Which should you expect to find in the IP header of an outbound datagram?
In a given Telnet communication, two IP addresses, 194.168.85.51 and 192.9.9.6, are involved in peer-to-peer communication. Datagrams leave the source host 194.168.85.51 and are transmitted to destination host 192.9.9.6. Which should you expect to find in the IP header of an outbound datagram?
Which three describe these sets of rules?
Protocols are used by computer networks to communicate or exchange data.
A data communication protocol is a set of rules that must be followed by electronic devices to communicate with each other. Which three describe these sets of rules? (Choose three.)
Which network topology is suited for this environment?
You are asked to recommend a network topology for a new server network.
This network will service all of your Sun servers (approximately 50 machines) and several employee workstations (approximately 20 machines). Which network topology is suited for this environment?
What are two functions of the first three octets?
Ethernet addresses are 48 bits long. Ethernet addresses are always displayed as 12 hexadecimal digits (six groups of two digits) separated by colons. An example of this is:
08:00:20:b7:bc:9d
What are two functions of the first three octets? (Choose two.)
Which network media type should you recommend?
You are asked to recommend a network connection type to link your office with another office approximately 1,000 meters (1,100 yards) away. This network will transfer very large files between the two offices. Which network media type should you recommend?
Which subsequent command should be executed to view the time nfs packets were received as captured in /tmp/out
A system administrator troubleshooting nfs client to nfs server network latency issues has executed the following command:
snoop -d hme0 -o /tmp/outfile
Which subsequent command should be executed to view the time nfs packets were received as captured in /tmp/outfile?
Which two commands create this output?
As part of a security audit, you are compiling a list of MAC addresses for systems on the subnet you administer.
Given the output:
Net to Media Table: IPv4
Device IP Address Mask Flags Phys Addr
—— ——————– ———————- —– —————
hme0 192.168.1.14 255.255.255.255 59:76:6f:6e:6e:65
hme0 dbms-02 255.255.255.255 57:65:46:6f:76:65
hme0 dbms-01 255.255.255.255 59:6f:75:21:3b:29
hme0 dbms-03 255.255.255.255 SP 08:00:20:ad:d5:9e
hme0 224.0.0.0 240.0.0.0 SM 01:00:5e:00:00:00
Which two commands create this output? (Choose two.)
Which command should you use to change the maximum number of configurable virtual interfaces so that your stra
You are an administrator for a web-hosting organization. Each website your company supports has its own IP address. You want to assign each IP address to its own virtual interface on your server. Your server needs to support more websites than the default number of virtual interfaces on the Solaris OS. Which command should you use to change the maximum number of configurable virtual interfaces so that your strategy can be implemented?
Which three layers of the OSI network model are included in the Application layer of the TCP/IP network model?
Which three layers of the OSI network model are included in the Application layer of the TCP/IP network model? (Choose three.)
What two commands can be used to verify that the Solaris system is configured to forward IP packets between th
You configure a second network connection on a server and attempt to configure the server to route packets between the two interfaces.
The snoop command reveals that packets are arriving on both interfaces, but the server is refusing to forward packets between interfaces as required.
What two commands can be used to verify that the Solaris system is configured to forward IP packets between these two interfaces? (Choose two.)