单选题When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to "talk" to?()ARARP requestBShow Network Address requestCProxy ARP requestDARP requestEShow Hardware Address request

单选题
When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to "talk" to?()
A

RARP request

B

Show Network Address request

C

Proxy ARP request

D

ARP request

E

Show Hardware Address request


参考解析

解析: 暂无解析

相关考题:

Which two benefits are provided when Cisco enterprise solutions are employed across all placesin the network? ()(Choose two.) A. regular upgrade processB. multivendor supportC. cost savingsD. product varietyE. well-tested interoperability

Refer to the exhibit. ROUTE.com has just implemented this EIGRP network. A network administrator came to you for advice while trying to implement load balancing across part of their EIGRP network. If the variance value is configured as 2 on all routers and all o ther metric and K values are configured to their default values, traffic from the Internet to the data center will be load balanced across how many paths? ()A. 1B. 2C. 3D. 4E. 5

When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to "talk" to?() A. RARP requestB. Show Network Address requestC. Proxy ARP requestD. ARP requestE. Show Hardware Address request

When a DHCP server is configured, which two IP addresses should never be assignable to hosts?() A. network or subnetwork IP addressB. broadcast address on the networkC. IP address leased to the LAND. IP address used by the interfacesE. manually assigned address to the clientsF. designated IP address to the DHCP server

When a host transmits data across a network to another host, which process does the data go through?() A.standardizationB.conversionC.encapsulationD.synchronization

Which two benefits are provided when Cisco enterprise solutions are employed across all placesin the network? ()(Choose two.)A、regular upgrade processB、multivendor supportC、cost savingsD、product varietyE、well-tested interoperability

When a DHCP server is configured, which two IP addresses should never be assignable to hosts? ()A、network or subnetwork IP addressB、broadcast address on the networkC、IP address leased to the LAND、IP address used by the interfacesE、manually assigned address to the clientsF、designated IP address to the DHCP server

A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()A、For the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.B、For the two vlans to communicate, a network statement for each subinterface needs to be  added  to the OSPF configuration.C、Direct inter-vlan communication does not require OSPFD、OSPF cannot be used if router-on-a-stick is configured on the router

When one connection to a host fails in a full mesh network, which of the following is true?()A、All hosts can communicate.B、No hosts can communicate.C、Half of the hosts will lose communication.D、Only the two hosts between the failed connection will lose communication.

In an Ethernet network, under what two scenarios can devices transmit?()A、when they receive a special tokenB、when there is a carrierC、when they detect no other devices are sendingD、when the medium is idleE、when the server grants access

When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()A、The type of application used on the networkB、The type of system bus used by the computersC、The type of memory installed in each computerD、The type of media used in the network topologyE、The type of protocols used in the networkF、The physical layout of the network hosts

When a host transmits data across a network to another host, which process does the data go through?()A、standardizationB、conversionC、encapsulationD、synchronization

When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()A、RARP requestB、Show Network Address requestC、Proxy ARP requestD、ARP requestE、Show Hardware Address request

What is the purpose of assigning an IP address to a switch?()A、Provides local hosts with a default gateway addressB、Allows remote management of the switch.C、Allows the switch to respond to ARP requests between two hostsD、Ensures that hosts on the same LAN can communicate with each other.

On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()A、a router with subinterfaces configured on the physical interface that is connected to the switchB、a router with an IP address on the physical interface connected to the switchC、a switch with an access link that is configured between the switchesD、a switch with a trunk link that is configured between the switches

When installing a wireless network in a large area, which of the following is the FIRST thing thatshould be considered when trying to get the MOST coverage?()A、SSID namingB、Device placementC、Encryption methodsD、Channel selection

A gateway machine has access to the Internet and is trying to reach a machine on the Internet called cactus.org. Although the gateway machine cannot reach cactus.org, another network across town is able to reach cactus.org. Furthermore, the gateway machine can reach the network across town, but cannot ping the cactus.org. Which of the following tools will best help diagnose the location of the problem?()A、iptraceB、netstatC、tcpdumpD、traceroute

Which two statements are true of a network mask?()A、A subnet mask specifies the portion of an IP address that is in a binary formatB、A subnet mask specifies the portion of an IP address that is in a decimal formatC、A subnet mask specifies the portion of an IP address that represents a network prefixD、A subnet mask specifies the portion of an IP address that represetns network hosts

Which two types of optimization does the WX 60 device perform when Exchange 2003 and Outlook 2003 areused in the network? ()(Choose two.)A、Packet Flow AccelerationB、Network Sequence CachingC、AppFlow's MAPI accelerationD、Molecular Sequence Reduction

What are two routing requirements for a device to communicate with another device?()A、end-to-end communications pathB、hosts on the same Layer 2 broadcast domainC、hosts on the same Layer 3 broadcast domainD、routing information on participating Layer 3 devices

When scaling Coherence from one to two cache servers, it will not show the same scalability as two to four. Why?()A、 Coherence uses a more efficient TCMP algorithm going from two to four cache serversB、 When going from one to two cache servers, object backups are copied across servers so work is doubled,but going from two to four is a fixed amount of workC、 Near cache is enabled with a larger quorum thus performance is improvedD、 all of the above

You need to recommend the server configurations for the new failover cluster. The configurations must support the company's planned changes    Which two actions should you recommend?()A、From Hyper-V Manager on each node, configure one virtual network.B、From Hyper-V Manager on one node, configure two virtual networks.C、Install one network adapter on each node. Configure the network adapters to use multiple IP ddresses.D、Install two network adapters on each node. Configure the network adapters to communicate on  separate subnets.

多选题Which two benefits are provided when Cisco enterprise solutions are employed across all placesin the network? ()(Choose two.)Aregular upgrade processBmultivendor supportCcost savingsDproduct varietyEwell-tested interoperability

单选题When one connection to a host fails in a full mesh network, which of the following is true?()AAll hosts can communicate.BNo hosts can communicate.CHalf of the hosts will lose communication.DOnly the two hosts between the failed connection will lose communication.

单选题When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()ARARP requestBShow Network Address requestCProxy ARP requestDARP requestEShow Hardware Address request

单选题On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()Aa router with subinterfaces configured on the physical interface that is connected to the switchBa router with an IP address on the physical interface connected to the switchCa switch with an access link that is configured between the switchesDa switch with a trunk link that is configured between the switches

单选题A switch has been configured with two vlans and is connected to a router with a trunk for inter-vlan routing.OSPF has been configured on the router,as the routing protocol for the network.Which statement about thisnetwork is true?()AFor the two vlans to communicate,a network statement for the trunk interface needs to be added to the OSPF configuration.BFor the two vlans to communicate, a network statement for each subinterface needs to be  added  to the OSPF configuration.CDirect inter-vlan communication does not require OSPFDOSPF cannot be used if router-on-a-stick is configured on the router

单选题Your network contains an Active Directory domain named contoso.com. The domain contains two domain controllers named DC1 and DC2 that run Windows Server 2008 R2.DC1 hosts a primary zone for contoso.com. DC2 hosts a secondary zone for contosto.com.You need to ensure that DNS zone data is encrypted when the data replicates across the network. DC2 must provide authoritative responses to client computers.What should you do?()AConfigure the contoso.com zone to use DNSSECBCreate a new delegation in the contoso.com zoneCModify the zone transfer settings of the contoso.com zoneDConvert the contoso.com zone to an Active Directory-integrated zone