A layer 3 switch can move packets between subnets based on which of the following criteria?()A、802.1q tagB、PortC、ApplicationD、IP address

A layer 3 switch can move packets between subnets based on which of the following criteria?()

  • A、802.1q tag
  • B、Port
  • C、Application
  • D、IP address

相关考题:

A layer 3 switch can move packets between subnets based on which of the following criteria?() A. 802.1q tagB. PortC. ApplicationD. IP address

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?() A. all interfaces in the path toward the destinationB. all networks in the path toward the destinationC. adjacent next hop router in the path toward the destinationD. all routers in the path toward the destinationE. all interfaces through which the packets can be routedF. type of service and precedence in the IP packets

What are two characteristics of SLB router mode?() A. The design supports multiple server subnets.B. An end-user sees the IP address of the real server.C. SLB routes between the outside and inside subnets.D. The source or destination MAC address is rewritten, but the IP addresses left alone.E. SLB acts as a bump in the wire between servers and upstream firewall or Layer 3 devices.

Which of the following is a characteristic of a data center core?() A. Server-to-server traffic always remains in the core layer.B. The recommended practice is for the core infrastructure to be in Layer 3.C. The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.D. The Cisco Express Forwarding hashing algorithm is the default, based on the IP address and Layer 4 port.E. Core layer should run BGP along with an IGP becauseiBGP has a lower administrative distance than any IGP.

Which two of these are characteristics of MPLS VPNs?() A. Layer 3 MPLS VPNs can forward only IP packetsB. Layer 2 MPLS VPNs can forward any network protocolC. MPLS label paths are automatically formed based on Layer 2 framesD. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?() A. use a Layer 2 link between distribution switchesB. use a Layer 3 link between distribution switchesC. use a redundant link to the coreD. use a Layer 3 link between distribution switches with route summarization

IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual ( ) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the (请作答此空) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.networkB.transportC.applicationD.session

Which three of the following descriptions are true about the firewall modes? ()A、 Transparent mode is layer 2.B、 Routed mode is layer 3.C、 Routed mode has 1 IP address.D、 Transparent mode has 1 IP address.

Which of the following is a characteristic of a data center core?()A、 Server-to-server traffic always remains in the core layer.B、 The recommended practice is for the core infrastructure to be in Layer 3.C、 The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.D、 The Cisco Express Forwarding hashing algorithm is the default, based on the IP address andLayer 4 port.E、 Core layer should run BGP along with an IGP because iBGP has a lower administrativedistance than any IGP.

Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

Assuming that an IP packet is sent from a source address in VLAN1 to a destination address in VLAN2 through a layer-3 switch, which part of the packet will be changed?()A、Layer 2 TTLB、Layer 3 TTLC、Layer 3 source addressD、Layer 3 destination address

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()A、all interfaces in the path toward the destinationB、all networks in the path toward the destinationC、adjacent next hop router in the path toward the destinationD、all routers in the path toward the destinationE、all interfaces through which the packets can be routedF、type of service and precedence in the IP packets

The EtherChannel between your LAN switch and the Internet router is not load-balancing efficiently. On the switch,there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing? ()A、source IP addressB、destination IP addressC、per-packet load balanceD、destination MAC addressE、source MAC address

You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()A、The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tagB、No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreC、Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsD、IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offE、MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerF、The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

Which of the following correctly describe steps in the OSI data encapsulation process?()A、Transport layer divides a data stream into segments adds reliability flow control informationB、Data link layer adds physical source destination address an FCS to the segmentC、Packets are created when the network layer encapsulate a frame with source destination host address protocol related control informationD、Packets are created when the network layers adds layers 3 address control information to a segmentE、The presentation layer translated bits into bits into voltages for transmission across the physical link

When configuring a routed port on a Cisco multilayer switch, which of these is a required configuration task that you must perform to enable that port to function as a routed port? ()A、Enable the switch to participate in routing updates from external devices with the router command in global configuration mode.B、Enter the no switchport command to disable Layer 2 functionality at the interface level.C、Each port participating in routing of Layer 3 packets must have an IP routing protocol assigned on aperinterface level.D、Routing is enabled by default on a multilayer switch, so the port can become a Layer 3 routing interface by assigning the appropriate IP address and subnet information.

Which JUNOS software feature allows a user to define specific next-hop values for IP packets based on the source IP address of that packet?()A、MPLSB、Load BalancingC、Class Based ForwardingD、Filter Based Forwarding

Which two of these are characteristics of MPLS VPNs? ()A、 Layer 3 MPLS VPNs can forward only IP packetsB、 Layer 2 MPLS VPNs can forward any network protocolC、 MPL S label paths are automatically formed based on Layer 2 framesD、 Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE、 In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

A switch port on TK1 is being configured to support 802.1Q trunking.  Which of the following are true about 802.1Q trunking?()A、Both switches must be in the same VTP domain.B、The encapsulation type of both ends of the trunk does not have to match.C、The native VLAN on both ends of the trunk must be VLAN 1.D、802.1Q trunking can only be configured on a Layer 2 port.E、In 802.1Q trunking, all VLAN packets are tagged on the trunk link, except the native VLAN.

Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A、RepeaterB、HubC、RouterD、Switch

单选题Which of the following is a characteristic of a data center core?()AServer-to-server traffic always remains in the core layer.BThe recommended practice is for the core infrastructure to be in Layer 3.CThe boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.DThe Cisco Express Forwarding hashing algorithm is the default, based on the IP address and Layer 4 port.ECore layer should run BGP along with an IGP becauseiBGP has a lower administrative distance than any IGP.

单选题A layer 3 switch can move packets between subnets based on which of the following criteria?()A802.1q tagBPortCApplicationDIP address

多选题When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()Aall interfaces in the path toward the destinationBall networks in the path toward the destinationCadjacent next hop router in the path toward the destinationDall routers in the path toward the destinationEall interfaces through which the packets can be routedFtype of service and precedence in the IP packets

单选题Which of the following devices is used to move frames between a source and destination basedon a MAC address?()ARepeaterBHubCRouterDSwitch

单选题A switch port on TK1 is being configured to support 802.1Q trunking.  Which of the following are true about 802.1Q trunking?()ABoth switches must be in the same VTP domain.BThe encapsulation type of both ends of the trunk does not have to match.CThe native VLAN on both ends of the trunk must be VLAN 1.D802.1Q trunking can only be configured on a Layer 2 port.EIn 802.1Q trunking, all VLAN packets are tagged on the trunk link, except the native VLAN.

多选题What are two characteristics of SLB router mode?()AThe design supports multiple server subnets.BAn end-user sees the IP address of the real server.CSLB routes between the outside and inside subnets.DThe source or destination MAC address is rewritten, but the IP addresses left alone.ESLB acts as a bump in the wire between servers and upstream firewall or Layer 3 devices.

单选题Which of the following is a characteristic of a data center core?()A Server-to-server traffic always remains in the core layer.B The recommended practice is for the core infrastructure to be in Layer 3.C The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.D The Cisco Express Forwarding hashing algorithm is the default, based on the IP address andLayer 4 port.E Core layer should run BGP along with an IGP because iBGP has a lower administrativedistance than any IGP.