单选题Which of the following will list the destination MAC addresses?()ApingBdigCnbtstatDarp

单选题
Which of the following will list the destination MAC addresses?()
A

ping

B

dig

C

nbtstat

D

arp


参考解析

解析: 暂无解析

相关考题:

WhichofthefollowingwilllistthedestinationMACaddresses?() A.pingB.digC.nbtstatD.arp

AnadministratorisinchargeofseveralremoteserversinJapan.Userscallandcomplaintheycannotconnecttothecompany’sresourceslocatedonthoseservers.Whichofthefollowingcommandswouldallowtheadministratortoverifytheserversarerunning?()A.pingB.netstatC.nbtstatD.telnet

Which of the following tools allows an administrator to determine the MAC address of another computer?() A.pingB.arpC.ifconfigD.ipconfig

Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?() A. DHCPB. ARPC. DNSD. RARP

Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?() A.GatewayB.HubC.BridgeD.Router

Which of one the following fields is contained within an IEEE Ethernet frame header?() A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address

In GLBP, which router will respond to client ARP requests?() A.The active virtual gateway will reply with one of four possible virtual MAC addresses.B.All GLBP member routers will reply in round-robin fashion.C.The active virtual gateway will reply with its own hardware MAC address.D.The GLBP member routers will reply with one of four possible burned in hardware addresses

In GLBP, which router will respond to client ARP requests?()A、The active virtual gateway will reply with one of four possible virtual MAC addresses.B、All GLBP member routers will reply in round-robin fashion.C、The active virtual gateway will reply with its own hardware MAC address.D、The GLBP member routers will reply with one of four possible burned in hardware addresses

What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()A、Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.B、Packets are distributed across the ports in the channel based on both the source and destination IP addresses.C、Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.D、Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.

An administrator is in charge of several remote servers in Japan. Users call and complain they cannot connect to the company’s resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running?()A、pingB、netstatC、nbtstatD、telnet

Which of the following tools allows an administrator to determine the MAC address of another computer?()A、pingB、arpC、ifconfigD、ipconfig

What information is used by a switch to forward an Ethernet frame to its destination?()A、IP addressB、destination MAC addressC、ARP table entryD、FCS checksum

You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply

Which destination addresses will be used by Host A to send data to Host C?()A、the IP address of Switch 1B、the MAC address of Switch 1C、the IP address of Host CD、the MAC address of Host CE、the IP address of the router's E0 interfaceF、the MAC address of the router's E0 interface

Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address

Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A、RepeaterB、HubC、RouterD、Switch

Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?()A、GatewayB、HubC、BridgeD、Router

Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()A、 DHCPB、 ARPC、 DNSD、 RARP

Which of the following will list the destination MAC addresses?()A、pingB、digC、nbtstatD、arp

单选题Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()A DHCPB ARPC DNSD RARP

单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()AThe attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.BFrames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.CThe attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.DThe attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.EThe attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.FFrames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.GNone of the other alternatives apply

单选题Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()ADHCPBARPCDNSDRARP

单选题What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()APackets are distributed across the ports in the channel based on both the source and destination MAC addresses.BPackets are distributed across the ports in the channel based on both the source and destination IP addresses.CPackets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.DPackets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.

单选题Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?()AGatewayBHubCBridgeDRouter

单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()Asource and destination MAC addressBsource MAC address and destination network address onlyCsource and destination network address onlyDsource network address and destination MAC addressEsource and destination MAC address and source and destination network address

单选题Which of the following devices is used to move frames between a source and destination basedon a MAC address?()ARepeaterBHubCRouterDSwitch

单选题In GLBP, which router will respond to client ARP requests?()AThe active virtual gateway will reply with one of four possible virtual MAC addresses.BAll GLBP member routers will reply in round-robin fashion.CThe active virtual gateway will reply with its own hardware MAC address.DThe GLBP member routers will reply with one of four possible burned in hardware addresses

单选题Which of the following will list the destination MAC addresses?()ApingBdigCnbtstatDarp