A. The frame is dropped.
B. The frame is addressed with a broadcast MAC address and sent out all ports.
C. The frame is sent out all ports except the receiving port.
D. An ARP request is sent out all ports except the receiving port.
E. A destination unreachable message is sent back to the source address.
F. None of the above.
您可能感興趣的試卷
你可能感興趣的試題
A. A device waits for an electronic signal before transmitting.
B. A device listens and waits until the media is not busy before transmitting.
C. All devices on an Ethernet segment see data that passes on the network medium.
D. Only the sender and the receiver devices see data that passes on the network medium.
E. Ethernet networks allow you to configured devises with higher transmission priority.
A. Hosts use a logical ring topology.
B. Hosts use a logical bus topology
C. Hosts must wait for an electronic signal to transfer data.
D. Hosts are directly connected to a wiring concentrator called a MSAU.
A. Each device on the Ethernet segment stops transmitting for a short time.
B. A jam signal informs all devices that a collision occurred.
C. When data transmission resumes, the devices that were involved in the collision have priority to transmit.
D. The devices that are involved in the collision stops transmitting for a short time.
E. The collision invokes a random back-off algorithm.
A.172.31.128.255./18
B.255.255.255.255
C.192.168.24.59/30
D.224.0.0.5
E.All of the above
A. Gateway DP
B. Reverse ARP
C. proxy ARP
D. Inverse ARP
E. indirect ARP
最新試題
Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational? ()
What does a configuration Register Setting of 0x2105 indicate to the Router? ()
Identify three valid host addresses in the 192.168.27.0 network with a subnet mask of 255.255.255.240. ()
Which of the following statements regarding routed and routing protocols are true?()
Which statement describes the rule of split horizon?()
A router with a serial interface will be used for an ISDN link.What other function group devices are required to complete the connection to the service provider? ()
Given a subnet mask of 255.255.255.224, which of the following addresses can be assigned to network hosts?()
Which of the following correctly describe steps in the OSI data encapsulation process?()
Five minutes after issuing the show running-config command, a technician enters the command again and notices that several access list statements have been altered. Because of this, the technician believes that the router is being configured by an unknown person through Telnet. Before changing the router passwords, the technician would like to discover if anyone is connected to the router by Telnet and stop them from making further changes.Which commands will accomplish these options?()
TestKing.com has allocated the IP add 199.144.27.0 is its network, to provide flexibility for the LAN design, a subnet mask of 255.255.255.240 has been chosen. Which of the following address can be assigned to LAN on the resulting subnets.()