77.0.5.5
40.40.0.254
66.40.90.121
72.40.91.1
第1题:
A. 10.20.14.130
B. 10.18.1.1
C. 10.20.14.131
D. 10.20.106.10
第2题:
A. 10.20.106.10
B. 10.20.14.131
C. 10.181.1
D. 10.20.14.130
第3题:
阅读下面的短文,回答问题 [When an IP packet arrives at a router, generally the router looks at the destination address of the packet, and forwards the packet to one of its network interfaces. The forwarding decision is usually done by looking up the destination address from another data structure called a forwarding table. The forwarding table is created by the router using the routing table and possible routing policies existing in the router. The router then creates a table where it lists which networks are accessible through which of the router’s network interfaces. An IP router looks at every IP packet individually and does the forwarding decision on a packet-by-packet basis. If something changes in the router’s routing table, a packet can take a different route from a preceding packet even if it has the same destination.] From the paragraph above,we can see that the router ( ) a forwarding table according to the routing table and possible routing policies existing in the router. When an IP packet arrives at a router, the ( ) part of packet is normally checked by the router. An IP router checks every IP Packet individually and makes the forwarding decision based on ( ).
A.is generating B.generate C.is generated D.generates A.forwarding table B.network interfaces C.routing policies D.destination address A.the destination address and network interfaces B.forwarding table and network interfaces C.the destination address and forward table D.routing policies and routing table
第4题:
You suspect that a hacker may be performing a MAC address flooding attack somewhere within the network. Which description correctly describes a MAC address flooding attack?()
第5题:
Select the 3 best answers describing operation and configuration of Frame-Relay Inverse ARP.()
第6题:
A. 10.20.14.130
B. 10.18.1.1
C. 10.20.14.131
D. 10.20.106.10
第7题:
A.192.168.20.29
B.192.168.20.16
C.192.168.20.17
D.192.168.20.31
E.192.168.20.0
第8题:
Router VE1 has just received a packet and needs to route it. What two actions must this router take in order to route incoming packets? (Choose two)
A. Inspect the routing table to select the best path to the destination network addresses.
B. Validate sources of routing information.
C. Inspect the ARP table to verify a legitimate source MAC address for each packet.
D. Identify the destination network address of each packet.
E. Verify the receipt of routed packets by the next hop router.
F. Identify the source network address of each packet.
第9题:
When an ICMP redirect is received, which of the following options is the most appropriate to conclude?()
第10题:
Which of the following characteristics are common to both RIPv2 and RIPng?(Choose all thatapply.)()