网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which one of these is a valid HSRP Virtual Mac Address?()
A.0000.0C07.AC15
B.0000.5E00.01A3
C.0007.B400.AE01
D.0007.5E00.B301
参考答案
更多 “ Which one of these is a valid HSRP Virtual Mac Address?() A.0000.0C07.AC15B.0000.5E00.01A3C.0007.B400.AE01D.0007.5E00.B301 ” 相关考题
考题
is a six bytes OSI layer 2 address which is burned into every networking device that provides its unique identity for point to point communication。A.The virtual addressB.The subnet addressC.The MAC addressD.The IP address
考题
Which of one the following fields is contained within an IEEE Ethernet frame header?()
A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address
考题
In GLBP, which router will respond to client ARP requests?()
A.The active virtual gateway will reply with one of four possible virtual MAC addresses.B.All GLBP member routers will reply in round-robin fashion.C.The active virtual gateway will reply with its own hardware MAC address.D.The GLBP member routers will reply with one of four possible burned in hardware addresses
考题
In GLBP, which router will respond to client ARP requests?()A、The active virtual gateway will reply with one of four possible virtual MAC addresses.B、All GLBP member routers will reply in round-robin fashion.C、The active virtual gateway will reply with its own hardware MAC address.D、The GLBP member routers will reply with one of four possible burned in hardware addresses
考题
Which three statements about HSRP operation are true?()A、The virtual IP address and virtual MA+K44C address are active on the HSRP Master router.B、The HSRP default timers are a 3 second hello interval and a 10 second dead interval.C、HSRP supports only clear-text authentication.D、The HSRP virtual IP address must be on a different subnet than the routers' interfaces on the same LAN.E、The HSRP virtual IP address must be the same as one of the router's interface addresses on the LAN.F、HSRP supports up to 255 groups per interface, enabling an administrative form of load balancing.
考题
HSRP has been configured between two Company devices. Which of the following describe reasons for deploying HSRP? ()A、 HSRP provides redundancy and fault toleranceB、 HSRP allows one router to automatically assume the function of the second router if the second router failsC、 HSRP allows one router to automatically assume the function of the second router if the second router startsD、 HSRP provides redundancy and load balancing
考题
When HSRP is configured on a network, which two of these items are provided, which are shared between the routers that run HSRP ?() (choose two)A、Shared single interfaceB、IP AddressC、TCP-based hello packetsD、MAC address
考题
Router R1 is configured for HSRP. Which of the following are valid HSRP states on R1? ()A、 InitB、 IdleC、 ActiveD、 StandbyE、 EstablishedF、 Backup
考题
All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled
考题
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply
考题
You have just configured HSRP group 10 in vour network, Which MAC address will your default gateway use? ()A、0000.5E00.010aB、0000.0c07.ac0aC、0000.0c07.0110D、000.0cac.070a
考题
In the hardware address 0000.0c07.ac0av, what does 07.ac represent? ()A、 HSRP well-known physical MAC addressB、 Vendor codeC、 HSRP router numberD、 HSRP group numberE、 HSRP well-known virtual MAC address
考题
Which three statements are true about DAI?()A、DAI intercept all ARP packets on untrusted portsB、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.C、DAI is used to prevent against a DHCP Snooping attack.D、DAI forwards all ARP packets received on a trusted interface without any checks.E、DAI forwards all ARP packets on untrusted ports.F、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.
考题
Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address
考题
Which one of these is a valid HSRP Virtual Mac Address?()A、0000.0C07.AC15B、0000.5E00.01A3C、0007.B400.AE01D、0007.5E00.B301
考题
When creating a Virtual Ethernet adapter, which of the following steps is done FIRST?()A、Generate a unique MAC address.B、Run cfgmgr to create device special files.C、Create a virtual device with "smitty vlan".D、Add a virtual Ethernet adapter to the partition profile.
考题
单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A
The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B
Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E
The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G
None of the other alternatives apply
考题
单选题In the hardware address 0000.0c07.ac0av, what does 07.ac represent? ()A
HSRP well-known physical MAC addressB
Vendor codeC
HSRP router numberD
HSRP group numberE
HSRP well-known virtual MAC address
考题
多选题When HSRP is configured on a network, which two of these items are provided, which are shared between the routers that run HSRP ?() (choose two)AShared single interfaceBIP AddressCTCP-based hello packetsDMAC address
考题
单选题When creating a Virtual Ethernet adapter, which of the following steps is done FIRST?()A
Generate a unique MAC address.B
Run cfgmgr to create device special files.C
Create a virtual device with smitty vlan.D
Add a virtual Ethernet adapter to the partition profile.
考题
多选题Which three statements about HSRP operation are true?()AThe virtual IP address and virtual MA+K44C address are active on the HSRP Master router.BThe HSRP default timers are a 3 second hello interval and a 10 second dead interval.CHSRP supports only clear-text authentication.DThe HSRP virtual IP address must be on a different subnet than the routers' interfaces on the same LAN.EThe HSRP virtual IP address must be the same as one of the router's interface addresses on the LAN.FHSRP supports up to 255 groups per interface, enabling an administrative form of load balancing.
考题
单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()A
source and destination MAC addressB
source MAC address and destination network address onlyC
source and destination network address onlyD
source network address and destination MAC addressE
source and destination MAC address and source and destination network address
考题
多选题Which three statements are true about DAI?()ADAI intercept all ARP packets on untrusted portsBDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.CDAI is used to prevent against a DHCP Snooping attack.DDAI forwards all ARP packets received on a trusted interface without any checks.EDAI forwards all ARP packets on untrusted ports.FDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.
考题
单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A
The wireless access point is using MAC address filteringB
The user has connected to a nearby wireless access point from another officeC
The user has configured the wireless settings with the wrong encryption typeD
The wireless access point has SSID broadcast disabled
考题
单选题In GLBP, which router will respond to client ARP requests?()A
The active virtual gateway will reply with one of four possible virtual MAC addresses.B
All GLBP member routers will reply in round-robin fashion.C
The active virtual gateway will reply with its own hardware MAC address.D
The GLBP member routers will reply with one of four possible burned in hardware addresses
考题
多选题Router R1 is configured for HSRP. Which of the following are valid HSRP states on R1? ()AInitBIdleCActiveDStandbyEEstablishedFBackup
考题
多选题Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()ARouter A is responsible for answering ARP requests sent to the virtual IP address.BIf Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router ACIf another router were added to this GLBP group, there would be two backup AVGsDRouter B is in GLBP listen state.ERouter A alternately responds to ARP requests with different virtual MAC addresses.FRouter B will transition from blocking state to forwarding state when it becomes the AVG
热门标签
最新试卷