A.the MAC address of the seiver network interface
B.the MAC address of host A
C.the MAC address of router interface e 1
D.the MAC address of router interface e0
第1题:
A. Drop the data.
B. Send the data frames to the default gateway.
C. Create an ARP request to get a MAC address for the receiving host.
D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.
第2题:
A.The switch will not forward unicast frames.
B.The switch will forward the frame to a specific port.
C.The switch will return a copy of the frame out the source port.
D.The switch will remove the destination MAC from the switch table.
E.The switch will forward the frame to all ports except the port on which it was received.
第3题:
第4题:
Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。
第5题:
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()
第6题:
What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()
第7题:
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
第8题:
Select the action that results from executing these commands.()Switch(config-if)# switchport port-securitySwitch(config-if)# switchport port-security mac-address sticky
第9题:
The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
None of the other alternatives apply
第10题:
The MAC address of the NIC in Host 1
The MAC address of the NIC in server 1
The MAC address of the Fa0/0 interface of router R1
The MAC address of the s0/0/0 interface of the router R2
第11题:
The switch will not forward unicast frames.
The switch will forward the frame to a specific port.
The switch will return a copy of the frame out the source port.
The switch will remove the destination MAC from the switch table.
The switch will forward the frame to all ports except the port on which it was received.
第12题:
Host 1 addresses the frames to the MAC address of router R1
Host 1 looks in its ARP cache for the MAC address of router R1
Host 1 addresses the frames to the MAC address of web server 2
Host 1 sends the packets to router R1 to be forwarded to web server 2
Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2
第13题:
A.Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965.
B.Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1.
C.Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320.
D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1.
E.Router1 will forward the data packet out interface FastEthernet0/1.
F.Router1 will forward the data packet out interface FastEthernet0/2.
第14题:
A.The IP address for Server A is a broadcast address.
B.The IP address for Workstation B is a subnet address.
C.The gateway for Workstation B is not on the same subnet.
D.The gateway for Server A is not on the same subnet.
第15题:
Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。
第16题:
A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()
第17题:
What does a Layer 2 switch use to decide where to forward a received frame?()
第18题:
Which statement about vlan operation on cisco catalyst switches is true?()
第19题:
A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()
第20题:
Which of the following devices is used to move frames between a source and destination basedon a MAC address?()
第21题:
Drop the data.
Send the data frames to the default gateway.
Create an ARP request to get a MAC address for the receiving host.
Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.
第22题:
The frame does not have MAC addresses.
The source MAC address in the frame is the MAC address of the NIC of Host 1.
The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.
The destination MAC address in the frame is the MAC address of the NICof server 1.
The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2
第23题:
Configure port Fa0/1 to accept connections only from the static IP address of the server.
Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.
Configure the MAC address of the server as a static entry associated with port Fa0/1.
Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.
Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.
Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.