单选题A remote user is trying to telnet to the production server. The session is getting a timeout error. Which command should the user issue to verify the network connection?()A iptraceB nslookupC netstatD traceroute

题目
单选题
A remote user is trying to telnet to the production server. The session is getting a timeout error. Which command should the user issue to verify the network connection?()
A

iptrace

B

nslookup

C

netstat

D

traceroute

参考答案和解析
正确答案: A
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A user is trying to use Remote Desktop to connect to another computer on the LAN. Theconnection fails. The technician opens up a command prompt and types the following: telnetcomputernamE. 3389” and also gets the same error message.Which of the following is the MOSTlikely cause of this error, assuming that the OS firewall has been disabled?()

A. The antivirus software is blocking the incoming connection.

B. The ISP is blocking Remote Desktop at their end.

C. The RDP connection has been configured to use a non-standard port.

D. The telnet service has not been installed.


参考答案:C

第2题:

Which of the following should a technician instruct a user to do to initiate Remote Assistance for a user running Windows XP Professional?()

  • A、Network Neighborhood > navigate to the users computer > right click > select Offer Remote Assistance
  • B、Go to Help and Support Center > Pick a Task > Use Tools > Offer Remote Assistance
  • C、Run Remote Desktop Connection > Select Connect to User Enter the IP address
  • D、Start > Programs > Administrative Tools > Remote Assistance

正确答案:B

第3题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


参考答案:B, C

第4题:

Which command can be a router to verify the layer 3 path to a host?()

  • A、traceroute address
  • B、tracert address
  • C、ssh address
  • D、telnet address

正确答案:A

第5题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第6题:

Aremoteuseristryingtotelnettotheproductionserver.Thesessionisgettingatimeouterror.Whichcommandshouldtheuserissuetoverifythenetworkconnection?()

A.iptrace

B.nslookup

C.netstat

D.traceroute


参考答案:D

第7题:

Multiple users are trying to telnet to the AIX server. They are able to ping the server successfully, but are getting the following error message:  telnet: connect: A remote host refused an attempted connect operation   Which of the following could be the cause of this problem?()

  • A、The routing table on the AIX server is incorrect.
  • B、The IP address on the network adapter is incorrect.
  • C、The portmap daemon is not running on the AIX server.
  • D、The inetd daemon is not running on the AIX server.

正确答案:D

第8题:

A user is successfully authenticating to the network but is unable to access protected resources behind a ScreenOS enforcer. You log in to the ScreenOS enforcer and issue the command get auth table infranet and you do not see the user listed.Which two event log settings on the Junos Pulse Access Control Service must you enable to troubleshootthis issue?()

A. Connection Requests

B. System Errors

C. Enforcer Events

D. Enforcer Command Trace


参考答案:C, D

第9题:

Your company has an Active Directory domain. The company runs Terminal Services.  A user has remotely logged on to the Terminal Server. The user requires help to use an application. When you connect to the Terminal Server session, you cannot operate any applications. You need to ensure that you can assist any user on the Terminal Server. What should you do?()

  • A、 From the Terminal Server run the Tscon /v command. Then reconnect to the session.
  • B、 Run the Chgusr /execute command on the Terminal Server. Then reconnect to the session.
  • C、 Enable Use remote control with default user settings in the RDP-Tcp Properties.
  • D、 Enable Use remote control with the following settings in the RDP-Tcp Properties. Configure the Level of control policy setting to Interact with the session. Instruct the user to log off and log back on.

正确答案:D

第10题:

A user reports they cannot access the network share folder, the users workstation is configured to use automatic IP. When the administrator checks the IP address the response returns as 169.254.0.5. Which of the following should the administrator verify?()

  • A、 That there are no DHCP relay servers
  • B、 That the user account on Active Directory is not locked
  • C、 That the network card driver is not installed incorrectly
  • D、 The network connection is functioning

正确答案:D

更多相关问题