itgle.com

After replacing the NIC card of a PC on the LAN, your Cisco switch shows a new MAC address is attached to that port. Which of the following answer choices below correctly describe a MAC address?()A. It is a globally unique IP address.B. It is a globally u

题目
After replacing the NIC card of a PC on the LAN, your Cisco switch shows a new MAC address is attached to that port. Which of the following answer choices below correctly describe a MAC address?()

A. It is a globally unique IP address.

B. It is a globally unique 48 bit address

C. It is provided by the manufacturer of the NIC.

D. It is used as part of the IPX/SPX configuration.

E. It is a logical address.


相似考题
参考答案和解析
参考答案:B, C
更多“After replacing the NIC card of a PC on the LAN, your Cisco switch shows a new MAC address is attached to that port. Which of the following answer choices below correctly describe a MAC address?() ”相关问题
  • 第1题:

    After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()

    • A、The port’s violation mode is set to restrict
    • B、The port is shut down
    • C、The MAC address table is cleared and the new MAC address is entered into the table
    • D、The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out

    正确答案:B

  • 第2题:

    Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。

    • A、The MAC address of the NIC in Host 1
    • B、The MAC address of the NIC in server 1
    • C、The MAC address of the Fa0/0 interface of router R1
    • D、The MAC address of the s0/0/0 interface of the router R2

    正确答案:C

  • 第3题:

    You suspect that a hacker may be performing a MAC address flooding attack somewhere within the    network.  Which description correctly describes a MAC address flooding attack?()

    • A、The attacking device spoofs a source MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • B、Frames with unique, invalid destination MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • C、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the destination address found in the Layer 2 frames sent by the valid network device.
    • D、The attacking device crafts ARP replies intended for valid hosts. The MAC address of the attacking device then becomes the source address found in the Layer 2 frames sent by the valid network device.
    • E、The attacking device spoofs a destination MAC address of a valid host currently in the CAM table. The switch then forwards frames destined for the valid host to the attacking device.
    • F、Frames with unique, invalid source MAC addresses flood the switch and exhaust CAM table space. The result is that new entries cannot be inserted because of the exhausted CAM table space, and traffic is subsequently flooded out all ports.
    • G、None of the other alternatives apply

    正确答案:F

  • 第4题:

    Which two range descriptions correctly describe IP addressing to use when enabling multicast support using the Cisco Unified Wireless Solution?()

    • A、globally scoped address range
    • B、239.0.0.X or 239.128.0.X address range
    • C、administratively scoped address range that does not overlap with a link-local MAC address
    • D、any Class D address range
    • E、site-local scoped address range

    正确答案:C,E

  • 第5题:

    Which destination addresses will be used by Host A to send data to Host C?()

    • A、the IP address of Switch 1
    • B、the MAC address of Switch 1
    • C、the IP address of Host C
    • D、the MAC address of Host C
    • E、the IP address of the router's E0 interface
    • F、the MAC address of the router's E0 interface

    正确答案:C,F

  • 第6题:

    The MAC address for your PC NIC is: C9-3F-32-B4-DC-19. What is the address of the OUI portion of this NIC card, expressed as a binary number?()

    • A、11001100-00111111-00011000
    • B、11000110-11000000-00011111
    • C、11001110-00011111-01100000
    • D、11001001-00111111-00110010
    • E、11001100-01111000-00011000
    • F、11111000-01100111-00011001

    正确答案:D

  • 第7题:

    Which of the following devices is used to move frames between a source and destination basedon a MAC address?()

    • A、Repeater
    • B、Hub
    • C、Router
    • D、Switch

    正确答案:D

  • 第8题:

    单选题
    Which of one the following fields is contained within an IEEE Ethernet frame header?()
    A

    source and destination MAC address

    B

    source MAC address and destination network address only

    C

    source and destination network address only

    D

    source network address and destination MAC address

    E

    source and destination MAC address and source and destination network address


    正确答案: A
    解析: 暂无解析

  • 第9题:

    多选题
    The EtherChannel between your LAN switch and the Internet router is not load-balancing efficiently. On the switch, there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing?()
    A

    source IP address

    B

    destination IP address

    C

    per-packet load balance

    D

    destination MAC address

    E

    source MAC address


    正确答案: E,A
    解析: 暂无解析

  • 第10题:

    单选题
    Which of the following is the MOST likely cause of a low wireless signal after an internal wireless adapter on a laptop was replaced?()
    A

    The wireless card must be calibrated to the laptop.

    B

    The correct preshared encryption key must be installed to boost the signal.

    C

    The MAC address of the new wireless card will have to be added to the WAP to get the full signal.

    D

    The antenna wires for the wireless card were not attached.


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    After enabling port security on a Cisco Catalyst switch, what is the default action when the configuredmaximum of allowed MAC addresses value is exceeded?()
    A

    The port’s violation mode is set to restrict

    B

    The port is shut down

    C

    The MAC address table is cleared and the new MAC address is entered into the table

    D

    The port remains enabled, but bandwidth is throttled until old MAC addresses are aged out


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    The MAC address for your PC NIC is: C9-3F-32-B4-DC-19. What is the address of the OUI portion of this NIC card, expressed as a binary number?()
    A

    11001100-00111111-00011000

    B

    11000110-11000000-00011111

    C

    11001110-00011111-01100000

    D

    11001001-00111111-00110010

    E

    11001100-01111000-00011000

    F

    11111000-01100111-00011001


    正确答案: D
    解析: 暂无解析

  • 第13题:

    After replacing the NIC card of a PC on the LAN, your Cisco switch shows a new MAC address is attached to that port. Which of the following answer choices below correctly describe a MAC address?()

    • A、It is a globally unique IP address.
    • B、It is a globally unique 48 bit address
    • C、It is provided by the manufacturer of the NIC.
    • D、It is used as part of the IPX/SPX configuration.
    • E、It is a logical address.

    正确答案:B,C

  • 第14题:

    A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()

    • A、 network
    • B、 application
    • C、 session
    • D、 data link

    正确答案:D

  • 第15题:

    You are responsible for increasing the security within the Company LAN. Of the following choices  listed below,  which is true regarding layer 2 security and mitigation techniques? ()

    • A、 Enable root guard to mitigate ARP address spoofing attacks.
    • B、 Configure DHCP spoofing to mitigate ARP address spoofing attacks.
    • C、 Configure PVLANs to mitigate MAC address flooding attacks.
    • D、 Enable root guard to mitigate DHCP spoofing attacks.
    • E、 Configure dynamic APR inspection (DAI) to mitigate IP address spoofing on DHCP untrusted  ports.
    • F、 Configure port security to mitigate MAC address flooding  
    • G、 None of the other alternatives apply

    正确答案:F

  • 第16题:

    A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()

    • A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command
    • B、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command
    • C、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them
    • D、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

    正确答案:C

  • 第17题:

    Which of one the following fields is contained within an IEEE Ethernet frame header?()

    • A、source and destination MAC address
    • B、source MAC address and destination network address only
    • C、source and destination network address only
    • D、source network address and destination MAC address
    • E、source and destination MAC address and source and destination network address

    正确答案:A

  • 第18题:

    Which of the following is the MOST likely cause of a low wireless signal after an internal wireless adapter on a laptop was replaced?()

    • A、The wireless card must be calibrated to the laptop.
    • B、The correct preshared encryption key must be installed to boost the signal.
    • C、The MAC address of the new wireless card will have to be added to the WAP to get the full signal.
    • D、The antenna wires for the wireless card were not attached.

    正确答案:D

  • 第19题:

    单选题
    In Windows XP, which command can be used to view both the IP address and the NIC (network interface card) MAC address?()
    A

    IPCONFIG/A

    B

    IPCONFIG/ALL

    C

    IPCONFIG

    D

    WINIPCFG


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    Host 1 receives a file from remote server 1. Which MAC address appears as the source address in the header of the frames received by Host 1()。
    A

    The MAC address of the NIC in Host 1

    B

    The MAC address of the NIC in server 1

    C

    The MAC address of the Fa0/0 interface of router R1

    D

    The MAC address of the s0/0/0 interface of the router R2


    正确答案: A
    解析: 暂无解析

  • 第21题:

    多选题
    After replacing the NIC card of a PC on the LAN, your Cisco switch shows a new MAC address is attached to that port. Which of the following answer choices below correctly describe a MAC address?()
    A

    It is a globally unique IP address.

    B

    It is a globally unique 48 bit address

    C

    It is provided by the manufacturer of the NIC.

    D

    It is used as part of the IPX/SPX configuration.

    E

    It is a logical address.


    正确答案: E,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which destination addresses will be used by Host A to send data to Host C?()
    A

    the IP address of Switch 1

    B

    the MAC address of Switch 1

    C

    the IP address of Host C

    D

    the MAC address of Host C

    E

    the IP address of the router's E0 interface

    F

    the MAC address of the router's E0 interface


    正确答案: D,B
    解析: 暂无解析

  • 第23题:

    单选题
    Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()
    A

    Static secure MAC address

    B

    Dynamic secure MAC address

    C

    Pervasive secure MAC address

    D

    Sticky secure MAC address


    正确答案: B
    解析: 暂无解析