单选题Which of the following devices is used to move frames between a source and destination basedon a MAC address?()ARepeaterBHubCRouterDSwitch

单选题
Which of the following devices is used to move frames between a source and destination basedon a MAC address?()
A

Repeater

B

Hub

C

Router

D

Switch


参考解析

解析: 暂无解析

相关考题:

A layer 3 switch can move packets between subnets based on which of the following criteria?() A. 802.1q tagB. PortC. ApplicationD. IP address

Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?() A.SwitchB.HubC.ModemD.Repeater

Which of one the following fields is contained within an IEEE Ethernet frame header?() A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address

What does a Layer 2 switch use to decide where to forward a received frame?() A. source MAC addressB. source IP addressC. source switch portD. destination IP addressE. destination port addressF. destination MAC address

Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?() A. source portB. output interfaceC. next-hop IP addressD. source MAC addressE. destination IP addressF. next-hop MAC address

Which destination addresses will be used by Host A to send data to Host C?() A.the IP address of Switch 1B.the MAC address of Switch 1C.the IP address of Host CD.the MAC address of Host CE.the IP address of the router‘s E0 interfaceF.the MAC address of the router‘s E0 interface

For which type of connection should a straight-through cable be used?() A.switch to switchB.switch to hubC.switch to routerD.hub to hubE.router to PC

What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table()。 A.The switch will not forward unicast frames.B.The switch will forward the frame to a specific port.C.The switch will return a copy of the frame out the source port.D.The switch will remove the destination MAC from the switch table.E.The switch will forward the frame to all ports except the port on which it was received.

What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。 A.protocolB.VLAN numberC.TCP or UDP port numbersD.source switch port numberE.source IP address and destination IP addressF.source MAC address and destination MAC address

For which type of connection should a straight-through cable be used?()A、switch to switchB、switch to hubC、switch to routerD、hub to hubE、router to PC

Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()A、source portB、output interfaceC、next-hop IP addressD、source MAC addressE、destination IP addressF、next-hop MAC address

The EtherChannel between your LAN switch and the Internet router is not load-balancing efficiently. On the switch,there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing? ()A、source IP addressB、destination IP addressC、per-packet load balanceD、destination MAC addressE、source MAC address

Which two statements are true regarding an Ethernet collision domain?()A、If a switch is used, the collision domain is limited to each device and the switchB、If a hub is used, the collision domain is limited to each device and the hubC、If a hub is used, the collision domain includes all devices connected to the hubD、If a switch is used, the collision domain includes all devices connected to the switch

You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply

What does a Layer 2 switch use to decide where to forward a received frame?()A、source MAC addressB、source IP addressC、source switch portD、destination IP addressE、destination port addressF、destination MAC address

What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()A、The switch will not forward unicast frames.B、The switch will forward the frame to a specific port.C、The switch will return a copy of the frame out the source port.D、The switch will remove the destination MAC from the switch table.E、The switch will forward the frame to all ports except the port on which it was received.

What three pieces of information can be used in an extended access list to filter traffic (Choose three.)()。A、protocolB、VLAN numberC、TCP or UDP port numbersD、source switch port numberE、source IP address and destination IP addressF、source MAC address and destination MAC address

Which destination addresses will be used by Host A to send data to Host C?()A、the IP address of Switch 1B、the MAC address of Switch 1C、the IP address of Host CD、the MAC address of Host CE、the IP address of the router's E0 interfaceF、the MAC address of the router's E0 interface

Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address

Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A、SwitchB、HubC、ModemD、Repeater

Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A、RepeaterB、HubC、RouterD、Switch

A layer 3 switch can move packets between subnets based on which of the following criteria?()A、802.1q tagB、PortC、ApplicationD、IP address

单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()AThe attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.BFrames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.CThe attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.DThe attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.EThe attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.FFrames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.GNone of the other alternatives apply

单选题What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()AThe switch will not forward unicast frames.BThe switch will forward the frame to a specific port.CThe switch will return a copy of the frame out the source port.DThe switch will remove the destination MAC from the switch table.EThe switch will forward the frame to all ports except the port on which it was received.

单选题Which of the following descriptions about IP spoofing is correct?()AIP source address is forgedBIP destination address is forgedCIP TCP source port is forgedDIP TCP destination port is forgedENone of above

单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()Asource and destination MAC addressBsource MAC address and destination network address onlyCsource and destination network address onlyDsource network address and destination MAC addressEsource and destination MAC address and source and destination network address

单选题A layer 3 switch can move packets between subnets based on which of the following criteria?()A802.1q tagBPortCApplicationDIP address