the sending device.
[单项选择]Which method listed below is acceptable by classification society to perform hose testing to weather tight hatch covers and closing appliances()
A. This is to be carried out at a maximum distance of 1,5m with a hose pressure not less than 2,0 kgf/cm2. The nozzle diameter is not to be less than 12mm.
B. This is to be carried out at a maximum distance of 1,5m with a hose pressure not less than 3,5 kgf/cm2. The nozzle diameter is not to be less than 5mm.
C. This is to be carried out at a maximum distance of 1,5m with a hose pressure not less than 4,0 kgf/cm2. The nozzle diameter is not to be less than 8mm.
D. This is to be carried out at a maximum distance of 2,0m with a hose pressure not less than 2,0 kgf/cm2. The nozzle diameter is not to be less than 12mm.
[单项选择]Which CLI command do you use to determine which files are cleanup candidates?()
A. request system storage cleanup candidates
B. request sytem services storage candidates
C. request system services candidate cleanup
D. request system storage cleanup dry-run
[单项选择]Which IOS command would you use to find out which networks are routed by a particular OSPF process()
A. show ip ospf
B. show ip route
C. show ip protocols
D. show ip ospf database
E. None of the other alternatives apply
[多项选择]Identify two situations in which you can use Data Recovery Advisor for recovery. ()(Choose two.)
A. The user has dropped an important table that needs to be recovered.
B. The database files are corrupted when the database is open.
C. You are not able to start up the database instance because the required database files are missing.
D. The archived log files are missing for which backup is not available.
[多项选择]Which three protocols use UDP as a transport protocol by default?()
A. HTTP
B. TFTP
C. DNS
D. SNMP
E. SMTP
[多项选择]Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?()
A. DMVPN
B. MPLS VPN
C. Virtual Tunnel Interface (VTI)
D. SSL VPN
E. PPPoE