网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Given the following routing table entries, which of the following will the next-hop address be for a packet destined for the address 192.168.1.203?()
A

77.0.5.5

B

40.40.0.254

C

66.40.90.121

D

72.40.91.1


参考答案

参考解析
解析: 暂无解析
更多 “单选题Given the following routing table entries, which of the following will the next-hop address be for a packet destined for the address 192.168.1.203?()A 77.0.5.5B 40.40.0.254C 66.40.90.121D 72.40.91.1” 相关考题
考题 阅读下面的短文,回答问题 [When an IP packet arrives at a router, generally the router looks at the destination address of the packet, and forwards the packet to one of its network interfaces. The forwarding decision is usually done by looking up the destination address from another data structure called a forwarding table. The forwarding table is created by the router using the routing table and possible routing policies existing in the router. The router then creates a table where it lists which networks are accessible through which of the routers network interfaces. An IP router looks at every IP packet individually and does the forwarding decision on a packet-by-packet basis. If something changes in the routers routing table, a packet can take a different route from a preceding packet even if it has the same destination.] From the paragraph above,we can see that the router ( ) a forwarding table according to the routing table and possible routing policies existing in the router. When an IP packet arrives at a router, the ( ) part of packet is normally checked by the router. An IP router checks every IP Packet individually and makes the forwarding decision based on ( ).A.is generating B.generate C.is generated D.generates A.forwarding table B.network interfaces C.routing policies D.destination address A.the destination address and network interfaces B.forwarding table and network interfaces C.the destination address and forward table D.routing policies and routing table

考题 Router VE1 has just received a packet and needs to route it. What two actions must this router take in order to route incoming packets? (Choose two)A. Inspect the routing table to select the best path to the destination network addresses.B. Validate sources of routing information.C. Inspect the ARP table to verify a legitimate source MAC address for each packet.D. Identify the destination network address of each packet.E. Verify the receipt of routed packets by the next hop router.F. Identify the source network address of each packet.

考题 Using the routing table shown in the exhibit, what will be the next-hop IP address used for a destination IP address of 192.168.1.1?() A. 10.20.14.130B. 10.18.1.1C. 10.20.14.131D. 10.20.106.10

考题 Given the routing entries shown in the exhibit, which next-hop IP address will be used for the destination IP address 192.168.1.159?() A. 10.20.14.130B. 10.18.1.1C. 10.20.14.131D. 10.20.106.10

考题 Given the routing entries shown in the exhibit, which next-hop IP address will be used for die destination IP address 192.168.1.142? () A. 10.20.106.10B. 10.20.14.131C. 10.181.1D. 10.20.14.130

考题 Given the address 192.168.20.19/28, which of the following are valid host addresses on this subnet?() A.192.168.20.29B.192.168.20.16C.192.168.20.17D.192.168.20.31E.192.168.20.0

考题 Select the 3 best answers describing operation and configuration of Frame-Relay Inverse ARP.()A、Dynamic address mapping uses Frame Relay Inverse ARP to request the next-hop protocol address for a specific connection on its known DLCIB、Responses to Inverse ARP requests are entered in an address-to-DLCI mapping table on the router or access server which is used to supply the next-hop protoco address or the DLCI for outgoing trafficC、Inverse ARP is enabled by default for all protocols enabled on the physical interfaceD、Inverse ARP is configured using the following command under the Interface configuration ’frame-relaymap dlci (dlci number) protocol protocol-address’E、Inverse ARP in Frame-Relay is synonymous of ARP in Ethernet

考题 When an ICMP redirect is received, which of the following options is the most appropriate to conclude?()A、A routing table has changedB、The IP address has changedC、The system has become a gatewayD、A hacker is posing a threat to the system

考题 You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply

考题 Which of the following characteristics are common to both RIPv2 and RIPng?(Choose all thatapply.)()A、Link-local address used for next-hop addressesB、Interface can be added to RIP routing process in either interface configuration mode or in routerconfiguration modeC、Uses a multicast to send routing updatesD、Use hop count as a metricE、Distance-vector routing protocolF、Maximum hop count is 15 with 16 being "unreachable"

考题 Given the address 192.168.20.19/28, which of the following are valid host addresses on this subnet?()A、192.168.20.29B、192.168.20.16C、192.168.20.17D、192.168.20.31E、192.168.20.0

考题 Which of these tables is used by an LSR to perform a forwarding lookup for a packet destined to an address within an RFC 4364 VPN?()A、CEFB、FIBC、LFIBD、IGP

考题 Which of the following commands provides data plane information required to forward a packet toa specific ip address?()A、sh ip routeB、sh ip cef 〈ip_address〉C、sh adjacency 〈ip_address〉D、sh ip route 〈ip_addres$〉E、sh ip adjacency 〈/p_address〉F、sh ip cef 〈mac_addrQss〉〈ip_address〉

考题 给了两段documentation里的描述,问这个时候发哪种类型的ICMP包。 The interface on which the packet comes into the router is the same interface on which the packet gets routed out. The subnet or network of the source IP address is on the same subnet or network of the next-hop IP address of the routed packet.

考题 When configuring an interface using SMIT and Further Configuration with an IP address and netmask, which of the following outcomes indicates how the routing tables will be affected?()A、A subnet route is automatically addedB、A default route is automatically addedC、All other routes are automatically addedD、The routing table is not affected

考题 单选题Which of the following answer choices is an additional parameter which must be supplied before the IGRP routing process can initialize?()A Connected subnet numbersB Register administrative subnet masksC IP address maskD Autonomous system numberE Metric weights

考题 单选题Which of the following processes translates a private IP address for a public IP address?()A NATB DNSC DHCPD PAT

考题 单选题Which of the following commands provides data plane information required to forward a packet toa specific ip address?()A sh ip routeB sh ip cef 〈ip_address〉C sh adjacency 〈ip_address〉D sh ip route 〈ip_addres$〉E sh ip adjacency 〈/p_address〉F sh ip cef 〈mac_addrQss〉〈ip_address〉

考题 问答题给了两段documentation里的描述,问这个时候发哪种类型的ICMP包。 The interface on which the packet comes into the router is the same interface on which the packet gets routed out. The subnet or network of the source IP address is on the same subnet or network of the next-hop IP address of the routed packet.

考题 多选题Which of the following characteristics are common to both RIPv2 and RIPng?(Choose all thatapply.)()ALink-local address used for next-hop addressesBInterface can be added to RIP routing process in either interface configuration mode or in routerconfiguration modeCUses a multicast to send routing updatesDUse hop count as a metricEDistance-vector routing protocolFMaximum hop count is 15 with 16 being unreachable

考题 单选题Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network. Which of the following answers best describes the router's logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD When permitted by an ACL that was referenced in the associated crypto map

考题 单选题Which of these tables is used by an LSR to perform a forwarding lookup for a packet destined to an address within an RFC 4364 VPN?()A CEFB FIBC LFIBD IGP

考题 单选题Given the routing entries shown in the exhibit, which next-hop IP address will be used for the destination IP address 192.168.1.142?()A 10.20.106.10B 10.20.14.131C 10.18.1.1D 10.20.14.130

考题 单选题A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A DHCPB ARPC DNSD PING

考题 单选题Which of the following is true about an IP address if the first bit is a zero?()A The address is a Class A address.B The address is a Class B address.C The address is a Class C address.D The address is a Class D address.

考题 单选题When configuring an interface using SMIT and Further Configuration with an IP address and netmask, which of the following outcomes indicates how the routing tables will be affected?()A A subnet route is automatically addedB A default route is automatically addedC All other routes are automatically addedD The routing table is not affected

考题 单选题When an ICMP redirect is received, which of the following options is the most appropriate to conclude?()A A routing table has changedB The IP address has changedC The system has become a gatewayD A hacker is posing a threat to the system