A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。 A.10.10.0.1B.10.10.0.2C.199.99.9.33D.199.99.9.57E.200.2.2.17F.200.2.2.18
A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。
A.10.10.0.1
B.10.10.0.2
C.199.99.9.33
D.199.99.9.57
E.200.2.2.17
F.200.2.2.18
相关考题:
Router VE1 has just received a packet and needs to route it. What two actions must this router take in order to route incoming packets? (Choose two)A. Inspect the routing table to select the best path to the destination network addresses.B. Validate sources of routing information.C. Inspect the ARP table to verify a legitimate source MAC address for each packet.D. Identify the destination network address of each packet.E. Verify the receipt of routed packets by the next hop router.F. Identify the source network address of each packet.
A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone.Which configuration statement would correctly accomplish this task?()A. from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C. from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
Which configuration command controls the source IP address for packets sent to a RADIUS server?() A.radius override nas-ip-addrB.radius source-ip-address 10.13.7.55C.radius update-source-address 10.13.7.11D.radius authentication server 10.13.7.55
Which of the following correctly describe steps in the OSI data encapsulation process?() A. Transport layer divides a data stream into segments adds reliability flow control informationB. Data link layer adds physical source destination address an FCS to the segmentC. Packets are created when the network layer encapsulate a frame with source destination host address protocol related control informationD. Packets are created when the network layers adds layers 3 address control information to a segmentE. The presentation layer translated bits into bits into voltages for transmission across the physical link
Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?() A.the MAC address of the seiver network interfaceB.the MAC address of host AC.the MAC address of router interface e 1D.the MAC address of router interface e0
What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。 A.permit all packets matching the first three octets of the source address to all destinationsB.permit all packets matching the last octet of the destination address and accept all source addressesC.permit all packets from the third subnet of the network address to all destinationsD.permit all packets matching the host bits in the source address to all destinationsE.permit all packets to destinations matching the first three octets in the destination address
What are two characteristics of Server Load Balancing router mode?()A、 The design supports multiple server subnets Cisco 642-874: Practice ExamB、 An end-user sees the IP address of the real serverC、 SLB routes between the outside and inside subnetsD、 The source or destination MAC address is rewritten, but the IP addresses left aloneE、 SLB acts as a "bump in the wire" between servers and upstream firewall or Layer 3 devices
Which of the following correctly describe steps in the OSI data encapsulation process?()A、The transport layer divides a data stream into segments and may add reliability and flow control information.B、The data link layer adds physical source and destination addresses and an FCS to the segment.C、Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.D、Packets are created when the network layer adds Layer 3 addresses and control information to a segment.E、The presentation layer translates bits into voltages for transmission across the physical link.
Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。A、The MAC address of the NIC in Host 1B、The MAC address of the NIC in server 1C、The MAC address of the Fa0/0 interface of router R1D、The MAC address of the s0/0/0 interface of the router R2
What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()A、Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.B、Packets are distributed across the ports in the channel based on both the source and destination IP addresses.C、Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.D、Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.
Which of the following correctly describe steps in the OSI data encapsulation process?()A、Transport layer divides a data stream into segments adds reliability flow control informationB、Data link layer adds physical source destination address an FCS to the segmentC、Packets are created when the network layer encapsulate a frame with source destination host address protocol related control informationD、Packets are created when the network layers adds layers 3 address control information to a segmentE、The presentation layer translated bits into bits into voltages for transmission across the physical link
Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。A、Host 1 addresses the frames to the MAC address of router R1B、Host 1 looks in its ARP cache for the MAC address of router R1C、Host 1 addresses the frames to the MAC address of web server 2D、Host 1 sends the packets to router R1 to be forwarded to web server 2E、Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2
The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.0 0.0.0.255 any What is the effect of this access list configuration?()A、permit all packets matching the first three octets of the source address to all destinationsB、permit all packet matching the last octet of the destination address and accept all source addressesC、permit all packet matching the host bits in the source address to all destinationsD、permit all packet from the third subnet of the network address to all destinations
A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。A、10.10.0.1B、10.10.0.2C、199.99.9.33D、199.99.9.57E、200.2.2.17F、200.2.2.18
Which destination addresses will be used by Host A to send data to Host C?()A、the IP address of Switch 1B、the MAC address of Switch 1C、the IP address of Host CD、the MAC address of Host CE、the IP address of the router's E0 interfaceF、the MAC address of the router's E0 interface
What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。A、permit all packets matching the first three octets of the source address to all destinationsB、permit all packets matching the last octet of the destination address and accept all source addressesC、permit all packets from the third subnet of the network address to all destinationsD、permit all packets matching the host bits in the source address to all destinationsE、permit all packets to destinations matching the first three octets in the destination address
Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address
单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()Afrom-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }Bfrom-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }Cfrom-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }Dfrom-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
单选题Which configuration command controls the source IP address for packets sent to a RADIUS server?()Aradius override nas-ip-addrBradius source-ip-address 10.13.7.55Cradius update-source-address 10.13.7.11Dradius authentication server 10.13.7.55
单选题What is the effect of the following access list condition? access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。Apermit all packets matching the first three octets of the source address to all destinationsBpermit all packets matching the last octet of the destination address and accept all source addressesCpermit all packets from the third subnet of the network address to all destinationsDpermit all packets matching the host bits in the source address to all destinationsEpermit all packets to destinations matching the first three octets in the destination address
单选题The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()Aermit all packets matching the first three octets of the source address to all destinationsBpermit all packet matching the last octet of the destination address and accept all source addressesCpermit all packet matching the host bits in the source address to all destinationsDpermit all packet from the third subnet of the network address to all destinations
单选题Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。AThe MAC address of the NIC in Host 1BThe MAC address of the NIC in server 1CThe MAC address of the Fa0/0 interface of router R1DThe MAC address of the s0/0/0 interface of the router R2
单选题R1 forwards a packet from Host 1 to remote Server 1. Which statement describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1()。AThe frame does not have MAC addresses.BThe source MAC address in the frame is the MAC address of the NIC of Host 1.CThe source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.DThe destination MAC address in the frame is the MAC address of the NICof server 1.EThe destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2
单选题A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。A10.10.0.1B10.10.0.2C199.99.9.33D199.99.9.57E200.2.2.17F200.2.2.18
多选题Which destination addresses will be used by Host A to send data to Host C?()Athe IP address of Switch 1Bthe MAC address of Switch 1Cthe IP address of Host CDthe MAC address of Host CEthe IP address of the router's E0 interfaceFthe MAC address of the router's E0 interface
多选题Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。AHost 1 addresses the frames to the MAC address of router R1BHost 1 looks in its ARP cache for the MAC address of router R1CHost 1 addresses the frames to the MAC address of web server 2DHost 1 sends the packets to router R1 to be forwarded to web server 2EHost 1 sends a broadcast ARP request to obtain the MAC address of webserver2
单选题What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()APackets are distributed across the ports in the channel based on both the source and destination MAC addresses.BPackets are distributed across the ports in the channel based on both the source and destination IP addresses.CPackets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.DPackets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.