参考答案和解析
正确答案: A
解析: 暂无解析
更多“单选题Which of the following will list the destination MAC addresses?()A pingB digC nbtstatD arp”相关问题
  • 第1题:

    Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?()

    A.Gateway

    B.Hub

    C.Bridge

    D.Router


    参考答案:C

  • 第2题:

    In GLBP, which router will respond to client ARP requests?()

    A.The active virtual gateway will reply with one of four possible virtual MAC addresses.

    B.All GLBP member routers will reply in round-robin fashion.

    C.The active virtual gateway will reply with its own hardware MAC address.

    D.The GLBP member routers will reply with one of four possible burned in hardware addresses


    参考答案:A

  • 第3题:

    What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()

    • A、Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.
    • B、Packets are distributed across the ports in the channel based on both the source and destination IP addresses.
    • C、Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.
    • D、Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.

    正确答案:B

  • 第4题:

    Which of the following tools allows an administrator to determine the MAC address of another computer?()

    • A、ping
    • B、arp
    • C、ifconfig
    • D、ipconfig

    正确答案:B

  • 第5题:

    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()

    • A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
    • D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
    • E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • G、None of the other alternatives apply

    正确答案:F

  • 第6题:

    Which of one the following fields is contained within an IEEE Ethernet frame header?()

    • A、source and destination MAC address
    • B、source MAC address and destination network address only
    • C、source and destination network address only
    • D、source network address and destination MAC address
    • E、source and destination MAC address and source and destination network address

    正确答案:A

  • 第7题:

    Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?()

    • A、Gateway
    • B、Hub
    • C、Bridge
    • D、Router

    正确答案:C

  • 第8题:

    Which of the following will list the destination MAC addresses?()

    • A、ping
    • B、dig
    • C、nbtstat
    • D、arp

    正确答案:D

  • 第9题:

    单选题
    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()
    A

    The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

    B

    Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

    C

    The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.

    D

    The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.

    E

    The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

    F

    Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

    G

    None of the other alternatives apply


    正确答案: G
    解析: 暂无解析

  • 第10题:

    单选题
    What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()
    A

    Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.

    B

    Packets are distributed across the ports in the channel based on both the source and destination IP addresses.

    C

    Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.

    D

    Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which of one the following fields is contained within an IEEE Ethernet frame header?()
    A

    source and destination MAC address

    B

    source MAC address and destination network address only

    C

    source and destination network address only

    D

    source network address and destination MAC address

    E

    source and destination MAC address and source and destination network address


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    In GLBP, which router will respond to client ARP requests?()
    A

    The active virtual gateway will reply with one of four possible virtual MAC addresses.

    B

    All GLBP member routers will reply in round-robin fashion.

    C

    The active virtual gateway will reply with its own hardware MAC address.

    D

    The GLBP member routers will reply with one of four possible burned in hardware addresses


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which of one the following fields is contained within an IEEE Ethernet frame header?()

    A. source and destination MAC address

    B. source MAC address and destination network address only

    C. source and destination network address only

    D. source network address and destination MAC address

    E. source and destination MAC address and source and destination network address


    参考答案:A

  • 第14题:

    In GLBP, which router will respond to client ARP requests?()

    • A、The active virtual gateway will reply with one of four possible virtual MAC addresses.
    • B、All GLBP member routers will reply in round-robin fashion.
    • C、The active virtual gateway will reply with its own hardware MAC address.
    • D、The GLBP member routers will reply with one of four possible burned in hardware addresses

    正确答案:A

  • 第15题:

    An administrator is in charge of several remote servers in Japan. Users call and complain they cannot connect to the company’s resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running?()

    • A、ping
    • B、netstat
    • C、nbtstat
    • D、telnet

    正确答案:A

  • 第16题:

    What information is used by a switch to forward an Ethernet frame to its destination?()

    • A、IP address
    • B、destination MAC address
    • C、ARP table entry
    • D、FCS checksum

    正确答案:B

  • 第17题:

    Which destination addresses will be used by Host A to send data to Host C?()

    • A、the IP address of Switch 1
    • B、the MAC address of Switch 1
    • C、the IP address of Host C
    • D、the MAC address of Host C
    • E、the IP address of the router's E0 interface
    • F、the MAC address of the router's E0 interface

    正确答案:C,F

  • 第18题:

    Which of the following devices is used to move frames between a source and destination basedon a MAC address?()

    • A、Repeater
    • B、Hub
    • C、Router
    • D、Switch

    正确答案:D

  • 第19题:

    Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()

    • A、 DHCP
    • B、 ARP
    • C、 DNS
    • D、 RARP

    正确答案:B

  • 第20题:

    单选题
    Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()
    A

     DHCP

    B

     ARP

    C

     DNS

    D

     RARP


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()
    A

    DHCP

    B

    ARP

    C

    DNS

    D

    RARP


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?()
    A

    Gateway

    B

    Hub

    C

    Bridge

    D

    Router


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following devices is used to move frames between a source and destination basedon a MAC address?()
    A

    Repeater

    B

    Hub

    C

    Router

    D

    Switch


    正确答案: D
    解析: 暂无解析