网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。

A.10.10.0.1

B.10.10.0.2

C.199.99.9.33

D.199.99.9.57

E.200.2.2.17

F.200.2.2.18


参考答案

更多 “ A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。 A.10.10.0.1B.10.10.0.2C.199.99.9.33D.199.99.9.57E.200.2.2.17F.200.2.2.18 ” 相关考题
考题 Router VE1 has just received a packet and needs to route it. What two actions must this router take in order to route incoming packets? (Choose two)A. Inspect the routing table to select the best path to the destination network addresses.B. Validate sources of routing information.C. Inspect the ARP table to verify a legitimate source MAC address for each packet.D. Identify the destination network address of each packet.E. Verify the receipt of routed packets by the next hop router.F. Identify the source network address of each packet.

考题 A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone.Which configuration statement would correctly accomplish this task?()A. from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C. from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D. from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

考题 Which configuration command controls the source IP address for packets sent to a RADIUS server?() A.radius override nas-ip-addrB.radius source-ip-address 10.13.7.55C.radius update-source-address 10.13.7.11D.radius authentication server 10.13.7.55

考题 Which of the following correctly describe steps in the OSI data encapsulation process?() A. Transport layer divides a data stream into segments adds reliability flow control informationB. Data link layer adds physical source destination address an FCS to the segmentC. Packets are created when the network layer encapsulate a frame with source destination host address protocol related control informationD. Packets are created when the network layers adds layers 3 address control information to a segmentE. The presentation layer translated bits into bits into voltages for transmission across the physical link

考题 Refer to the graphic.Host A is communicating with the seiver. What will be the source MAC address of the frames received by Host A from the server?() A.the MAC address of the seiver network interfaceB.the MAC address of host AC.the MAC address of router interface e 1D.the MAC address of router interface e0

考题 What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。 A.permit all packets matching the first three octets of the source address to all destinationsB.permit all packets matching the last octet of the destination address and accept all source addressesC.permit all packets from the third subnet of the network address to all destinationsD.permit all packets matching the host bits in the source address to all destinationsE.permit all packets to destinations matching the first three octets in the destination address

考题 What are two characteristics of Server Load Balancing router mode?()A、 The design supports multiple server subnets Cisco 642-874: Practice ExamB、 An end-user sees the IP address of the real serverC、 SLB routes between the outside and inside subnetsD、 The source or destination MAC address is rewritten, but the IP addresses left aloneE、 SLB acts as a "bump in the wire" between servers and upstream firewall or Layer 3 devices

考题 Which of the following correctly describe steps in the OSI data encapsulation process?()A、The transport layer divides a data stream into segments and may add reliability and flow control information.B、The data link layer adds physical source and destination addresses and an FCS to the segment.C、Packets are created when the network layer encapsulates a frame with source and destination host addresses and protocol-related control information.D、Packets are created when the network layer adds Layer 3 addresses and control information to a segment.E、The presentation layer translates bits into voltages for transmission across the physical link.

考题 Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。A、The MAC address of the NIC in Host 1B、The MAC address of the NIC in server 1C、The MAC address of the Fa0/0 interface of router R1D、The MAC address of the s0/0/0 interface of the router R2

考题 What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()A、Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.B、Packets are distributed across the ports in the channel based on both the source and destination IP addresses.C、Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.D、Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.

考题 Which of the following correctly describe steps in the OSI data encapsulation process?()A、Transport layer divides a data stream into segments adds reliability flow control informationB、Data link layer adds physical source destination address an FCS to the segmentC、Packets are created when the network layer encapsulate a frame with source destination host address protocol related control informationD、Packets are created when the network layers adds layers 3 address control information to a segmentE、The presentation layer translated bits into bits into voltages for transmission across the physical link

考题 Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。A、Host 1 addresses the frames to the MAC address of router R1B、Host 1 looks in its ARP cache for the MAC address of router R1C、Host 1 addresses the frames to the MAC address of web server 2D、Host 1 sends the packets to router R1 to be forwarded to web server 2E、Host 1 sends a broadcast ARP request to obtain the MAC address of webserver2

考题 The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.0 0.0.0.255 any What is the effect of this access list configuration?()A、permit all packets matching the first three octets of the source address to all destinationsB、permit all packet matching the last octet of the destination address and accept all source addressesC、permit all packet matching the host bits in the source address to all destinationsD、permit all packet from the third subnet of the network address to all destinations

考题 A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。A、10.10.0.1B、10.10.0.2C、199.99.9.33D、199.99.9.57E、200.2.2.17F、200.2.2.18

考题 Which destination addresses will be used by Host A to send data to Host C?()A、the IP address of Switch 1B、the MAC address of Switch 1C、the IP address of Host CD、the MAC address of Host CE、the IP address of the router's E0 interfaceF、the MAC address of the router's E0 interface

考题 What is the effect of the following access list condition access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。A、permit all packets matching the first three octets of the source address to all destinationsB、permit all packets matching the last octet of the destination address and accept all source addressesC、permit all packets from the third subnet of the network address to all destinationsD、permit all packets matching the host bits in the source address to all destinationsE、permit all packets to destinations matching the first three octets in the destination address

考题 Which of one the following fields is contained within an IEEE Ethernet frame header?()A、source and destination MAC addressB、source MAC address and destination network address onlyC、source and destination network address onlyD、source network address and destination MAC addressE、source and destination MAC address and source and destination network address

考题 单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in a zone called UNTRUST to the address book entry Server in a zone called TRUST. However, the administrator does not want the server to be able to initiate any type of traffic from the TRUST zone to the UNTRUST zone. Which configuration statement would correctly accomplish this task?()A from-zone UNTRUST to-zone TRUST { policy DenyServer { match { source-address any; destination-address any; application any; } then { deny; } } } from-zone TRUST to-zone UNTRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }B from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then {deny; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }C from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match { source-address the10net; destination-address Server; application junos-ftp; } then { permit; } } }D from-zone TRUST to-zone UNTRUST { policy DenyServer { match { source-address Server; destination-address any; application any; } then { permit; } } } from-zone UNTRUST to-zone TRUST { policy AllowTelnetin { match {source-address the10net; destination-address Server; application junos-telnet; } then { permit; } } }

考题 单选题Which configuration command controls the source IP address for packets sent to a RADIUS server?()A radius override nas-ip-addrB radius source-ip-address 10.13.7.55C radius update-source-address 10.13.7.11D radius authentication server 10.13.7.55

考题 单选题What is the effect of the following access list condition?  access-list 101 permit ip 10.25.30.0 0.0.0.255 any()。A permit all packets matching the first three octets of the source address to all destinationsB permit all packets matching the last octet of the destination address and accept all source addressesC permit all packets from the third subnet of the network address to all destinationsD permit all packets matching the host bits in the source address to all destinationsE permit all packets to destinations matching the first three octets in the destination address

考题 单选题The following configuration line was added to router R1 Access-list 101 permit ip 10.25.30.00.0.0.255 any What is the effect of this access list configuration?()A ermit all packets matching the first three octets of the source address to all destinationsB permit all packet matching the last octet of the destination address and accept all source addressesC permit all packet matching the host bits in the source address to all destinationsD permit all packet from the third subnet of the network address to all destinations

考题 单选题Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。A The MAC address of the NIC in Host 1B The MAC address of the NIC in server 1C The MAC address of the Fa0/0 interface of router R1D The MAC address of the s0/0/0 interface of the router R2

考题 单选题R1 forwards a packet from Host 1 to remote Server 1. Which statement describes the use of a MAC as the frame carrying this packet leaves the s0/0/0 interface of R1()。A The frame does not have MAC addresses.B The source MAC address in the frame is the MAC address of the NIC of Host 1.C The source MAC address in the frame is the MAC address of the s0/0/0 interface of R1.D The destination MAC address in the frame is the MAC address of the NICof server 1.E The destination MAC address in the frame is the MAC address of the s0/0/0 interface of R2

考题 单选题A host on the LAN is accessing an FTP server across the Internet. Which of the following addresses could appear as a source address for the packets forwarded by the router to the destination server()。A 10.10.0.1B 10.10.0.2C 199.99.9.33D 199.99.9.57E 200.2.2.17F 200.2.2.18

考题 多选题Which destination addresses will be used by Host A to send data to Host C?()Athe IP address of Switch 1Bthe MAC address of Switch 1Cthe IP address of Host CDthe MAC address of Host CEthe IP address of the router's E0 interfaceFthe MAC address of the router's E0 interface

考题 多选题Host 1 has just started up and requests a web page from web server 2. Which two statements describe steps in the process Host 1 uses to send the request to web server 2 (choose two)()。AHost 1 addresses the frames to the MAC address of router R1BHost 1 looks in its ARP cache for the MAC address of router R1CHost 1 addresses the frames to the MAC address of web server 2DHost 1 sends the packets to router R1 to be forwarded to web server 2EHost 1 sends a broadcast ARP request to obtain the MAC address of webserver2

考题 单选题What is the result of entering the command port-channel load-balance src-dst-ip on an EtherChannel link? ()A Packets are distributed across the ports in the channel based on both the source and destination MAC addresses.B Packets are distributed across the ports in the channel based on both the source and destination IP addresses.C Packets are balanced across the ports in the channel based first on the source MAC address, then on the destination MAC address, then on the IP address.D Packets are distributed across the access ports in the channel based first on the source IP address and then the destination IP addresses.