Deck 9: In-Depth TCP/IP Networking

ملء الشاشة (f)
exit full mode
سؤال
In CIDR, conventional network class distinctions do not exist.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
SMTP operates from port ____.

A) 25
B) 11
C) 110
D) 250
سؤال
The MIME standard replaces SMTP.
سؤال
Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.

A) unobtainable
B) out-of-range
C) reserved
D) open for general use
سؤال
The most popular mail server programs are Sendmail and ____.

A) Eudora
B) Microsoft Outlook
C) AOL mail
D) Microsoft Exchange Server
سؤال
The gateways that make up the Internet backbone are called ____ gateways.

A) proxy
B) core
C) Internet
D) default
سؤال
In classful addressing, Class C IPv4 address host information is located in the ____.

A) last 8 bits
B) last 16 bits
C) first 8 bits
D) first 16 bits
سؤال
In ____ addressing, the network information portion of an IPv4 address is limited to the first 8 bits in a Class A address.

A) classful
B) subnet
C) stateful
D) limited
سؤال
An example of a popular client email software is ____.

A) MIME
B) Microsoft Outlook
C) Sendmail
D) Microsoft Exchange Server
سؤال
Within a classful addressing, ____ is the default subnet mask for a Class C address.

A) 255.255.255.255
B) 255.255.255.0
C) 255.255.0.0
D) 255.0.0.0
سؤال
The result from ANDing 11001111 with 10010001 is ____.

A) 11001111
B) 10010001
C) 10000001
D) 00000001
سؤال
The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.

A) proxy
B) core
C) Internet
D) default
سؤال
IMAP4 servers require less storage space and usually more processing resources than POP servers do.
سؤال
POP3's design makes it best suited to users who retrieve their mail from the same workstation all the time.
سؤال
When using classful IPv4 addressing, a network ID always ends with an octet of ____.

A) 0
B) 00000000
C) 1
D) 255
سؤال
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.

A) 0
B) 1
C) first eight
D) last eight
سؤال
On a network using TCP/IP, some nodes may use multiple IP addresses.
سؤال
A class ____ network class is reserved for special purposes.

A) A
B) B
C) C
D) D
سؤال
In classful addressing, the Class B IPv4 address network ID is located in the ____.

A) last 8 bits
B) last 16 bits
C) first 8 bits
D) first 16 bits
سؤال
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.

A) dash ( - )
B) underscore ( _ )
C) backward slash ( \ )
D) forward slash ( / )
سؤال
Explain how the traceroute utility uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
سؤال
IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.

A) POP3
B) POP
C) SMTP
D) MIME
سؤال
Explain why SNAT is considered static and describe why this is useful.
سؤال
____________________ is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message.
سؤال
POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.

A) 25
B) 11
C) 110
D) 250
سؤال
Describe four features of IMAP4.
سؤال
Explain how to calculate a host's network ID given its IPv4 address and subnet mask.
سؤال
The ____ utility allows you to view a host's routing table.

A) nbstat
B) pathping
C) dig
D) route
سؤال
The.backbone are called ____________________ gateways.
سؤال
A program similar to mtr, ____, is available as a command-line utility in Windows operating systems.

A) nbstat
B) pathping
C) dig
D) route
سؤال
If subnetting is used on a LAN, explain how devices interpret subnetting information.
سؤال
The combination of additional bits used for subnet information plus the existing network ID is known as the ____________________.
سؤال
____________________ separates a network into multiple logically defined segments, or subnets.
سؤال
Explain how hiding IP addresses on private networks allows network managers more flexibility in assigning addresses.
سؤال
Describe the formula determining how to modify a default subnet mask to create subnets.
سؤال
____________________ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks.
سؤال
Describe what PAT is and how it works.
سؤال
The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.

A) 100
B) 1000
C) 10,000
D) 1,000,000
سؤال
An administrator can discover the host name assigned to a client by using the ____ utility.

A) host
B) nbstat
C) hostname
D) nslookup
سؤال
Describe the function of the route utility and provide examples of how it is entered on a UNIX or Linux system, a Windows-based system, and a Cisco-brand router.
سؤال
Explain what happens when an administrator issues the mtr command.
سؤال
Match between columns
The TCP/IP configuration and management utility used on UNIX and Linux systems.
netstat utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
nslookup utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
nbstat utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
dig utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
ipconfig utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
route utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
host utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
ifconfig utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
traceroute utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
netstat utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
nslookup utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
nbstat utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
dig utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
ipconfig utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
route utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
host utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
ifconfig utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
traceroute utility
The TCP/IP administration utility for use with Windows operating systems.
netstat utility
The TCP/IP administration utility for use with Windows operating systems.
nslookup utility
The TCP/IP administration utility for use with Windows operating systems.
nbstat utility
The TCP/IP administration utility for use with Windows operating systems.
dig utility
The TCP/IP administration utility for use with Windows operating systems.
ipconfig utility
The TCP/IP administration utility for use with Windows operating systems.
route utility
The TCP/IP administration utility for use with Windows operating systems.
host utility
The TCP/IP administration utility for use with Windows operating systems.
ifconfig utility
The TCP/IP administration utility for use with Windows operating systems.
traceroute utility
Allows you to view a host's routing table.
netstat utility
Allows you to view a host's routing table.
nslookup utility
Allows you to view a host's routing table.
nbstat utility
Allows you to view a host's routing table.
dig utility
Allows you to view a host's routing table.
ipconfig utility
Allows you to view a host's routing table.
route utility
Allows you to view a host's routing table.
host utility
Allows you to view a host's routing table.
ifconfig utility
Allows you to view a host's routing table.
traceroute utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
netstat utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
nslookup utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
nbstat utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
dig utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
ipconfig utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
route utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
host utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
ifconfig utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
traceroute utility
Used if an administrator already know a host's name and wants to learn its IP address.
netstat utility
Used if an administrator already know a host's name and wants to learn its IP address.
nslookup utility
Used if an administrator already know a host's name and wants to learn its IP address.
nbstat utility
Used if an administrator already know a host's name and wants to learn its IP address.
dig utility
Used if an administrator already know a host's name and wants to learn its IP address.
ipconfig utility
Used if an administrator already know a host's name and wants to learn its IP address.
route utility
Used if an administrator already know a host's name and wants to learn its IP address.
host utility
Used if an administrator already know a host's name and wants to learn its IP address.
ifconfig utility
Used if an administrator already know a host's name and wants to learn its IP address.
traceroute utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
netstat utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
nslookup utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
nbstat utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
dig utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
ipconfig utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
route utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
host utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
ifconfig utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
traceroute utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
netstat utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
nslookup utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
nbstat utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
dig utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
ipconfig utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
route utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
host utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
ifconfig utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
traceroute utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
netstat utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
nslookup utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
nbstat utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
dig utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
ipconfig utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
route utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
host utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
ifconfig utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
traceroute utility
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: In-Depth TCP/IP Networking
1
In CIDR, conventional network class distinctions do not exist.
True
2
SMTP operates from port ____.

A) 25
B) 11
C) 110
D) 250
A
3
The MIME standard replaces SMTP.
False
4
Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used for host information in an IPv4 address.

A) unobtainable
B) out-of-range
C) reserved
D) open for general use
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
The most popular mail server programs are Sendmail and ____.

A) Eudora
B) Microsoft Outlook
C) AOL mail
D) Microsoft Exchange Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
The gateways that make up the Internet backbone are called ____ gateways.

A) proxy
B) core
C) Internet
D) default
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
In classful addressing, Class C IPv4 address host information is located in the ____.

A) last 8 bits
B) last 16 bits
C) first 8 bits
D) first 16 bits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
In ____ addressing, the network information portion of an IPv4 address is limited to the first 8 bits in a Class A address.

A) classful
B) subnet
C) stateful
D) limited
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
An example of a popular client email software is ____.

A) MIME
B) Microsoft Outlook
C) Sendmail
D) Microsoft Exchange Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
Within a classful addressing, ____ is the default subnet mask for a Class C address.

A) 255.255.255.255
B) 255.255.255.0
C) 255.255.0.0
D) 255.0.0.0
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
The result from ANDing 11001111 with 10010001 is ____.

A) 11001111
B) 10010001
C) 10000001
D) 00000001
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
The ____ gateway is the gateway that first interprets its outbound requests to other subnets, and then interprets its inbound requests from other subnets.

A) proxy
B) core
C) Internet
D) default
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
IMAP4 servers require less storage space and usually more processing resources than POP servers do.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
POP3's design makes it best suited to users who retrieve their mail from the same workstation all the time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
When using classful IPv4 addressing, a network ID always ends with an octet of ____.

A) 0
B) 00000000
C) 1
D) 255
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an IPv4 address contain network information.

A) 0
B) 1
C) first eight
D) last eight
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
On a network using TCP/IP, some nodes may use multiple IP addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
A class ____ network class is reserved for special purposes.

A) A
B) B
C) C
D) D
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
In classful addressing, the Class B IPv4 address network ID is located in the ____.

A) last 8 bits
B) last 16 bits
C) first 8 bits
D) first 16 bits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
CIDR notation takes the form of the network ID followed by a(n) ____, followed by the number of bits that are used for the extended network prefix.

A) dash ( - )
B) underscore ( _ )
C) backward slash ( \ )
D) forward slash ( / )
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Explain how the traceroute utility uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as a more sophisticated alternative to ____.

A) POP3
B) POP
C) SMTP
D) MIME
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
Explain why SNAT is considered static and describe why this is useful.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
____________________ is a standard for encoding and interpreting binary files, images, video, and non-ASCII character sets within an e-mail message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
POP3 (Post Office Protocol, version 3) relies on TCP and operates over port ____.

A) 25
B) 11
C) 110
D) 250
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
Describe four features of IMAP4.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Explain how to calculate a host's network ID given its IPv4 address and subnet mask.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
The ____ utility allows you to view a host's routing table.

A) nbstat
B) pathping
C) dig
D) route
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
The.backbone are called ____________________ gateways.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
A program similar to mtr, ____, is available as a command-line utility in Windows operating systems.

A) nbstat
B) pathping
C) dig
D) route
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
If subnetting is used on a LAN, explain how devices interpret subnetting information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
The combination of additional bits used for subnet information plus the existing network ID is known as the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
____________________ separates a network into multiple logically defined segments, or subnets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
Explain how hiding IP addresses on private networks allows network managers more flexibility in assigning addresses.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
Describe the formula determining how to modify a default subnet mask to create subnets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
____________________ is the protocol responsible for moving messages from one mail server to another over TCP/IP-based networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Describe what PAT is and how it works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
The standard message format specified by SMTP allows for lines that contain no more than ____ ASCII characters.

A) 100
B) 1000
C) 10,000
D) 1,000,000
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
An administrator can discover the host name assigned to a client by using the ____ utility.

A) host
B) nbstat
C) hostname
D) nslookup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Describe the function of the route utility and provide examples of how it is entered on a UNIX or Linux system, a Windows-based system, and a Cisco-brand router.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Explain what happens when an administrator issues the mtr command.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
The TCP/IP configuration and management utility used on UNIX and Linux systems.
netstat utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
nslookup utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
nbstat utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
dig utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
ipconfig utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
route utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
host utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
ifconfig utility
The TCP/IP configuration and management utility used on UNIX and Linux systems.
traceroute utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
netstat utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
nslookup utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
nbstat utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
dig utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
ipconfig utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
route utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
host utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
ifconfig utility
Useful only on networks that run Windows-based operating systems and NetBIOS.
traceroute utility
The TCP/IP administration utility for use with Windows operating systems.
netstat utility
The TCP/IP administration utility for use with Windows operating systems.
nslookup utility
The TCP/IP administration utility for use with Windows operating systems.
nbstat utility
The TCP/IP administration utility for use with Windows operating systems.
dig utility
The TCP/IP administration utility for use with Windows operating systems.
ipconfig utility
The TCP/IP administration utility for use with Windows operating systems.
route utility
The TCP/IP administration utility for use with Windows operating systems.
host utility
The TCP/IP administration utility for use with Windows operating systems.
ifconfig utility
The TCP/IP administration utility for use with Windows operating systems.
traceroute utility
Allows you to view a host's routing table.
netstat utility
Allows you to view a host's routing table.
nslookup utility
Allows you to view a host's routing table.
nbstat utility
Allows you to view a host's routing table.
dig utility
Allows you to view a host's routing table.
ipconfig utility
Allows you to view a host's routing table.
route utility
Allows you to view a host's routing table.
host utility
Allows you to view a host's routing table.
ifconfig utility
Allows you to view a host's routing table.
traceroute utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
netstat utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
nslookup utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
nbstat utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
dig utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
ipconfig utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
route utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
host utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
ifconfig utility
Uses ICMP ECHO requests to trace the path from one networked node to another, identifying all intermediate hops between the two nodes.
traceroute utility
Used if an administrator already know a host's name and wants to learn its IP address.
netstat utility
Used if an administrator already know a host's name and wants to learn its IP address.
nslookup utility
Used if an administrator already know a host's name and wants to learn its IP address.
nbstat utility
Used if an administrator already know a host's name and wants to learn its IP address.
dig utility
Used if an administrator already know a host's name and wants to learn its IP address.
ipconfig utility
Used if an administrator already know a host's name and wants to learn its IP address.
route utility
Used if an administrator already know a host's name and wants to learn its IP address.
host utility
Used if an administrator already know a host's name and wants to learn its IP address.
ifconfig utility
Used if an administrator already know a host's name and wants to learn its IP address.
traceroute utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
netstat utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
nslookup utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
nbstat utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
dig utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
ipconfig utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
route utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
host utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
ifconfig utility
Allows an administrator to query a DNS database and find the host name associated with a specific IP address or vice versa.
traceroute utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
netstat utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
nslookup utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
nbstat utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
dig utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
ipconfig utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
route utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
host utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
ifconfig utility
Allows an administrator to query the DNS database from any computer on the network and find the host name of a device by specifying its IP address, or vice versa.
traceroute utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
netstat utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
nslookup utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
nbstat utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
dig utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
ipconfig utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
route utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
host utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
ifconfig utility
Displays TCP/IP statistics and details about TCP/IP components and connections on a host.
traceroute utility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.