网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following will list the destination MAC addresses?()
A

ping

B

dig

C

nbtstat

D

arp


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following will list the destination MAC addresses?()A pingB digC nbtstatD arp” 相关考题
考题 WhichofthefollowingwilllistthedestinationMACaddresses?() A.pingB.digC.nbtstatD.arp

考题 AnadministratorisinchargeofseveralremoteserversinJapan.Userscallandcomplaintheycannotconnecttothecompany’sresourceslocatedonthoseservers.Whichofthefollowingcommandswouldallowtheadministratortoverifytheserversarerunning?()A.pingB.netstatC.nbtstatD.telnet

考题 Which of the following tools allows an administrator to determine the MAC address of another computer?() A.pingB.arpC.ifconfigD.ipconfig

考题 Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?() A. DHCPB. ARPC. DNSD. RARP

考题 Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?() A.GatewayB.HubC.BridgeD.Router

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?() A. source and destination MAC addressB. source MAC address and destination network address onlyC. source and destination network address onlyD. source network address and destination MAC addressE. source and destination MAC address and source and destination network address

考题 In GLBP, which router will respond to client ARP requests?() A.The active virtual gateway will reply with one of four possible virtual MAC addresses.B.All GLBP member routers will reply in round-robin fashion.C.The active virtual gateway will reply with its own hardware MAC address.D.The GLBP member routers will reply with one of four possible burned in hardware addresses

考题 In GLBP, which router will respond to client ARP requests?()A、The active virtual gateway will reply with one of four possible virtual MAC addresses.B、All GLBP member routers will reply in round-robin fashion.C、The active virtual gateway will reply with its own hardware MAC address.D、The GLBP member routers will reply with one of four possible burned in hardware addresses

考题 What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()A、Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.B、Packets are distributed across the ports in the channel based on both the source and destination IP addresses.C、Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.D、Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.

考题 An administrator is in charge of several remote servers in Japan. Users call and complain they cannot connect to the company’s resources located on those servers. Which of the following commands would allow the administrator to verify the servers are running?()A、pingB、netstatC、nbtstatD、telnet

考题 Which of the following tools allows an administrator to determine the MAC address of another computer?()A、pingB、arpC、ifconfigD、ipconfig

考题 What information is used by a switch to forward an Ethernet frame to its destination?()A、IP addressB、destination MAC addressC、ARP table entryD、FCS checksum

考题 You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G、None of the other alternatives apply

考题 Which destination addresses will be used by Host A to send data to Host C?()A、the IP address of Switch 1B、the MAC address of Switch 1C、the IP address of Host CD、the MAC address of Host CE、the IP address of the router's E0 interfaceF、the MAC address of the router's E0 interface

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address

考题 Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A、RepeaterB、HubC、RouterD、Switch

考题 Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?()A、GatewayB、HubC、BridgeD、Router

考题 Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()A、 DHCPB、 ARPC、 DNSD、 RARP

考题 Which of the following will list the destination MAC addresses?()A、pingB、digC、nbtstatD、arp

考题 单选题Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()A  DHCPB  ARPC  DNSD  RARP

考题 单选题You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()A The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.B Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.C The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.D The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.E The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.F Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.G None of the other alternatives apply

考题 单选题Which of the following protocols is responsible for the resolution of IP addresses to MAC addresses?()A DHCPB ARPC DNSD RARP

考题 单选题What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()A Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.B Packets are distributed across the ports in the channel based on both the source and destination IP addresses.C Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.D Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.

考题 单选题Which of the following is an intelligent repeater that is aware of the MAC addresses of the nodeson either side of the data link?()A GatewayB HubC BridgeD Router

考题 单选题Which of one the following fields is contained within an IEEE Ethernet frame header?()A source and destination MAC addressB source MAC address and destination network address onlyC source and destination network address onlyD source network address and destination MAC addressE source and destination MAC address and source and destination network address

考题 单选题Which of the following devices is used to move frames between a source and destination basedon a MAC address?()A RepeaterB HubC RouterD Switch

考题 单选题In GLBP, which router will respond to client ARP requests?()A The active virtual gateway will reply with one of four possible virtual MAC addresses.B All GLBP member routers will reply in round-robin fashion.C The active virtual gateway will reply with its own hardware MAC address.D The GLBP member routers will reply with one of four possible burned in hardware addresses

考题 单选题Which of the following will list the destination MAC addresses?()A pingB digC nbtstatD arp