A. The frame is dropped.
B. The frame is addressed with a broadcast MAC address and sent out all ports.
C. The frame is sent out all ports except the receiving port.
D. An ARP request is sent out all ports except the receiving port.
E. A destination unreachable message is sent back to the source address.
F. None of the above.
第1题:
A.source MAC address
B.source IP address
C.source switch port
D.destination IP address
E.destination port address
F.destination MAC address
第2题:
A.The switch will not forward unicast frames.
B.The switch will forward the frame to a specific port.
C.The switch will return a copy of the frame out the source port.
D.The switch will remove the destination MAC from the switch table.
E.The switch will forward the frame to all ports except the port on which it was received.
第3题:
What dose a Layer 2 switch use to decide where to forward a received frame?()
第4题:
What information is used by a switch to forward an Ethernet frame to its destination?()
第5题:
What does a Layer 2 switch use to decide where to forward a received frame?()
第6题:
How does a switch respond when it receives a message?()
第7题:
If the router R1 has a packet with a destination address 192.168.1.255, what describes the operation of the network()。
第8题:
What does a Layer 2 switch do if it receives a frame with a destination MAC address that is not found in its MAC address table?()
第9题:
IP address
destination MAC address
ARP table entry
FCS checksum
第10题:
source MAC address
source IP address
source switch port
destination IP address
destination port address
destination MAC address
第11题:
The switch will not forward unicast frames.
The switch will forward the frame to a specific port.
The switch will return a copy of the frame out the source port.
The switch will remove the destination MAC from the switch table.
The switch will forward the frame to all ports except the port on which it was received.
第12题:
protocol
VLAN number
TCP or UDP port numbers
source switch port number
source IP address and destination IP address
source MAC address and destination MAC address
第13题:
A.Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965.
B.Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1.
C.Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320.
D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1.
E.Router1 will forward the data packet out interface FastEthernet0/1.
F.Router1 will forward the data packet out interface FastEthernet0/2.
第14题:
A.protocol
B.VLAN number
C.TCP or UDP port numbers
D.source switch port number
E.source IP address and destination IP address
F.source MAC address and destination MAC address
第15题:
During the IPv6 autoconfiguration, what does the device append to the 64- bit prefix that it receives from the router to create its IPv6 address?()
第16题:
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()
第17题:
What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()
第18题:
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
第19题:
Which of one the following fields is contained within an IEEE Ethernet frame header?()
第20题:
The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
None of the other alternatives apply
第21题:
source and destination MAC address
source MAC address and destination network address only
source and destination network address only
source network address and destination MAC address
source and destination MAC address and source and destination network address
第22题:
The frame does not have MAC addresses.
The source MAC address in the frame is the MAC address of the NIC of Host 1.
The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.
The destination MAC address in the frame is the MAC address of the NICof server 1.
The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2
第23题:
It reads the Layer-5 information and sends the message directly to the intended computer.
It reads the Media Access Control (MAC) address and broadcasts the message to all the computers that are connected to the switch.
It reads the Media Access Control (MAC) address and sends the message directly to the intended computer.
It reads the Layer-5 information and broadcasts the message to all the computers that are connected to the switch.
第24题:
source MAC address
source IP address
source switch port
destination IP address
destination port address
destination MAC address