Identify three valid host addres

题目

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

  • A、192.168.27.33
  • B、192.168.27.112
  • C、192.168.27.119
  • D、192.168.27.126
  • E、192.168.27.175
  • F、192.168.27.208
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A technician is using a packet sniffer to identify a server. The technician observes the followingnetwork traffic:Which of the following is MOST likely to be the server?()

A.HOST-A

B.HOST-B

C.HOST-C

D.HOST-D


参考答案:A

第2题:

In the "host to host" layer of the DOD model, which of the following is a valid connection oriented protocol?()

A.ARP

B.RARP

C.TCP

D.UDP

E.IP

F.ICMP

G.BootP


参考答案:C

第3题:

What are three valid Juniper Networks IPS attack object types?() (Choose three.)

A. signature

B. anomaly

C. trojan

D. virus

E. chain


参考答案:A, B, E

第4题:

Identify four valid requests in a RESTful service using JAX-RS.()

  • A、GET
  • B、PUT
  • C、UPDATE
  • D、DELETE
  • E、POST
  • F、REMOVE

正确答案:A,B,D,E

第5题:

In the "host to host" layer of the DOD model, which of the following is a valid connection oriented protocol?()

  • A、ARP
  • B、RARP
  • C、TCP
  • D、UDP
  • E、IP
  • F、ICMP
  • G、BootP

正确答案:C

第6题:

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

A.192.168.27.33

B.192.168.27.112

C.192.168.27.119

D.192.168.27.126

E.192.168.27.175

F.192.168.27.208


参考答案:A, C, D

第7题:

The network default gateway applying to a host by DHCP is 192.168.5.33/28.Which option is the valid IP address of this host?()

A.192.168.5.55

B.192.168.5.47

C.192.168.5.40

D.192.168.5.32

E.192.168.5.14


参考答案:C

第8题:

The Origin attribute describes the source of the BGP prefix.Which three are valid Origin codes?() (Choose three.)

A.IGP

B.BGP

C.EGP

D.Incomplete

E.Anonymous


参考答案:A, C, D

第9题:

What are three valid Juniper Networks IPS attack object types?() (Choose three.)

  • A、signature
  • B、anomaly
  • C、trojan
  • D、virus
  • E、chain

正确答案:A,B,E

第10题:

You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()

  • A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
  • B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
  • C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
  • D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
  • E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
  • F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
  • G、None of the other alternatives apply

正确答案:F

更多相关问题