Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?() A.the MAC address of the seiver network interfaceB.the MAC address of host AC.the MAC address of router interface e 1D.the MAC address of router interface e0
Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?()
A.the MAC address of the seiver network interface
B.the MAC address of host A
C.the MAC address of router interface e 1
D.the MAC address of router interface e0
相关考题:
You have configured a Ezonexam switch as shown below:Ezonexam3(config-if) switchport port-securityEzonexam3(config-if) switchport port-security mac-address stickySelect the action below that results from executing these commands.A. A dynamically learned MAC address is saved in the VLAN database.B. A dynamically learned MAC address is saved in the startup-configuration file.C. Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.D. A dynamically learned MAC address is saved in the running-configuration file.E. Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.F. None of the above
The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)A.Configure port Fa0/1 to accept connections only from the static IP address of the serverB.Configure the MAC address of the server as a static entry associated with port Fa0/1C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectorsD.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverE.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address
What does a Layer 2 switch use to decide where to forward a received frame?() A. source MAC addressB. source IP addressC. source switch portD. destination IP addressE. destination port addressF. destination MAC address
Which statement about vlan operation on cisco catalyst switches is true?() A. when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table.B. unkown unicast frames are retransmitted only to the ports that belong to the same vlanC. ports between switches should be configured in access mode so that vlans can span across the portsD. broadcast and multicast frames are retransmitted to ports that are configured on different vlan.
A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?() A. Drop the data.B. Send the data frames to the default gateway.C. Create an ARP request to get a MAC address for the receiving host.D. Send a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.
Refer to the exhibit. What will Router1 do when it receives the data frame shown?() A.Router1 will strip off the source MAC address and replace it with the MAC address 0000.0c36.6965.B.Router1 will strip off the source IP address and replace it with the IP address 192.168.40.1.C.Router1 will strip off the destination MAC address and replace it with the MAC address 0000.0c07.4320.D. Router1 will strip off the destination IP address and replace it with the IP address of 192.168.40.1.E.Router1 will forward the data packet out interface FastEthernet0/1.F.Router1 will forward the data packet out interface FastEthernet0/2.
What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。 A.The switch will not forward unicast frames.B.The switch will forward the frame to a specific port.C.The switch will return a copy of the frame out the source port.D.The switch will remove the destination MAC from the switch table.E.The switch will forward the frame to all ports except the port on which it was received.
Refer to the exhibit. The user at Workstation B reports that Server A cannot be reacheD.What ispreventing Workstation B from reaching Server A?() A.The IP address for Server A is a broadcast address.B.The IP address for Workstation B is a subnet address.C.The gateway for Workstation B is not on the same subnet.D.The gateway for Server A is not on the same subnet.
Typically,an IP address refers to an individual host on a particular network. IP also accommodates addresses that refer to a group of hosts on one or more networks.Such addresses are referred to as multicast addresses,and the act of sending a packet from a source to the members of a (71)group is referred to as multicasting. Multicasting done (72) the scope of a single LAN segment is straight forward. IEEE 802 and other LAN protocols include provision for MAC-level multicast addresses. A packet with a multicast address is transmitted on a LAN segment.Those stations that are members of the (73)multicast group recognize the multicast address and (74)the packet.In this case,only a single copy of the packet is ever transmitted.This technique works because of the (本题)nature of a LAN:A transmission from any one station is received by all other stations on the LAN. A .multicastB. unicastC.broadcastD.multiple unicast
Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。A、The MAC address of the NIC in Host 1B、The MAC address of the NIC in server 1C、The MAC address of the Fa0/0 interface of router R1D、The MAC address of the s0/0/0 interface of the router R2
Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。A、Host 1 addresses the frames to the MAC address of router R1B、Host 1 looks in its ARP cache for the MAC address of router R1C、Host 1 addresses the frames to the MAC address of web server 2D、Host 1 sends the packets to router R1 to be forwarded to web server 2E、Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2
A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()A、from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C、from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D、from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply
What does a Layer 2 switch use to decide where to forward a received frame?()A、source MAC addressB、source IP addressC、source switch portD、destination IP addressE、destination port addressF、destination MAC address
What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()A、The switch will not forward unicast frames.B、The switch will forward the frame to a specific port.C、The switch will return a copy of the frame out the source port.D、The switch will remove the destination MAC from the switch table.E、The switch will forward the frame to all ports except the port on which it was received.
Which statement about vlan operation on cisco catalyst switches is true?()A、when a packet is received from an 802.1Q trunk,the vlan id can be determined from the source MAC address table.B、unkown unicast frames are retransmitted only to the ports that belong to the same vlanC、ports between switches should be configured in access mode so that vlans can span across the portsD、broadcast and multicast frames are retransmitted to ports that are configured on different vlan.
What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address
A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A、Configure port Fa0/1 to accept connections only from the static IP address of the server.B、Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C、Configure the MAC address of the server as a static entry associated with port Fa0/1.D、Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E、Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F、Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
Select the action that results from executing these commands.()Switch(config-if)# switchport port-securitySwitch(config-if)# switchport port-security mac-address stickyA、A dynamically learned MAC address is saved in the startup-configuration file.B、A dynamically learned MAC address is saved in the running-configuration file.C、A dynamically learned MAC address is saved in the VLAN database.D、Statically configured MAC addresses are saved in the startup-configuration file if frames from that address are received.E、Statically configured MAC addresses are saved in the running-configuration file if frames from that address are received.
Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A、RepeaterB、HubC、RouterD、Switch
单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()AThe attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.BFrames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.CThe attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.DThe attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.EThe attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.FFrames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.GNone of the other alternatives apply
单选题A host is attempting to send data to another host on a different network. What is the first action that the sending host will take?()ADrop the data.BSend the data frames to the default gateway.CCreate an ARP request to get a MAC address for the receiving host.DSend a TCP SYN and wait for the SYN ACK with the IP address of the receiving host.
单选题Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。AThe MAC address of the NIC in Host 1BThe MAC address of the NIC in server 1CThe MAC address of the Fa0/0 interface of router R1DThe MAC address of the s0/0/0 interface of the router R2
单选题R1 forwards a packet from Host 1 to remote Server 1. Which statement describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1()。AThe frame does not have MAC addresses.BThe source MAC address in the frame is the MAC address of the NIC of Host 1.CThe source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.DThe destination MAC address in the frame is the MAC address of the NICof server 1.EThe destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2
单选题What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。AThe switch will not forward unicast frames.BThe switch will forward the frame to a specific port.CThe switch will return a copy of the frame out the source port.DThe switch will remove the destination MAC from the switch table.EThe switch will forward the frame to all ports except the port on which it was received.
多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server onlinE.What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1? ()AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.
多选题Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。AHost 1 addresses the frames to the MAC address of router R1BHost 1 looks in its ARP cache for the MAC address of router R1CHost 1 addresses the frames to the MAC address of web server 2DHost 1 sends the packets to router R1 to be forwarded to web server 2EHost 1 sends a broadcast ARP request to obtain the MAC address of webserver2