单项选择题What does a Layer 2 switch use to decide where to forward a received frame?()

A. source MAC address
B. source IP address
C. source switch port
D. destination IP address
E. destination port address
F. destination MAC address


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题What does a Layer 2 switch do if it receives a frame with a destination MAC address that is not found in its MAC address table?()

A. The frame is dropped.
B. The frame is addressed with a broadcast MAC address and sent out all ports.
C. The frame is sent out all ports except the receiving port.
D. An ARP request is sent out all ports except the receiving port.
E. A destination unreachable message is sent back to the source address.
F. None of the above.

2.多项选择题With regard to Ethernet media access methods, which of the following are true?()

A. A device waits for an electronic signal before transmitting.
B. A device listens and waits until the media is not busy before transmitting.
C. All devices on an Ethernet segment see data that passes on the network medium.
D. Only the sender and the receiver devices see data that passes on the network medium.
E. Ethernet networks allow you to configured devises with higher transmission priority.

3.单项选择题Which of the following are true of Ethernet technology?()

A. Hosts use a logical ring topology.
B. Hosts use a logical bus topology
C. Hosts must wait for an electronic signal to transfer data.
D. Hosts are directly connected to a wiring concentrator called a MSAU.

4.多项选择题Two stations on a LAN transmit at the same time, resulting in a collision. What happens when a collision occurs on the network?()

A. Each device on the Ethernet segment stops transmitting for a short time.
B. A jam signal informs all devices that a collision occurred.
C. When data transmission resumes, the devices that were involved in the collision have priority to transmit.
D. The devices that are involved in the collision stops transmitting for a short time.
E. The collision invokes a random back-off algorithm.

5.单项选择题Which of the addresses below is an example of a valid unicast address?()

A.172.31.128.255./18
B.255.255.255.255
C.192.168.24.59/30
D.224.0.0.5
E.All of the above

6.单项选择题Which one of the protocols below allows a router to respond to an ARP request destined to a remote host?()

A. Gateway DP
B. Reverse ARP
C. proxy ARP
D. Inverse ARP
E. indirect ARP

7.单项选择题Which of the following processes, is used to find the hardware address of a LAN device?()

A. Inverse-ARP
B. Reverse-ARP
C. Proxy ARP
D. ARP

8.多项选择题Which of the following are actual varieties of network crosstalk?()

A. near-end crosstalk(NEXT)
B. middle open-end crosstalk(MOEXT)
C. power sum near-end crosstalk(PSNEXT)
D. jitterry crosstalk(JEXT)
E. far end crosstalk(FEXT)

10.单项选择题What is the maximum data rate specified by the IEEE 802.11B standard for wireless LANS?()

A. 10 Mbps
B. 11 Mbps
C. 54 Mbps
D. 100 Mbps
E. none of the above

最新试题

TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()

题型:多项选择题

Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()

题型:多项选择题

Which statement describes the rule of split horizon?()

题型:单项选择题

Which connections allow the use of full-duplex Ethernet?()

题型:多项选择题

What is a global command?()

题型:单项选择题

Which of the following contribute to congestion on an Ethernet network?()

题型:多项选择题

Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()

题型:单项选择题

Which Frame Relay feature is responsible for transmitting keepalives to ensure that the PVC does not shut down because of inactivity?()

题型:单项选择题

Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()

题型:多项选择题

Which of the following correctly describe steps in the OSI data encapsulation process?()

题型:多项选择题