What does a Layer 2 switch do if it receives a frame with a destination MAC address that is not found in its MAC address table?()A. The frame is dropped.B. The frame is addressed with a broadcast MAC address and sent out all ports.C. The frame is sent out

题目
What does a Layer 2 switch do if it receives a frame with a destination MAC address that is not found in its MAC address table?()

A. The frame is dropped.

B. The frame is addressed with a broadcast MAC address and sent out all ports.

C. The frame is sent out all ports except the receiving port.

D. An ARP request is sent out all ports except the receiving port.

E. A destination unreachable message is sent back to the source address.

F. None of the above.


相似考题
更多“What does a Layer 2 switch do if it receives a frame with a destination MAC address that is not found in its MAC address table?() ”相关问题
  • 第1题:

    What dose a Layer 2 switch use to decide where to forward a received frame?()

    A.source MAC address

    B.source IP address

    C.source switch port

    D.destination IP address

    E.destination port address

    F.destination MAC address


    参考答案:F

  • 第2题:

    What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。

    A.The switch will not forward unicast frames.

    B.The switch will forward the frame to a specific port.

    C.The switch will return a copy of the frame out the source port.

    D.The switch will remove the destination MAC from the switch table.

    E.The switch will forward the frame to all ports except the port on which it was received.


    参考答案:B

  • 第3题:

    What dose a Layer 2 switch use to decide where to forward a received frame?()

    • A、source MAC address
    • B、source IP address
    • C、source switch port
    • D、destination IP address
    • E、destination port address
    • F、destination MAC address

    正确答案:F

  • 第4题:

    What information is used by a switch to forward an Ethernet frame to its destination?()

    • A、IP address
    • B、destination MAC address
    • C、ARP table entry
    • D、FCS checksum

    正确答案:B

  • 第5题:

    What does a Layer 2 switch use to decide where to forward a received frame?()

    • A、source MAC address
    • B、source IP address
    • C、source switch port
    • D、destination IP address
    • E、destination port address
    • F、destination MAC address

    正确答案:F

  • 第6题:

    How does a switch respond when it receives a message?()

    • A、It reads the Layer-5 information and sends the message directly to the intended computer.
    • B、It reads the Media Access Control (MAC) address and broadcasts the message to all the computers that are connected to the switch.
    • C、It reads the Media Access Control (MAC) address and sends the message directly to the intended computer.
    • D、It reads the Layer-5 information and broadcasts the message to all the computers that are connected to the switch.

    正确答案:C

  • 第7题:

    If the router R1 has a packet with a destination address 192.168.1.255, what describes the operation of the network()。

    • A、R1 will forward the packet out all interfaces.
    • B、R1 will drop this packet because this it is not a valid IP address.
    • C、As R1 forwards the frame containing this packet, Sw-A will add 192.168.1.255 to its MAC table.
    • D、R1 will encapsulate the packet in a frame with a destination MAC address of FF-FF-FF-FF-FF-FF
    • E、As R1 forwards the frame containing this packet, Sw-A will forward it to the device assigned the IP address of 192.168.1.255.

    正确答案:B

  • 第8题:

    What does a Layer 2 switch do if it receives a frame with a destination MAC address that is not found in its MAC address table?()

    • A、The frame is dropped.
    • B、The frame is addressed with a broadcast MAC address and sent out all ports.
    • C、The frame is sent out all ports except the receiving port.
    • D、An ARP request is sent out all ports except the receiving port.
    • E、A destination unreachable message is sent back to the source address.
    • F、None of the above.

    正确答案:C

  • 第9题:

    单选题
    What information is used by a switch to forward an Ethernet frame to its destination?()
    A

    IP address

    B

    destination MAC address

    C

    ARP table entry

    D

    FCS checksum


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    What does a Layer 2 switch use to decide where to forward a received frame?()
    A

    source MAC address

    B

    source IP address

    C

    source switch port

    D

    destination IP address

    E

    destination port address

    F

    destination MAC address


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。
    A

    The switch will not forward unicast frames.

    B

    The switch will forward the frame to a specific port.

    C

    The switch will return a copy of the frame out the source port.

    D

    The switch will remove the destination MAC from the switch table.

    E

    The switch will forward the frame to all ports except the port on which it was received.


    正确答案: E
    解析: 暂无解析

  • 第12题:

    多选题
    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。
    A

    protocol

    B

    VLAN number

    C

    TCP or UDP port numbers

    D

    source switch port number

    E

    source IP address and destination IP address

    F

    source MAC address and destination MAC address


    正确答案: F,B
    解析: 暂无解析

  • 第13题:

    Refer to the exhibit. What will Router1 do when it receives the data frame shown?()

    A.Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965.

    B.Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1.

    C.Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320.

    D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1.

    E.Router1 will forward the data packet out interface FastEthernet0/1.

    F.Router1 will forward the data packet out interface FastEthernet0/2.


    参考答案:A, C, F

  • 第14题:

    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

    A.protocol

    B.VLAN number

    C.TCP or UDP port numbers

    D.source switch port number

    E.source IP address and destination IP address

    F.source MAC address and destination MAC address


    参考答案:A, C, E

  • 第15题:

    During the IPv6 autoconfiguration, what does the device append to the 64- bit prefix that it receives from the router to create its IPv6 address?()

    • A、a pseudora ndom generated number
    • B、its locally configured IPv4 address
    • C、the DHCP - supplied device ID
    • D、its MAC address

    正确答案:D

  • 第16题:

    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()

    • A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
    • D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
    • E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • G、None of the other alternatives apply

    正确答案:F

  • 第17题:

    What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()

    • A、The switch will not forward unicast frames.
    • B、The switch will forward the frame to a specific port.
    • C、The switch will return a copy of the frame out the source port.
    • D、The switch will remove the destination MAC from the switch table.
    • E、The switch will forward the frame to all ports except the port on which it was received.

    正确答案:B

  • 第18题:

    What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。

    • A、protocol
    • B、VLAN number
    • C、TCP or UDP port numbers
    • D、source switch port number
    • E、source IP address and destination IP address
    • F、source MAC address and destination MAC address

    正确答案:A,C,E

  • 第19题:

    Which of one the following fields is contained within an IEEE Ethernet frame header?()

    • A、source and destination MAC address
    • B、source MAC address and destination network address only
    • C、source and destination network address only
    • D、source network address and destination MAC address
    • E、source and destination MAC address and source and destination network address

    正确答案:A

  • 第20题:

    单选题
    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()
    A

    The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

    B

    Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

    C

    The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.

    D

    The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.

    E

    The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.

    F

    Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.

    G

    None of the other alternatives apply


    正确答案: G
    解析: 暂无解析

  • 第21题:

    单选题
    Which of one the following fields is contained within an IEEE Ethernet frame header?()
    A

    source and destination MAC address

    B

    source MAC address and destination network address only

    C

    source and destination network address only

    D

    source network address and destination MAC address

    E

    source and destination MAC address and source and destination network address


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    R1 forwards a packet from Host 1 to remote Server 1. Which statement describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1()。
    A

    The frame does not have MAC addresses.

    B

    The source MAC address in the frame is the MAC address of the NIC of Host 1.

    C

    The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.

    D

    The destination MAC address in the frame is the MAC address of the NICof server 1.

    E

    The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    How does a switch respond when it receives a message?()
    A

    It reads the Layer-5 information and sends the message directly to the intended computer.

    B

    It reads the Media Access Control (MAC) address and broadcasts the message to all the computers that are connected to the switch.

    C

    It reads the Media Access Control (MAC) address and sends the message directly to the intended computer.

    D

    It reads the Layer-5 information and broadcasts the message to all the computers that are connected to the switch.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    What dose a Layer 2 switch use to decide where to forward a received frame?()
    A

    source MAC address

    B

    source IP address

    C

    source switch port

    D

    destination IP address

    E

    destination port address

    F

    destination MAC address


    正确答案: C
    解析: 暂无解析