After replacing the NIC card of a PC on the LAN, your Cisco switch shows a new MAC address is attached to that port. Which of the following answer choices below correctly describe a MAC address?() A. It is a globally unique IP address.B. It is a globally unique 48 bit addressC. It is provided by the manufacturer of the NIC.D. It is used as part of the IPX/SPX configuration.E. It is a logical address.

After replacing the NIC card of a PC on the LAN, your Cisco switch shows a new MAC address is attached to that port. Which of the following answer choices below correctly describe a MAC address?()

A. It is a globally unique IP address.

B. It is a globally unique 48 bit address

C. It is provided by the manufacturer of the NIC.

D. It is used as part of the IPX/SPX configuration.

E. It is a logical address.


相关考题:

When comparing and contrasting the similarities and differences between bridges and switches, which of the following are valid statements? Choose all the valid answer choices)A. Bridges are faster than switches because they have fewer ports.B. A switch is a multiport bridge,C. Bridges and switches learn MAC addresses by examining the source MAC address of each frame. received.D. A bridge will forward a broadcast but a switch will not.E. Bridges and switches increase the size of a collision domain.F. None of the above statements are true.

After connecting a PC to an available port on a switch, you find that the PC can not access any of the resources on the LAN. No other PC's connected to the switch appear to be having any issues. What is the most likely cause for this problem?A.The router lacks a routing table entry for the new hostB.The host switch port is assigned to the incorrect VLANC.The host MAC address is incorrectly configuredD.A STP instance for the new host has not been initializedE.The switch does not have the MAC address hard coded in the CAM table.

Which of one the following fields is contained within an IEEE Ethernet frame header?() A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address

The MAC address for your PC NIC is: C9-3F-32-B4-DC-19. What is the address of the OUI portion of this NIC card, expressed as a binary number?() A.11001100-00111111-00011000B.11000110-11000000-00011111C.11001110-00011111-01100000D.11001001-00111111-00110010E.11001100-01111000-00011000F.11111000-01100111-00011001

After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()A、The port’s violation mode is set to restrictB、The port is shut downC、The MAC address table is cleared and the new MAC address is entered into the tableD、The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

After replacing the NIC card of a PC on the LAN, your Cisco switch shows a new MAC address is attached to that port. Which of the following answer choices below correctly describe a MAC address?()A、It is a globally unique IP address.B、It is a globally unique 48 bit addressC、It is provided by the manufacturer of the NIC.D、It is used as part of the IPX/SPX configuration.E、It is a logical address.

Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。A、The MAC address of the NIC in Host 1B、The MAC address of the NIC in server 1C、The MAC address of the Fa0/0 interface of router R1D、The MAC address of the s0/0/0 interface of the router R2

A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()A、 networkB、 applicationC、 sessionD、 data link

You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply

You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()A、 Enable root guard to mitigate ARP address spoofing attacks.B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.C、 Configure PVLANs to mitigate MAC address flooding attacks.D、 Enable root guard to mitigate DHCP spoofing attacks.E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.F、 Configure port security to mitigate MAC address flooding  G、 None of the other alternatives apply

Which two range descriptions correctly describe IP addressing to use when enabling multicast support using the Cisco Unified Wireless Solution?()A、globally scoped address rangeB、239.0.0.X or 239.128.0.X address rangeC、administratively scoped address range that does not overlap with a link-local MAC addressD、any Class D address rangeE、site-local scoped address range

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

Which destination addresses will be used by Host A to send data to Host C?()A、the IP address of Switch 1B、the MAC address of Switch 1C、the IP address of Host CD、the MAC address of Host CE、the IP address of the router's E0 interfaceF、the MAC address of the router's E0 interface

Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address

The MAC address for your PC NIC is: C9-3F-32-B4-DC-19. What is the address of the OUI portion of this NIC card, expressed as a binary number?()A、11001100-00111111-00011000B、11000110-11000000-00011111C、11001110-00011111-01100000D、11001001-00111111-00110010E、11001100-01111000-00011000F、11111000-01100111-00011001

Which of the following is the MOST likely cause of a low wireless signal after an internal wireless adapter on a laptop was replaced?()A、The wireless card must be calibrated to the laptop.B、The correct preshared encryption key must be installed to boost the signal.C、The MAC address of the new wireless card will have to be added to the WAP to get the full signal.D、The antenna wires for the wireless card were not attached.

Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A、RepeaterB、HubC、RouterD、Switch

单选题In Windows XP, which command can be used to view both the IP address and the NIC (network interface card) MAC address?()AIPCONFIG/ABIPCONFIG/ALLCIPCONFIGDWINIPCFG

单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()Asource and destination MAC addressBsource MAC address and destination network address onlyCsource and destination network address onlyDsource network address and destination MAC addressEsource and destination MAC address and source and destination network address

单选题Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。AThe MAC address of the NIC in Host 1BThe MAC address of the NIC in server 1CThe MAC address of the Fa0/0 interface of router R1DThe MAC address of the s0/0/0 interface of the router R2

多选题The EtherChannel between your LAN switch and the Internet router is not load-balancing efficiently. On the switch, there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing?()Asource IP addressBdestination IP addressCper-packet load balanceDdestination MAC addressEsource MAC address

多选题After replacing the NIC card of a PC on the LAN, your Cisco switch shows a new MAC address is attached to that port. Which of the following answer choices below correctly describe a MAC address?()AIt is a globally unique IP address.BIt is a globally unique 48 bit addressCIt is provided by the manufacturer of the NIC.DIt is used as part of the IPX/SPX configuration.EIt is a logical address.

单选题Which of the following is the MOST likely cause of a low wireless signal after an internal wireless adapter on a laptop was replaced?()AThe wireless card must be calibrated to the laptop.BThe correct preshared encryption key must be installed to boost the signal.CThe MAC address of the new wireless card will have to be added to the WAP to get the full signal.DThe antenna wires for the wireless card were not attached.

多选题Which destination addresses will be used by Host A to send data to Host C?()Athe IP address of Switch 1Bthe MAC address of Switch 1Cthe IP address of Host CDthe MAC address of Host CEthe IP address of the router's E0 interfaceFthe MAC address of the router's E0 interface

单选题After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()AThe port’s violation mode is set to restrictBThe port is shut downCThe MAC address table is cleared and the new MAC address is entered into the tableDThe port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

单选题Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()AStatic secure MAC addressBDynamic secure MAC addressCPervasive secure MAC addressDSticky secure MAC address

单选题The MAC address for your PC NIC is: C9-3F-32-B4-DC-19. What is the address of the OUI portion of this NIC card, expressed as a binary number?()A11001100-00111111-00011000B11000110-11000000-00011111C11001110-00011111-01100000D11001001-00111111-00110010E11001100-01111000-00011000F11111000-01100111-00011001