网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following will list the destination MAC addresses?()
A
ping
B
dig
C
nbtstat
D
arp
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following will list the destination MAC addresses?()A pingB digC nbtstatD arp” 相关考题
考题
AnadministratorisinchargeofseveralremoteserversinJapan.Userscallandcomplaintheycannotconnecttothecompany’sresourceslocatedonthoseservers.Whichofthefollowingcommandswouldallowtheadministratortoverifytheserversarerunning?()A.pingB.netstatC.nbtstatD.telnet
考题
Which of the following tools allows an administrator to determine the MAC address of another computer?()
A.pingB.arpC.ifconfigD.ipconfig
考题
Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()
A. DHCPB. ARPC. DNSD. RARP
考题
Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?()
A.GatewayB.HubC.BridgeD.Router
考题
Which of one the following fields is contained within an IEEE Ethernet frame header?()
A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address
考题
In GLBP, which router will respond to client ARP requests?()
A.The active virtual gateway will reply with one of four possible virtual MAC addresses.B.All GLBP member routers will reply in round-robin fashion.C.The active virtual gateway will reply with its own hardware MAC address.D.The GLBP member routers will reply with one of four possible burned in hardware addresses
考题
In GLBP, which router will respond to client ARP requests?()A、The active virtual gateway will reply with one of four possible virtual MAC addresses.B、All GLBP member routers will reply in round-robin fashion.C、The active virtual gateway will reply with its own hardware MAC address.D、The GLBP member routers will reply with one of four possible burned in hardware addresses
考题
What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()A、Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.B、Packets are distributed across the ports in the channel based on both the source and destination IP addresses.C、Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.D、Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.
考题
An administrator is in charge of several remote servers in Japan. Users call and complain they cannot connect to the company’s resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running?()A、pingB、netstatC、nbtstatD、telnet
考题
Which of the following tools allows an administrator to determine the MAC address of another computer?()A、pingB、arpC、ifconfigD、ipconfig
考题
What information is used by a switch to forward an Ethernet frame to its destination?()A、IP addressB、destination MAC addressC、ARP table entryD、FCS checksum
考题
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply
考题
Which destination addresses will be used by Host A to send data to Host C?()A、the IP address of Switch 1B、the MAC address of Switch 1C、the IP address of Host CD、the MAC address of Host CE、the IP address of the router's E0 interfaceF、the MAC address of the router's E0 interface
考题
Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address
考题
Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A、RepeaterB、HubC、RouterD、Switch
考题
Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?()A、GatewayB、HubC、BridgeD、Router
考题
Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()A、 DHCPB、 ARPC、 DNSD、 RARP
考题
单选题Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()A
DHCPB
ARPC
DNSD
RARP
考题
单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A
The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B
Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E
The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G
None of the other alternatives apply
考题
单选题Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()A
DHCPB
ARPC
DNSD
RARP
考题
单选题What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()A
Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.B
Packets are distributed across the ports in the channel based on both the source and destination IP addresses.C
Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.D
Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.
考题
单选题Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?()A
GatewayB
HubC
BridgeD
Router
考题
单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()A
source and destination MAC addressB
source MAC address and destination network address onlyC
source and destination network address onlyD
source network address and destination MAC addressE
source and destination MAC address and source and destination network address
考题
单选题Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A
RepeaterB
HubC
RouterD
Switch
考题
单选题In GLBP, which router will respond to client ARP requests?()A
The active virtual gateway will reply with one of four possible virtual MAC addresses.B
All GLBP member routers will reply in round-robin fashion.C
The active virtual gateway will reply with its own hardware MAC address.D
The GLBP member routers will reply with one of four possible burned in hardware addresses
考题
单选题Which of the following will list the destination MAC addresses?()A
pingB
digC
nbtstatD
arp
热门标签
最新试卷