单项选择题When two hosts are trying to communicate across a network, how does the host originating the communication determine the hardware address of the host that it wants to "talk" to?()

A. RARP request
B. Show Network Address request
C. Proxy ARP request
D. ARP request
E. Show Hardware Address request


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题Which network protocol does DNS use?()

A. FTP
B. TFTP
C. TCP
D. UDP
E. SCP

2.单项选择题Which statement describes the process of dynamically assigning IP addresses by the DHCP server?()

A. Addresses are allocated after a negotiation between the server and the host to determine the length of the agreement.
B. Addresses are permanently assigned so that the hosts uses the same address at all times.
C. Addresses are assigned for a fixed period of time, at the end of the period, a new request for an address must be made.
D. Addresses are leased to hosts, which periodically contact the DHCP server to renew the lease.

3.单项选择题On corporate network, hosts on the same VLAN can communicate with each other, but they are unable to communicate with hosts on different VLANs. What is needed to allow communication between the VLANs?()

A. a router with subinterfaces configured on the physical interface that is connected to the switch
B. a router with an IP address on the physical interface connected to the switch
C. a switch with an access link that is configured between the switches
D. a switch with a trunk link that is configured between the switches

4.单项选择题A switch is configured with all ports assigned to vlan 2 with full duplex FastEthernet to segment existing departmental traffic. What is the effect of adding switch ports to a new VLAN on the switch?()

A. More collision domains will be created.
B. IP address utilization will be more efficient.
C. More bandwidth will be required than was needed previously.
D. An additional broadcast domain will be created.

5.单项选择题Which switch would STP choose to become the root bridge in the selection process?()

A. 32768: 11-22-33-44-55-66
B. 32768: 22-33-44-55-66-77
C. 32769: 11-22-33-44-55-65
D. 32769: 22-33-44-55-66-78

7.单项选择题Where does routing occur within the DoD TCP/IP reference model?()

A. application
B. internet
C. network
D. transport

9.单项选择题For the network 192.0.2.0/23, which option is a valid IP address that can be assigned to a host?()

A. 192.0.2.0
B. 192.0.2.255
C. 192.0.3.255
D. 192.0.4.0

最新试题

The network administrator cannot to switch 1 over a telnet session,although the hosts attached to switch 1 can ping the interface Fa0/0 of the router.Given the information in the graphic and assuming that the router and switch2 are configured properly,which of the following commands should be issued on switch 1 to correct this problem?()

题型:单项选择题

At which layer of the OSI model is RSTP used to prevent loops?()

题型:单项选择题

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

题型:单项选择题

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

题型:单项选择题

An administrator must assign static IP addresses to the servers in a network.For network 192.168.20.24/29, the router is assigned the first usable host address while the sales server is given the last usable host address. Which of the following should be entered into the IP propertied box for the sales server?()

题型:单项选择题

A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()

题型:单项选择题

A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()

题型:单项选择题

Which command displays the CHAP authentication process as it occurs between two routers?()

题型:单项选择题

Which command is used to display the collection of OSPF link states?()

题型:单项选择题

Which IPsec security protocol should be used when confidentiality is required?()

题型:单项选择题