网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Which one of these is a valid HSRP Virtual Mac Address?()

A.0000.0C07.AC15

B.0000.5E00.01A3

C.0007.B400.AE01

D.0007.5E00.B301


参考答案

更多 “ Which one of these is a valid HSRP Virtual Mac Address?() A.0000.0C07.AC15B.0000.5E00.01A3C.0007.B400.AE01D.0007.5E00.B301 ” 相关考题
考题 is a six bytes OSI layer 2 address which is burned into every networking device that provides its unique identity for point to point communication。A.The virtual addressB.The subnet addressC.The MAC addressD.The IP address

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?() A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address

考题 In GLBP, which router will respond to client ARP requests?() A.The active virtual gateway will reply with one of four possible virtual MAC addresses.B.All GLBP member routers will reply in round-robin fashion.C.The active virtual gateway will reply with its own hardware MAC address.D.The GLBP member routers will reply with one of four possible burned in hardware addresses

考题 In GLBP, which router will respond to client ARP requests?()A、The active virtual gateway will reply with one of four possible virtual MAC addresses.B、All GLBP member routers will reply in round-robin fashion.C、The active virtual gateway will reply with its own hardware MAC address.D、The GLBP member routers will reply with one of four possible burned in hardware addresses

考题 Which three statements about HSRP operation are true?()A、The virtual IP address and virtual MA+K44C address are active on the HSRP Master router.B、The HSRP default timers are a 3 second hello interval and a 10 second dead interval.C、HSRP supports only clear-text authentication.D、The HSRP virtual IP address must be on a different subnet than the routers' interfaces on the same LAN.E、The HSRP virtual IP address must be the same as one of the router's interface addresses on the LAN.F、HSRP supports up to 255 groups per interface, enabling an administrative form of load balancing.

考题 HSRP has been configured between two Company devices.  Which of the following describe  reasons for deploying HSRP? ()A、 HSRP provides redundancy and fault toleranceB、 HSRP allows one router to automatically assume the function of the second router if the second  router failsC、 HSRP allows one router to automatically assume the function of the second router if the second  router startsD、 HSRP provides redundancy and load balancing

考题 When HSRP is configured on a network, which two of these items are provided, which are shared between the routers that run HSRP ?() (choose two)A、Shared single interfaceB、IP AddressC、TCP-based hello packetsD、MAC address

考题 Router R1 is configured for HSRP.  Which of the following are valid HSRP states on R1? ()A、 InitB、 IdleC、 ActiveD、 StandbyE、 EstablishedF、 Backup

考题 All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A、The wireless access point is using MAC address filteringB、The user has connected to a nearby wireless access point from another officeC、The user has configured the wireless settings with the wrong encryption typeD、The wireless access point has SSID broadcast disabled

考题 You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply

考题 You have just configured HSRP group 10 in vour network, Which MAC address will your default gateway use? ()A、0000.5E00.010aB、0000.0c07.ac0aC、0000.0c07.0110D、000.0cac.070a

考题 In the hardware address 0000.0c07.ac0av,  what does 07.ac represent? ()A、 HSRP well-known physical MAC addressB、 Vendor codeC、 HSRP router numberD、 HSRP group numberE、 HSRP well-known virtual MAC address

考题 Which three statements are true about DAI?()A、DAI intercept all ARP packets on untrusted portsB、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.C、DAI is used to prevent against a DHCP Snooping attack.D、DAI forwards all ARP packets received on a trusted interface without any checks.E、DAI forwards all ARP packets on untrusted ports.F、DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address

考题 Which one of these is a valid HSRP Virtual Mac Address?()A、0000.0C07.AC15B、0000.5E00.01A3C、0007.B400.AE01D、0007.5E00.B301

考题 When creating a Virtual Ethernet adapter, which of the following steps is done FIRST?()A、Generate a unique MAC address.B、Run cfgmgr to create device special files.C、Create a virtual device with "smitty vlan".D、Add a virtual Ethernet adapter to the partition profile.

考题 单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G None of the other alternatives apply

考题 单选题In the hardware address 0000.0c07.ac0av,  what does 07.ac represent? ()A  HSRP well-known physical MAC addressB  Vendor codeC  HSRP router numberD  HSRP group numberE  HSRP well-known virtual MAC address

考题 多选题When HSRP is configured on a network, which two of these items are provided, which are shared between the routers that run HSRP ?() (choose two)AShared single interfaceBIP AddressCTCP-based hello packetsDMAC address

考题 单选题When creating a Virtual Ethernet adapter, which of the following steps is done FIRST?()A Generate a unique MAC address.B Run cfgmgr to create device special files.C Create a virtual device with smitty vlan.D Add a virtual Ethernet adapter to the partition profile.

考题 多选题Which three statements about HSRP operation are true?()AThe virtual IP address and virtual MA+K44C address are active on the HSRP Master router.BThe HSRP default timers are a 3 second hello interval and a 10 second dead interval.CHSRP supports only clear-text authentication.DThe HSRP virtual IP address must be on a different subnet than the routers' interfaces on the same LAN.EThe HSRP virtual IP address must be the same as one of the router's interface addresses on the LAN.FHSRP supports up to 255 groups per interface, enabling an administrative form of load balancing.

考题 单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()A source and destination MAC addressB source MAC address and destination network address onlyC source and destination network address onlyD source network address and destination MAC addressE source and destination MAC address and source and destination network address

考题 多选题Which three statements are true about DAI?()ADAI intercept all ARP packets on untrusted portsBDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.CDAI is used to prevent against a DHCP Snooping attack.DDAI forwards all ARP packets received on a trusted interface without any checks.EDAI forwards all ARP packets on untrusted ports.FDAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.

考题 单选题All users within an office are wirelessly connected to a network, except one user that has a valid connection on a leased IP address in a different range. Which of the following is a possible cause of the user having a different IP address range?()A The wireless access point is using MAC address filteringB The user has connected to a nearby wireless access point from another officeC The user has configured the wireless settings with the wrong encryption typeD The wireless access point has SSID broadcast disabled

考题 单选题In GLBP, which router will respond to client ARP requests?()A The active virtual gateway will reply with one of four possible virtual MAC addresses.B All GLBP member routers will reply in round-robin fashion.C The active virtual gateway will reply with its own hardware MAC address.D The GLBP member routers will reply with one of four possible burned in hardware addresses

考题 多选题Router R1 is configured for HSRP.  Which of the following are valid HSRP states on R1? ()AInitBIdleCActiveDStandbyEEstablishedFBackup

考题 多选题Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()ARouter A is responsible for answering ARP requests sent to the virtual IP address.BIf Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router ACIf another router were added to this GLBP group, there would be two backup AVGsDRouter B is in GLBP listen state.ERouter A alternately responds to ARP requests with different virtual MAC addresses.FRouter B will transition from blocking state to forwarding state when it becomes the AVG