A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。A.10.10.0.1B.10.10.0.2C.199.99.9.33D.199.99.9.57E.200.2

题目
A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。

A.10.10.0.1

B.10.10.0.2

C.199.99.9.33

D.199.99.9.57

E.200.2.2.17

F.200.2.2.18


相似考题

4.A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone.Which configuration statement would correctly accomplish this task?()A. from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C. from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

参考答案和解析
参考答案:D
更多“A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。 ”相关问题
  • 第1题:

    Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?()

    A.the MAC address of the seiver network interface

    B.the MAC address of host A

    C.the MAC address of router interface e 1

    D.the MAC address of router interface e0


    参考答案:D

  • 第2题:

    What are two characteristics of Server Load Balancing router mode?()

    • A、 The design supports multiple server subnets Cisco 642-874: Practice Exam
    • B、 An end-user sees the IP address of the real server
    • C、 SLB routes between the outside and inside subnets
    • D、 The source or destination MAC address is rewritten, but the IP addresses left alone
    • E、 SLB acts as a "bump in the wire" between servers and upstream firewall or Layer 3 devices

    正确答案:A,D

  • 第3题:

    Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。

    • A、The MAC address of the NIC in Host 1
    • B、The MAC address of the NIC in server 1
    • C、The MAC address of the Fa0/0 interface of router R1
    • D、The MAC address of the s0/0/0 interface of the router R2

    正确答案:C

  • 第4题:

    Which of the following correctly describe steps in the OSI data encapsulation process?()

    • A、Transport layer divides a data stream into segments & adds reliability & flow control information
    • B、Data link layer adds physical source & destination address & an FCS to the segment
    • C、Packets are created when the network layer encapsulate a frame with source & destination host address& protocol related control information
    • D、Packets are created when the network layers adds layers 3 address & control information to a segment
    • E、The presentation layer translated bits into bits into voltages for transmission across the physical link

    正确答案:A,D

  • 第5题:

    The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.0 0.0.0.255 any What is the effect of this access list configuration?()

    • A、permit all packets matching the first three octets of the source address to all destinations
    • B、permit all packet matching the last octet of the destination address and accept all source addresses
    • C、permit all packet matching the host bits in the source address to all destinations
    • D、permit all packet from the third subnet of the network address to all destinations

    正确答案:A

  • 第6题:

    Which destination addresses will be used by Host A to send data to Host C?()

    • A、the IP address of Switch 1
    • B、the MAC address of Switch 1
    • C、the IP address of Host C
    • D、the MAC address of Host C
    • E、the IP address of the router's E0 interface
    • F、the MAC address of the router's E0 interface

    正确答案:C,F

  • 第7题:

    Which of one the following fields is contained within an IEEE Ethernet frame header?()

    • A、source and destination MAC address
    • B、source MAC address and destination network address only
    • C、source and destination network address only
    • D、source network address and destination MAC address
    • E、source and destination MAC address and source and destination network address

    正确答案:A

  • 第8题:

    单选题
    Which configuration command controls the source IP address for packets sent to a RADIUS server?()
    A

    radius override nas-ip-addr

    B

    radius source-ip-address 10.13.7.55

    C

    radius update-source-address 10.13.7.11

    D

    radius authentication server 10.13.7.55


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()
    A

    ermit all packets matching the first three octets of the source address to all destinations

    B

    permit all packet matching the last octet of the destination address and accept all source addresses

    C

    permit all packet matching the host bits in the source address to all destinations

    D

    permit all packet from the third subnet of the network address to all destinations


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    R1 forwards a packet from Host 1 to remote Server 1. Which statement describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1()。
    A

    The frame does not have MAC addresses.

    B

    The source MAC address in the frame is the MAC address of the NIC of Host 1.

    C

    The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.

    D

    The destination MAC address in the frame is the MAC address of the NICof server 1.

    E

    The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2


    正确答案: C
    解析: 暂无解析

  • 第11题:

    多选题
    Which destination addresses will be used by Host A to send data to Host C?()
    A

    the IP address of Switch 1

    B

    the MAC address of Switch 1

    C

    the IP address of Host C

    D

    the MAC address of Host C

    E

    the IP address of the router's E0 interface

    F

    the MAC address of the router's E0 interface


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    单选题
    What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()
    A

    Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.

    B

    Packets are distributed across the ports in the channel based on both the source and destination IP addresses.

    C

    Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.

    D

    Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.


    正确答案: D
    解析: 暂无解析

  • 第13题:

    What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。

    A.permit all packets matching the first three octets of the source address to all destinations

    B.permit all packets matching the last octet of the destination address and accept all source addresses

    C.permit all packets from the third subnet of the network address to all destinations

    D.permit all packets matching the host bits in the source address to all destinations

    E.permit all packets to destinations matching the first three octets in the destination address


    参考答案:A

  • 第14题:

    Which of the following correctly describe steps in the OSI data encapsulation process?()

    • A、The transport layer divides a data stream into segments and may add reliability and flow control information.
    • B、The data link layer adds physical source and destination addresses and an FCS to the segment.
    • C、Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.
    • D、Packets are created when the network layer adds Layer 3 addresses and control information to a segment.
    • E、The presentation layer translates bits into voltages for transmission across the physical link.

    正确答案:A,D

  • 第15题:

    What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()

    • A、Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.
    • B、Packets are distributed across the ports in the channel based on both the source and destination IP addresses.
    • C、Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.
    • D、Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.

    正确答案:B

  • 第16题:

    Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。

    • A、Host 1 addresses the frames to the MAC address of router R1
    • B、Host 1 looks in its ARP cache for the MAC address of router R1
    • C、Host 1 addresses the frames to the MAC address of web server 2
    • D、Host 1 sends the packets to router R1 to be forwarded to web server 2
    • E、Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2

    正确答案:C,E

  • 第17题:

    A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。

    • A、10.10.0.1
    • B、10.10.0.2
    • C、199.99.9.33
    • D、199.99.9.57
    • E、200.2.2.17
    • F、200.2.2.18

    正确答案:D

  • 第18题:

    What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。

    • A、permit all packets matching the first three octets of the source address to all destinations
    • B、permit all packets matching the last octet of the destination address and accept all source addresses
    • C、permit all packets from the third subnet of the network address to all destinations
    • D、permit all packets matching the host bits in the source address to all destinations
    • E、permit all packets to destinations matching the first three octets in the destination address

    正确答案:A

  • 第19题:

    单选题
    A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()
    A

    from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

    B

    from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

    C

    from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }

    D

    from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    What is the effect of the following access list condition?  access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。
    A

    permit all packets matching the first three octets of the source address to all destinations

    B

    permit all packets matching the last octet of the destination address and accept all source addresses

    C

    permit all packets from the third subnet of the network address to all destinations

    D

    permit all packets matching the host bits in the source address to all destinations

    E

    permit all packets to destinations matching the first three octets in the destination address


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。
    A

    The MAC address of the NIC in Host 1

    B

    The MAC address of the NIC in server 1

    C

    The MAC address of the Fa0/0 interface of router R1

    D

    The MAC address of the s0/0/0 interface of the router R2


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。
    A

    10.10.0.1

    B

    10.10.0.2

    C

    199.99.9.33

    D

    199.99.9.57

    E

    200.2.2.17

    F

    200.2.2.18


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。
    A

    Host 1 addresses the frames to the MAC address of router R1

    B

    Host 1 looks in its ARP cache for the MAC address of router R1

    C

    Host 1 addresses the frames to the MAC address of web server 2

    D

    Host 1 sends the packets to router R1 to be forwarded to web server 2

    E

    Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2


    正确答案: E,C
    解析: 暂无解析