CMS专题

多选题Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()Asource portBoutput interfaceCnext-hop IP addressDsource MAC addressEdestination IP addressFnext-hop MAC address

题目
多选题
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()
A

source port

B

output interface

C

next-hop IP address

D

source MAC address

E

destination IP address

F

next-hop MAC address

参考答案和解析
正确答案: D,A
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements regarding symmetric key encryption are true?() (Choose two.)

A. The same key is used for encryption and decryption.

B. It is commonly used to create digital certificate signatures.

C. It uses two keys: one for encryption and a different key for decryption.

D. An attacker can decrypt data if the attacker captures the key used for encryption.


参考答案:A, D

第2题:

Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()

  • A、source port
  • B、output interface
  • C、next-hop IP address
  • D、source MAC address
  • E、destination IP address
  • F、next-hop MAC address

正确答案:A,E

第3题:

(b) Discuss the key issues which the statement of cash flows highlights regarding the cash flow of the company.

(10 marks)


正确答案:
(b) Financial statement ratios can provide useful measures of liquidity but an analysis of the information in the cash flow
statement, particularly cash flow generated from operations, can provide specific insights into the liquidity of Warrburt. It is
important to look at the generation of cash and its efficient usage. An entity must generate cash from trading activity in order
to avoid the constant raising of funds from non-trading sources. The ‘quality of the profits’ is a measure of an entity’s ability
to do this. The statement of cash flow shows that the company has generated cash in the period despite sustaining a
significant loss ($92m cash flow but $21m loss). The problem is the fact that the entity will not be able to sustain this level
of cash generation if losses continue.
An important measure of cash flow is the comparison of the cash from operating activity to current liabilities. In the case of
Warrburt, this is $92m as compared to $155m. Thus the cash flow has not covered the current liabilities.
Operating cash flow ($92 million) determines the extent to which Warrburt has generated sufficient funds to repay loans,
maintain operating capability, pay dividends and make new investments without external financing. Operating cash flow
appears to be healthy, partially through the release of cash from working capital. This cash flow has been used to pay
contributions to the pension scheme, pay finance costs and income taxes. These uses of cash generated would be normal for
any entity. However, the release of working capital has also financed in part the investing activities of the entity which includes
the purchase of an associate and property, plant and equipment. The investing activities show a net cash outflow of
$43 million which has been financed partly out of working capital, partly from the sale of PPE and AFS financial assets and
partly out of cash generated from operations which include changes in working capital. It seems also that the issue of share
capital has been utilised to repay the long term borrowings and pay dividends. Also a significant amount of cash has been
raised through selling AFS investments. This may not continue in the future as it will depend on the liquidity of the market.
This action seems to indicate that the long term borrowings have effectively been ‘capitalised’. The main issue raised by the
cash flow statement is the use of working capital to partially finance investing activities. However, the working capital ratio
and liquidity ratios are still quite healthy but these ratios will deteriorate if the trend continues.

第4题:

Which of the following tools can be used to identify the location of a network outage?()

  • A、traceroute
  • B、netstat
  • C、nslookup
  • D、ping

正确答案:A

第5题:

Which statement is true regarding a session key in the Diffie-Hellman key-exchange process?()

  • A、A session key value is exchanged across the network.
  • B、A session key never passes across the network.
  • C、A session key is used as the key for asymmetric data encryption.
  • D、A session key is used as the key for symmetric data encryption.

正确答案:B

第6题:

Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()

A. source port

B. output interface

C. next-hop IP address

D. source MAC address

E. destination IP address

F. next-hop MAC address


参考答案:A, E

第7题:

What is the purpose of a network mask?()

  • A、It is used to identify the maximum hop count of a subnetwork
  • B、It is used to identify an IP address as either private or public
  • C、It is used to identify the network to which an IP address belongs
  • D、It is used to identify the total number of bits present in an IP address

正确答案:C

第8题:

You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()

A. Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.

B. Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.

Select the "Required" option under the custom rule C. Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.

D. Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key.


参考答案:A, D

第9题:

Which statement describes the process ID that is used to run OSPF on a router ?()

  • A、It is locally significant and must be the same throughout an area
  • B、It is globally significant and is used to represent the AS number
  • C、It is locally significant and is used to identify an instance of the OSPF database
  • D、It is globally significant and is used to identify OSPF stub areas

正确答案:C

第10题:

Which of the following multimeter settings should only be used when there is no electrical flow through the part being tested? ()(Select TWO).

  • A、Ampere
  • B、Continuity
  • C、Volt
  • D、Resistance
  • E、Wattage

正确答案:B,D

更多相关问题