单选题What is the mechanism that is used to allocate MAC addresses that are assigned to the VDC for the system MAC address?()A NX-OS uses a random MAC address from the IEEE OUI block that is assigned to Cisco.B The VDC system MAC is pulled from the active supervisor and concatenated through a hash to ensure uniqueness.C NX-OS uses a value that is based on a range that is assigned to the SPROM of the system backplane.D The VDC system MAC is based on a range that is allocated to the first line card that is installed in the switch.

单选题
What is the mechanism that is used to allocate MAC addresses that are assigned to the VDC for the system MAC address?()
A

 NX-OS uses a random MAC address from the IEEE OUI block that is assigned to Cisco.

B

 The VDC system MAC is pulled from the active supervisor and concatenated through a hash to ensure uniqueness.

C

 NX-OS uses a value that is based on a range that is assigned to the SPROM of the system backplane.

D

 The VDC system MAC is based on a range that is allocated to the first line card that is installed in the switch.


参考解析

解析: 暂无解析

相关考题:

Which two design concerns must be addressed when designing a multicast implementation?() A. only the low-order 23 bits of the MAC address are used to map IP addressesB. only the low-order 24 bits of the MAC address are used to map IP addressesC. only the high-order 23 bits of the MAC address are used to map IP addressesD. only the low-order 23 bits of the IP address are used to map MAC addressesE. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addressesF. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses

What is valid reason for a switch to deny port access to new devices when port security is enabled?() A. The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.B. The denied MAC address are statically configured on the port.C. The minimum MAC threshold has been reached.D. The absolute aging times for the denied MAC addresses have expired.

The Dynamic Host Configuration Protocol provides configuration parameters to Internet( ).DHCP consists of two components:a( )for delivering host-specifie configuration parameters from a DHCP server to a host and a mechanism for allocation of network addresses to hosts.DHCP is built on a client-server model,where designated DHCP server hosts allocate network addresses and deliver( )parameters to dynamically configured hosts.DHCP supports three mechanisms for IP address allocation.In“automatic allocation”,DHCP assigns a(本题)IP address to client.In“dynamic allocation”,DHCP assigns an IP address to a client for a limited period of time.In“manual allocation”,a client’s IP address is assigned by the network( ),and DHCP is used simply to convey the assigned address to the client.A.permanentB.dynamicC.connectionD.session

The Dynamic Host Configuration Protocol provides configuration parameters to Internet( ).DHCP consists of two components:a(本题)for delivering host-specifie configuration parameters from a DHCP server to a host and a mechanism for allocation of network addresses to hosts.DHCP is built on a client-server model,where designated DHCP server hosts allocate network addresses and deliver( )parameters to dynamically configured hosts.DHCP supports three mechanisms for IP address allocation.In“automatic allocation”,DHCP assigns a( )IP address to client.In“dynamic allocation”,DHCP assigns an IP address to a client for a limited period of time.In“manual allocation”,a client’s IP address is assigned by the network( ),and DHCP is used simply to convey the assigned address to the client.A.routerB.protocolC.hostD.mechanism

After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()A、The port’s violation mode is set to restrictB、The port is shut downC、The MAC address table is cleared and the new MAC address is entered into the tableD、The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

What are the "bound IP addresses" used for in LDP?()A、For each such address and mask /32, one label binding is created.B、As the TCP endpoint, IP addresses are used by the LDP session.C、These addresses are used to find the label binding to put in the LFIB, by looking up these IP addresses in the routing table.D、These addresses are used for penultimate hop popping (PHP) when forwarding packets to the next router directly.

In a Cisco Unified Computing System, What is the "designated receiver" port in end-host mode used for?()A、 Sending all broadcastsB、 Receiving all traffic from upstream switchesC、 Receiving broadcast trafficD、 Negotiating spanning tree with upstream switchesE、 Learning MAC addresses from upstream switches

What is the purpose of a network mask?()A、It is used in conjunction with the wildcard mask to determine the number of hosts on a networkB、It is used to define which parts of the IP address are allocated to host addresses and network prefixesC、It is used to hide subnets from external networks by masking the subnets with NATD、It is used to differentiate a network as a classful network or a classless network

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

A Cisco UCS fabric interconnect in end-host mode learns MAC addresses on which port types?()A、 Uplink Ethernet ports or border portsB、 Appliance portsC、 Server portsD、 Fabric portsE、 Backplane portsF、 vEth interfacesG、 A Fabric Interconnect doesn’t learn MAC addresses in End Host mode. Pinning is used instead.

What features set is most frequently used to prevent hackers from flooding a port with MAC- addresses?()A、BPDU GuardB、802.xC、Port SecurityD、Storm Control

What is valid reason for a switch to deny port access to new devices when port security is enabled?()A、The denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.B、The denied MAC address are statically configured on the port.C、The minimum MAC threshold has been reached.D、The absolute aging times for the denied MAC addresses have expired.

When you enable port security on an interface that is also configured with a voice VLAN,  what is the maximum number of secure MAC addresses that should be set on the port?()A、No more than one secure MAC address should be set.B、The default will be set.C、The IP phone should use a dedicated port, therefore only one MAC address is needed per port.D、No value is needed if the switchport priority extend command is configured. E、No more than two secure MAC addresses should be set.

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

What is the mechanism that is used to allocate MAC addresses that are assigned to the VDC for the system MAC address?()   A、 NX-OS uses a random MAC address from the IEEE OUI block that is assigned to Cisco.B、 The VDC system MAC is pulled from the active supervisor and concatenated through a hash to ensure uniqueness.C、 NX-OS uses a value that is based on a range that is assigned to the SPROM of the system backplane.D、 The VDC system MAC is based on a range that is allocated to the first line card that is installed in the switch.

Which of the following servers would dynamically allocate IP addresses to workstations?()A、NTPB、DHCPC、DNSD、SNMP

多选题Which two design concerns must be addressed when designing a multicast implementation?()Aonly the low-order 23 bits of the MAC address are used to map IP addressesBonly the low-order 24 bits of the MAC address are used to map IP addressesConly the high-order 23 bits of the MAC address are used to map IP addressesDonly the low-order 23 bits of the IP address are used to map MAC addressesEthe 0x01004f MAC address prefix is used for mapping IP addresses to MAC addressesFthe 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses

多选题Which three IP multicast address related statements are true? (Choose three.) ()AMulticast addresses 224.0.0.0 through 224.0.0.255 are always forwarded because they are transmitted  with Time to Live (TTL) greater than 1.BMulticast addresses 224.0.0.5 and 224.0.0.6 are source multicast addresses for OSPF routers.CMulticast addresses 224.0.0.13 and 224.0.0.22 are reserved link-local addresses used by PIMv2 and  IGMPv3.DBecause they would map to overlapping IP multicast MAC addresses, multicast addresses 224.0.1.1  and 238.1.1.1 could not be used together.EMulticast address 224.0.1.1 has been reserved for the Network Time Protocol (NTP) by the IANAFThe administratively scoped multicast addresses 239.0.0.0 through 239.255.255.255 are similar in  purpose to RFC 1918 private unicast addresses.

单选题What features set is most frequently used to prevent hackers from flooding a port with MAC- addresses?()ABPDU GuardB802.xCPort SecurityDStorm Control

单选题In a Cisco Unified Computing System, What is the "designated receiver" port in end-host mode used for?()A Sending all broadcastsB Receiving all traffic from upstream switchesC Receiving broadcast trafficD Negotiating spanning tree with upstream switchesE Learning MAC addresses from upstream switches

多选题A Cisco UCS fabric interconnect in end-host mode learns MAC addresses on which port types?()AUplink Ethernet ports or border portsBAppliance portsCServer portsDFabric portsEBackplane portsFvEth interfacesGA Fabric Interconnect doesn’t learn MAC addresses in End Host mode. Pinning is used instead.

单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode

多选题Which three IP multicast address related statements are true?()AMulticast addresses 224.0.0.13 and 224.0.0.22 are reserved link - local addresses used by PIMv2 and IGMPv3BBecause they would map to overlapping IP multicast MAC addresses, multicast addresses 224.0.1.1 and 238.1.1.1 could not be used toget herCMulticast addresses 224.0.0.0 through 224.0.0.255 are always forwarded because they are transmitted with Time to Live (TTL) greater than 1DMulticast addresses 224.0.0.5 and 224.0.0.6 are source multicast addresses for OSPF routersEThe a dministratively scoped multicast addresses 239.0.0.0 through 239.255.255.255 are similar in purpose to RFC 1918 private unicast addressesFMulticast address 224.0.1.1 has been reserved for the Network Time Protocol (NTP) by the IANA

单选题After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()AThe port’s violation mode is set to restrictBThe port is shut downCThe MAC address table is cleared and the new MAC address is entered into the tableDThe port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

单选题What is valid reason for a switch to deny port access to new devices when port security is enabled?()AThe denied MAC addresses have already been learned or confgured on another secure interface in the same VLAN.BThe denied MAC address are statically configured on the port.CThe minimum MAC threshold has been reached.DThe absolute aging times for the denied MAC addresses have expired.

单选题Static VLANs are being used on the Company network. What is true about static VLANs?()ADevices use DHCP to request their VLAN.BAttached devices are unaware of any VLANs.CDevices are assigned to VLANs based on their MAC addresses.DDevices are in the same VLAN regardless of which port they attach to.

单选题What are the "bound IP addresses" used for in LDP?()AFor each such address and mask /32, one label binding is created.BAs the TCP endpoint, IP addresses are used by the LDP session.CThese addresses are used to find the label binding to put in the LFIB, by looking up these IP addresses in the routing table.DThese addresses are used for penultimate hop popping (PHP) when forwarding packets to the next router directly.