网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following devices is used to move frames between a source and destination basedon a MAC address?()
A
Repeater
B
Hub
C
Router
D
Switch
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A RepeaterB HubC RouterD Switch” 相关考题
考题
A layer 3 switch can move packets between subnets based on which of the following criteria?()
A. 802.1q tagB. PortC. ApplicationD. IP address
考题
Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()
A.SwitchB.HubC.ModemD.Repeater
考题
Which of one the following fields is contained within an IEEE Ethernet frame header?()
A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address
考题
What does a Layer 2 switch use to decide where to forward a received frame?()
A. source MAC addressB. source IP addressC. source switch portD. destination IP addressE. destination port addressF. destination MAC address
考题
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()
A. source portB. output interfaceC. next-hop IP addressD. source MAC addressE. destination IP addressF. next-hop MAC address
考题
Which destination addresses will be used by Host A to send data to Host C?()
A.the IP address of Switch 1B.the MAC address of Switch 1C.the IP address of Host CD.the MAC address of Host CE.the IP address of the router‘s E0 interfaceF.the MAC address of the router‘s E0 interface
考题
For which type of connection should a straight-through cable be used?()
A.switch to switchB.switch to hubC.switch to routerD.hub to hubE.router to PC
考题
What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。
A.The switch will not forward unicast frames.B.The switch will forward the frame to a specific port.C.The switch will return a copy of the frame out the source port.D.The switch will remove the destination MAC from the switch table.E.The switch will forward the frame to all ports except the port on which it was received.
考题
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and destination MAC address
考题
For which type of connection should a straight-through cable be used?()A、switch to switchB、switch to hubC、switch to routerD、hub to hubE、router to PC
考题
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()A、source portB、output interfaceC、next-hop IP addressD、source MAC addressE、destination IP addressF、next-hop MAC address
考题
The EtherChannel between your LAN switch and the Internet router is not load-balancing efficiently. On the switch,there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing? ()A、source IP addressB、destination IP addressC、per-packet load balanceD、destination MAC addressE、source MAC address
考题
Which two statements are true regarding an Ethernet collision domain?()A、If a switch is used, the collision domain is limited to each device and the switchB、If a hub is used, the collision domain is limited to each device and the hubC、If a hub is used, the collision domain includes all devices connected to the hubD、If a switch is used, the collision domain includes all devices connected to the switch
考题
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply
考题
What does a Layer 2 switch use to decide where to forward a received frame?()A、source MAC addressB、source IP addressC、source switch portD、destination IP addressE、destination port addressF、destination MAC address
考题
What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()A、The switch will not forward unicast frames.B、The switch will forward the frame to a specific port.C、The switch will return a copy of the frame out the source port.D、The switch will remove the destination MAC from the switch table.E、The switch will forward the frame to all ports except the port on which it was received.
考题
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address
考题
Which destination addresses will be used by Host A to send data to Host C?()A、the IP address of Switch 1B、the MAC address of Switch 1C、the IP address of Host CD、the MAC address of Host CE、the IP address of the router's E0 interfaceF、the MAC address of the router's E0 interface
考题
Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address
考题
Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A、SwitchB、HubC、ModemD、Repeater
考题
Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A、RepeaterB、HubC、RouterD、Switch
考题
A layer 3 switch can move packets between subnets based on which of the following criteria?()A、802.1q tagB、PortC、ApplicationD、IP address
考题
单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A
The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B
Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E
The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G
None of the other alternatives apply
考题
单选题What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()A
The switch will not forward unicast frames.B
The switch will forward the frame to a specific port.C
The switch will return a copy of the frame out the source port.D
The switch will remove the destination MAC from the switch table.E
The switch will forward the frame to all ports except the port on which it was received.
考题
单选题Which of the following descriptions about IP spoofing is correct?()A
IP source address is forgedB
IP destination address is forgedC
IP TCP source port is forgedD
IP TCP destination port is forgedE
None of above
考题
单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()A
source and destination MAC addressB
source MAC address and destination network address onlyC
source and destination network address onlyD
source network address and destination MAC addressE
source and destination MAC address and source and destination network address
考题
单选题A layer 3 switch can move packets between subnets based on which of the following criteria?()A
802.1q tagB
PortC
ApplicationD
IP address
热门标签
最新试卷