单项选择题What will an Ethernet switch do if it receives a unicast frame with a destination MAC that is listed in the switch table?()

A.The switch will not forward unicast frames.
B.The switch will forward the frame to a specific port.
C.The switch will return a copy of the frame out the source port.
D.The switch will remove the destination MAC from the switch table.
E.The switch will forward the frame to all ports except the port on which it was received.


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题Which of the following are key characteristics of PPP? (Choose three.)()

A.can be used over analog circuits
B.maps Layer 2 to Layer 3 address
C.encapsulates several routed protocols
D.supports IP only
E.provides error correction

2.多项选择题What TCP/IP stack configuration features can DHCP provide, in addition to assigning an IP address? (Choose three.)()

A.default gateway
B.DNS servers
C.FTP server
D.helper address
E.subnet mask
F.TFTP server

3.多项选择题What are two characteristics of Telnet? (Choose two.)()

A.It sends data in clear text format.
B.It is no longer supported on Cisco network devices.
C.It is more secure than SSH
D.It requires an enterprise license in order to be implemented.
E.It requires that the destination device be configured to support Telnet connections.

4.单项选择题Which of the following is true regarding the use of switches and hubs for network connectivity?()

A.Switches take less time to process frames than hubs take.
B.Switches do not forward broadcasts.
C.Hubs can filter frames.
D.Using hubs can increase the amount of bandwidth available to hosts.
E.Switches increase the number of collision domains in the network.

5.多项选择题Which statements are true about EIGRP successor routes? (Choose two.)()

A.A successor route is used by EIGRP to forward traffic to a destination.
B.Successor routes are saved in the topology table to be used if the primary route fails.
C.Successor routes are flagged as "active" in the routing table.
D.A successor route may be backed up by a feasible successor route.
E.Successor routes are stored in the neighbor table following the discovery process.

6.多项选择题The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? (Choose two.)()

A.Switch1(config-if)# switchport port-security maximum 1
B.Switch1(config)# mac-address-table secure
C.Switch1(config)# access-list 10 permit ip host
D.Switch1(config-if)# switchport port-security violation shutdown
E.Switch1(config-if)# ip access-group 10

7.多项选择题Why does the data communication industry use the layered OSI reference model? (Choose two.)()

A.It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.
B.It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.
C.It supports the evolution of multiple competing standards, and thus provides business opportunities for equipment manufacturers.
D.It encourages industry standardization by defining what functions occur at each layer of the model.
E.It provides a means by which changes in functionality in one layer require changes in other layers.

10.多项选择题The OSPF Hello protocol performs which of the following tasks? (Choose two.)()

A.It provides dynamic neighbor discovery.
B.It detects unreachable neighbors in 90 second intervals.
C.It maintains neighbor relationships.
D.It negotiates correctness parameters between neighboring interfaces.
E.It uses timers to elect the router with the fastest links as the designated router.
F.It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF

最新试题

Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()

题型:单项选择题

An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()

题型:单项选择题

Which command is used to display the collection of OSPF link states?()

题型:单项选择题

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()

题型:单项选择题

Which IPsec security protocol should be used when confidentiality is required?()

题型:单项选择题

You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()

题型:单项选择题

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

题型:单项选择题

What is the subnetwork address for a host with the IP address 201.100.5.68/28?()

题型:单项选择题

At which layer of the OSI model dose PPP perform?()

题型:单项选择题

After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()

题型:单项选择题