A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()A、Drop the data.B、Send the data frames to the default gateway.C、Create an ARP request to get a MAC address for the receiving host.D、Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()

  • A、Drop the data.
  • B、Send the data frames to the default gateway.
  • C、Create an ARP request to get a MAC address for the receiving host.
  • D、Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

相关考题:

Please ______ these parcels by air at once.() A. send upB. send offC. send awayD. send out

You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?() A. Enable Custom InstructionsB. Pre-auth notificationC. Remediation messageD. Send reason strings

Click the Exhibit button.A user logs in, is assigned the default role, and successfully loads the Host Enforcer policies shown in the exhibit.Which three statements are true? () A. The local host will respond to ICMP echo-request packets from 192.168.53.10.B. The local host will respond to UDP port 53 requests from 192.168.1.25.C. The local host can send any packet of any type to host 172.16.1.1.D. The local host will accept any packet of any type from host 172.16.1.1.E. The local host can send packets to UDP port512 on server 192.168.53.10.

A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?() A. Drop the data.B. Send the data frames to the default gateway.C. Create an ARP request to get a MAC address for the receiving host.D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

Refer to the exhibit.Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4.What will Switch-1 do with this data?() A.switch-1 will drop the data because it dose not have an entry for that MAC addressB.switch-1 will flood the data out all of its port from which the data originatedC.switch-1 will forward the data to its default gatewayD.tch-1 will send an ARP request out all its ports except the port from which the data originated

The user of Host1 wants to ping the DSL modem/router at 192.168.1.254. Based on the Host1 ARP table that is shown in the exhibit, what will Host1 do()。 A.send a unicast ARP packet to the DSL modem/routerB.send unicast ICMP packets to the DSL modem/routerC.send Layer 3 broadcast packets to which the DSL modem/router respondsD.send a Layer 2 broadcast that is received by Host2, the switch, and the DSL modem/router

Anytime a host or a router has an IP datagram to send to another host or router, it has the( )address of the receiver. This address is obtained from the DNS if the sender is the host or it is found in a routing table if the sender is a router. But the IP data gram must be( ) in a frame to be able to pass through the physical network. This means that the sender needs the ( )address of the receiver. The host or the router sends an ARP query packet. The packet includes the physical and IP addresses of the sender and the IP address of the receiver. Because the sender does not know the physical address of the receiver, the query is( ) over the network.Every host or router on the network receives and processes the ARP query packet, but only the intended recipient recognizes its IP address and sends back an ARP response packet.The response packet contains the recipient's IP and physical addresses. The packet is(请作答此空) directly to the inquirer by using the physical address received in the query packet. A. multicastB. unicastC. broadcastD. multiple unicast

如果准备读文件,打开顺序文件“text.dat”的正确语句是()。Aopen ”text.dat” For write As # 1Bopen ”text.dat” For Binary As # 1Copen ”text.dat” For Input As # 1Dopen ”text.dat” For Random As # 1

为读而打开文本文件aa.dat,的正确写法是()A、fopen(”aa.dat”,”rb”);B、fopen(”aa.dat”,”w”)C、fopen(”aa.dat”,”wb”);D、fopen(”aa.dat”,”r”)

Which statement is true of a source that wants to transmit multicast traffic to group 239.1.1.1?()A、Before sending traffic, it must first join  multicast group 239.1.1.1 by sending an IGMPv2 membership report to the default router on the local subnet.B、It must send an IGMPv2 Request to Send  packet and then wait for an IGMPv2 Clear to Send packet from the IGMPv2 querier router on the local subnetC、It may begin transmitting multicast traffic to the group only when there is no other host transmitting to the group on the local subnet.D、It may transmit multicast traffic to the group at any time.

Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。A、Host 1 addresses the frames to the MAC address of router R1B、Host 1 looks in its ARP cache for the MAC address of router R1C、Host 1 addresses the frames to the MAC address of web server 2D、Host 1 sends the packets to router R1 to be forwarded to web server 2E、Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2

为写而打开文本文件aa.dat,的正确写法是()A、fopen(”aa.dat”,”rb”)B、fp=fopen(”aa.dat”,”w”)C、fopen(”aa.dat”,”wb”)D、fp=fopen(”aa.dat”,”r”)

Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true?()A、Router C will use ICMP to inform Host 1 that Host 2 cannot be reached.B、Router C will use ICMP to inform Router B that Host 2 cannot be reached.C、Router C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reached.D、Router C will send a Destination Unreachable message type.E、Router C will send a Router Selection message type.F、Router C will send a Source Quench message type.

How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()A、These attacks send multiple FIN segments forcing TCP connection release.B、These attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.C、These attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.D、These attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.E、These attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

Which destination addresses will be used by Host A to send data to Host C?()A、the IP address of Switch 1B、the MAC address of Switch 1C、the IP address of Host CD、the MAC address of Host CE、the IP address of the router's E0 interfaceF、the MAC address of the router's E0 interface

You have created a Host Checker policy that contains multiple rules. You want to inform end users which rule specifically has failed.In the admin GUI, which configuration setting would you enable?()A、Enable Custom InstructionsB、Pre-auth notificationC、Remediation messageD、Send reason strings

You have an Exchange Server 2010 Edge Transport server.You discover that e-mail delivery to an external SMTP host named Host1 fails.You need to identify which SMTP error codes occur when the delivery to Host1 fails. What should you do?()A、Run the Queue Viewer.B、Enable pipeline tracing.C、Run the Mail Flow Troubleshooter.D、Configure the protocol logging level on the Send connector.

单选题Refer to the exhibit.Switch-1 needs to send data to a host with a MAC address of 00b0.d056.efa4.What will Switch-1 do with this data?()A switch-1 will drop the data because it dose not have an entry for that MAC addressB switch-1 will flood the data out all of its port from which the data originatedC switch-1 will forward the data to its default gatewayD tch-1 will send an ARP request out all its ports except the port from which the data originated

问答题阅读下面的程序:   .mmregs  DAT0 .SET 60H  DAT1 .SET 61H  DAT2 .SET 62H  DAT3 .SET 63H  add3  .macro   P1,P2,P3,ADDRP         LD      P1,A          ADD    P2,A          ADD    P3,A  STL     A,ADDRP          .endm  ST #0034h,DAT0  ST #0243h,DAT1    ST #1230h,DAT2    ADD3 DAT0,DAT1,DAT2,DAT3语句“.mmregs”的含义。

问答题阅读下面的程序:   .mmregs  DAT0 .SET 60H  DAT1 .SET 61H  DAT2 .SET 62H  DAT3 .SET 63H  add3  .macro   P1,P2,P3,ADDRP         LD      P1,A          ADD    P2,A          ADD    P3,A  STL     A,ADDRP          .endm  ST #0034h,DAT0  ST #0243h,DAT1    ST #1230h,DAT2    ADD3 DAT0,DAT1,DAT2,DAT3语句“ADD3 DAT0,DAT1,DAT2,DAT3”是一条什么类型的语句?作用是什么?

单选题A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()ADrop the data.BSend the data frames to the default gateway.CCreate an ARP request to get a MAC address for the receiving host.DSend a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.

多选题Which destination addresses will be used by Host A to send data to Host C?()Athe IP address of Switch 1Bthe MAC address of Switch 1Cthe IP address of Host CDthe MAC address of Host CEthe IP address of the router's E0 interfaceFthe MAC address of the router's E0 interface

单选题How doTCP SYN attacks take advantage ofTCPto prevent new connections from being established to a host under attack?()AThese attacks send multiple FIN segments forcing TCP connection release.BThese attacks fill up a hosts’ listen queue by failing to ACK partially openedTCPconnections.CThese attacks take advantage of the hosts transmit backoff algorithm by sending jam signals to the host.DThese attacks increment the ISN of each segment by a random number causing constant TCP retransmissions.EThese attacks send TCP RST segments in response toconnection SYN+ACK segments forcing SYN retransmissions.

多选题Host 1 is trying to communicate with Host 2. The e0 interface on Router C is down. Which of the following are true (Choose two.)()。ARouter C will use ICMP to inform Host 1 that Host 2 cannot be reachedBRouter C will use ICMP to inform Router B that Host 2 cannot be reachedCRouter C will use ICMP to inform Host 1, Router A, and Router B that Host 2 cannot be reachedDRouter C will send a Destination Unreachable message typeERouter C will send a Router Selection message typeFRouter C will send a Source Quench message type

单选题Which statement is true of a source that wants to transmit multicast traffic to group 239.1.1.1?()ABefore sending traffic, it must first join  multicast group 239.1.1.1 by sending an IGMPv2 membership report to the default router on the local subnet.BIt must send an IGMPv2 Request to Send  packet and then wait for an IGMPv2 Clear to Send packet from the IGMPv2 querier router on the local subnetCIt may begin transmitting multicast traffic to the group only when there is no other host transmitting to the group on the local subnet.DIt may transmit multicast traffic to the group at any time.

问答题阅读下面的程序:   .mmregs  DAT0 .SET 60H  DAT1 .SET 61H  DAT2 .SET 62H  DAT3 .SET 63H  add3  .macro   P1,P2,P3,ADDRP         LD      P1,A          ADD    P2,A          ADD    P3,A  STL     A,ADDRP          .endm  ST #0034h,DAT0  ST #0243h,DAT1    ST #1230h,DAT2    ADD3 DAT0,DAT1,DAT2,DAT3执行此段程序后,存储单元(DAT3)的运行结果多少?