Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?()A.the MAC address of the seiver network interfaceB.the MAC address of host AC.the MAC address of router in

题目
Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?()

A.the MAC address of the seiver network interface

B.the MAC address of host A

C.the MAC address of router interface e 1

D.the MAC address of router interface e0


相似考题
更多“Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?() ”相关问题
  • 第1题:

    A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()

    A. Drop the data.

    B. Send the data frames to the default gateway.

    C. Create an ARP request to get a MAC address for the receiving host.

    D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.


    参考答案:C

  • 第2题:

    What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。

    A.The switch will not forward unicast frames.

    B.The switch will forward the frame to a specific port.

    C.The switch will return a copy of the frame out the source port.

    D.The switch will remove the destination MAC from the switch table.

    E.The switch will forward the frame to all ports except the port on which it was received.


    参考答案:B

  • 第3题:

    Typically,an IP address refers to an individual host on a particular network. IP also accommodates addresses that refer to a group of hosts on one or more networks.Such addresses are referred to as multicast addresses,and the act of sending a packet from a source to the members of a (71)group is referred to as multicasting. Multicasting done (72) the scope of a single LAN segment is straight forward. IEEE 802 and other LAN protocols include provision for MAC-level multicast addresses. A packet with a multicast address is transmitted on a LAN segment.Those stations that are members of the (73)multicast group recognize the multicast address and (74)the packet.In this case,only a single copy of the packet is ever transmitted.This technique works because of the (本题)nature of a LAN:A transmission from any one station is received by all other stations on the LAN.


    A .multicast
    B. unicast
    C.broadcast
    D.multiple unicast

    答案:C
    解析:

  • 第4题:

    Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。

    • A、Host 1 addresses the frames to the MAC address of router R1
    • B、Host 1 looks in its ARP cache for the MAC address of router R1
    • C、Host 1 addresses the frames to the MAC address of web server 2
    • D、Host 1 sends the packets to router R1 to be forwarded to web server 2
    • E、Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2

    正确答案:C,E

  • 第5题:

    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()

    • A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
    • D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
    • E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • G、None of the other alternatives apply

    正确答案:F

  • 第6题:

    What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()

    • A、The switch will not forward unicast frames.
    • B、The switch will forward the frame to a specific port.
    • C、The switch will return a copy of the frame out the source port.
    • D、The switch will remove the destination MAC from the switch table.
    • E、The switch will forward the frame to all ports except the port on which it was received.

    正确答案:B

  • 第7题:

    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

    • A、protocol
    • B、VLAN number
    • C、TCP or UDP port numbers
    • D、source switch port number
    • E、source IP address and destination IP address
    • F、source MAC address and destination MAC address

    正确答案:A,C,E

  • 第8题:

    Select the action that results from executing these commands.()Switch(config-if)# switchport port-securitySwitch(config-if)# switchport port-security mac-address sticky

    • A、A dynamically learned MAC address is saved in the startup-configuration file.
    • B、A dynamically learned MAC address is saved in the running-configuration file.
    • C、A dynamically learned MAC address is saved in the VLAN database.
    • D、Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.
    • E、Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.

    正确答案:B

  • 第9题:

    单选题
    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()
    A

    The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

    B

    Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

    C

    The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.

    D

    The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.

    E

    The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

    F

    Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

    G

    None of the other alternatives apply


    正确答案: G
    解析: 暂无解析

  • 第10题:

    单选题
    Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。
    A

    The MAC address of the NIC in Host 1

    B

    The MAC address of the NIC in server 1

    C

    The MAC address of the Fa0/0 interface of router R1

    D

    The MAC address of the s0/0/0 interface of the router R2


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。
    A

    The switch will not forward unicast frames.

    B

    The switch will forward the frame to a specific port.

    C

    The switch will return a copy of the frame out the source port.

    D

    The switch will remove the destination MAC from the switch table.

    E

    The switch will forward the frame to all ports except the port on which it was received.


    正确答案: E
    解析: 暂无解析

  • 第12题:

    多选题
    Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。
    A

    Host 1 addresses the frames to the MAC address of router R1

    B

    Host 1 looks in its ARP cache for the MAC address of router R1

    C

    Host 1 addresses the frames to the MAC address of web server 2

    D

    Host 1 sends the packets to router R1 to be forwarded to web server 2

    E

    Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2


    正确答案: E,C
    解析: 暂无解析

  • 第13题:

    Refer to the exhibit. What will Router1 do when it receives the data frame shown?()

    A.Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965.

    B.Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1.

    C.Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320.

    D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1.

    E.Router1 will forward the data packet out interface FastEthernet0/1.

    F.Router1 will forward the data packet out interface FastEthernet0/2.


    参考答案:A, C, F

  • 第14题:

    Refer to the exhibit. The user at Workstation B reports that Server A cannot be reacheD.What ispreventing Workstation B from reaching Server A?()

    A.The IP address for Server A is a broadcast address.

    B.The IP address for Workstation B is a subnet address.

    C.The gateway for Workstation B is not on the same subnet.

    D.The gateway for Server A is not on the same subnet.


    参考答案:D

  • 第15题:

    Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。

    • A、The MAC address of the NIC in Host 1
    • B、The MAC address of the NIC in server 1
    • C、The MAC address of the Fa0/0 interface of router R1
    • D、The MAC address of the s0/0/0 interface of the router R2

    正确答案:C

  • 第16题:

    A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()

    • A、from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
    • B、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
    • C、from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }
    • D、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

    正确答案:B

  • 第17题:

    What does a Layer 2 switch use to decide where to forward a received frame?()

    • A、source MAC address
    • B、source IP address
    • C、source switch port
    • D、destination IP address
    • E、destination port address
    • F、destination MAC address

    正确答案:F

  • 第18题:

    Which statement about vlan operation on cisco catalyst switches is true?()

    • A、when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table.
    • B、unkown unicast frames are retransmitted only to the ports that belong to the same vlan
    • C、ports between switches should be configured in access mode so that vlans can span across the ports
    • D、broadcast and multicast frames are retransmitted to ports that are configured on different vlan.

    正确答案:B

  • 第19题:

    A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()

    • A、Configure port Fa0/1 to accept connections only from the static IP address of the server.
    • B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
    • C、Configure the MAC address of the server as a static entry associated with port Fa0/1.
    • D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
    • E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
    • F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

    正确答案:C,E

  • 第20题:

    Which of the following devices is used to move frames between a source and destination basedon a MAC address?()

    • A、Repeater
    • B、Hub
    • C、Router
    • D、Switch

    正确答案:D

  • 第21题:

    单选题
    A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()
    A

    Drop the data.

    B

    Send the data frames to the default gateway.

    C

    Create an ARP request to get a MAC address for the receiving host.

    D

    Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    R1 forwards a packet from Host 1 to remote Server 1. Which statement describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1()。
    A

    The frame does not have MAC addresses.

    B

    The source MAC address in the frame is the MAC address of the NIC of Host 1.

    C

    The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.

    D

    The destination MAC address in the frame is the MAC address of the NICof server 1.

    E

    The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server onlinE.What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? ()
    A

    Configure port Fa0/1 to accept connections only from the static IP address of the server.

    B

    Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.

    C

    Configure the MAC address of the server as a static entry associated with port Fa0/1.

    D

    Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.

    E

    Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.

    F

    Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.


    正确答案: D,C
    解析: 暂无解析