网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which destination addresses will be used by Host A to send data to Host C?()

  • A、the IP address of Switch 1
  • B、the MAC address of Switch 1
  • C、the IP address of Host C
  • D、the MAC address of Host C
  • E、the IP address of the router's E0 interface
  • F、the MAC address of the router's E0 interface

参考答案

更多 “Which destination addresses will be used by Host A to send data to Host C?()A、the IP address of Switch 1B、the MAC address of Switch 1C、the IP address of Host CD、the MAC address of Host CE、the IP address of the router's E0 interfaceF、the MAC address of the router's E0 interface” 相关考题
考题 Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?() A. DHCPB. ARPC. DNSD. RARP

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?() A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address

考题 Which statement describes the process of dynamically assigning IP addresses by the DHCP server?() A. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.B. Addresses are permanently assigned so that the hosts uses the same address at all times.C. Addresses are assigned for a fixed period of time, at the end of the period, a new request for an address must be made.D. Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.

考题 Which of the following describe private IP addresses?() A. addresses chosen by a company to communicate with the InternetB. addresses that cannot be routed through the public InternetC. addresses that can be routed through the public InternetD. a scheme to conserve public addressesE. addresses licensed to enterprises or ISPs by an Internet registry organization

考题 A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。 A.10.10.0.1B.10.10.0.2C.199.99.9.33D.199.99.9.57E.200.2.2.17F.200.2.2.18

考题 When multiple routers are used in interconnected networks,the routers exchange information about ( ) using a dynamic routing protocol. A.destination addresses B.IP addresses C.work addresses D.router addresses

考题 Which of the following describe private IP addresses? (Choose two.)()A、addresses chosen by a company to communicate with the InternetB、addresses that cannot be routed through the public InternetC、addresses that can be routed through the public InternetD、a scheme to conserve public addressesE、addresses licensed to enterprises or ISPs by an Internet registry organization

考题 Which statement describes the process of dynamically assigning IP addresses by the DHCP server?()A、Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.B、Addresses are permanently assigned so that the hosts uses the same address at all times.C、Addresses are assigned for a fixed period of time, at the end of the period, a new request for an address must be made.D、Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.

考题 Which of the following describe private IP addresses?()A、addresses chosen by a company to communicate with the InternetB、addresses that cannot be routed through the public InternetC、addresses that can be routed through the public InternetD、a scheme to conserve public addressesE、addresses licensed to enterprises or ISPs by an Internet registry organization

考题 Which statements are valid for a local SPAN configuration? ()A、 Source and destination interface must be on the same hostB、 Source and destination interfaces can be on different hostsC、 Destination vEthernet interface can be on a different VLAN than the sourceD、 Destination interface can be a physical portE、 Destination interface cannot be a physical port

考题 Which information is stored in the stateful session flow table while using a stateful firewall?()A、the inside private IP address and the translated inside global IP addressB、the source and destination IP addresses, port numbers,TCP sequencing information, and additional flags for each TCP or UDP connection associated with a particular sessionC、the outbound and inbound access rules (ACL entries)D、all TCP and UDP header information only

考题 A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。A、10.10.0.1B、10.10.0.2C、199.99.9.33D、199.99.9.57E、200.2.2.17F、200.2.2.18

考题 Which of the following describe private IP addresses?()A、Addresses chosen by a company to communicate with the Internet.B、Addresses that cannot be routed through the public Internet.C、Addresses that can be routed through the public Internet.D、A scheme to conserve public addresses.E、Addresses licensed to enterprise or ISPs by an Internet registry organization.

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address

考题 What does a router do if it has no EIGRP feasible successor route to a destination network and the successor route to that destination network is inactive status?()A、It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.B、It sends a copy of its neighbor table to all adjacent routers.C、It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.D、It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.

考题 During the IPv6 address resolution, a node sends a neighbor solicitation message in order to discover which of these?()A、The Layer 2 multicast address of the destination nodeB、The solicited node multicast address of the destination nodeC、The Layer 2 address of the destination node based on the destination IPv6 addressD、The IPv6 address of the destination node based on the destination Layer 2 address

考题 Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()A、 DHCPB、 ARPC、 DNSD、 RARP

考题 Which of the following will list the destination MAC addresses?()A、pingB、digC、nbtstatD、arp

考题 In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A、to specify the destination addresses to which access is permittedB、to specify the source address permitted to access the resourceC、to specify the services to which access is permittedD、to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

考题 多选题In JUNOS Software, which three packet elements can be inspected to determine if asession already exists?()AIP protocolBIP time-to-liveCsource and destination IP addressDsource and destination MAC addressEsource and destination TCP/UDP port

考题 单选题Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()A  DHCPB  ARPC  DNSD  RARP

考题 单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()A source and destination MAC addressB source MAC address and destination network address onlyC source and destination network address onlyD source network address and destination MAC addressE source and destination MAC address and source and destination network address

考题 多选题Which of the following correctly describe steps in the OSI data encapsulation process?()AThe transport layer divides a data stream into segments and may add reliability and flow control information.BThe data link layer adds physical source and destination addresses and an FCS to the segment.CPackets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.DPackets are created when the network layer adds Layer 3 addresses and control information to a segment.EThe presentation layer translates bits into voltages for transmission across the physical link.

考题 单选题In a Junos Pulse Access Control Service firewall enforcement configuration, what is the purpose of the source IP policy?()A to specify the destination addresses to which access is permittedB to specify the source address permitted to access the resourceC to specify the services to which access is permittedD to inform the enforcer to expect policy information from the Junos Pulse Access Control Service

考题 多选题Which destination addresses will be used by Host A to send data to Host C?()Athe IP address of Switch 1Bthe MAC address of Switch 1Cthe IP address of Host CDthe MAC address of Host CEthe IP address of the router's E0 interfaceFthe MAC address of the router's E0 interface

考题 单选题What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()A Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.B Packets are distributed across the ports in the channel based on both the source and destination IP addresses.C Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.D Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.

考题 多选题When defining an application for AppFlow acceleration, which two must be configured on the WX device?()(Choose two.)ADefine application type.BEnable AppFlow for the application.CEnable monitoring for the application.DDefine source and destination IP addresses.