A layer 3 switch can move packets between subnets based on which of the following criteria?()A、802.1q tagB、PortC、ApplicationD、IP address

题目

A layer 3 switch can move packets between subnets based on which of the following criteria?()

  • A、802.1q tag
  • B、Port
  • C、Application
  • D、IP address
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

What are two characteristics of SLB router mode?()

A. The design supports multiple server subnets.

B. An end-user sees the IP address of the real server.

C. SLB routes between the outside and inside subnets.

D. The source or destination MAC address is rewritten, but the IP addresses left alone.

E. SLB acts as a "bump in the wire" between servers and upstream firewall or Layer 3 devices.


参考答案:A, C

第2题:

Which two of these are characteristics of MPLS VPNs?()

A. Layer 3 MPLS VPNs can forward only IP packets

B. Layer 2 MPLS VPNs can forward any network protocol

C. MPLS label paths are automatically formed based on Layer 2 frames

D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames

E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies


参考答案:A, B

第3题:

A layer 3 switch can move packets between subnets based on which of the following criteria?()

A. 802.1q tag

B. Port

C. Application

D. IP address


参考答案:D

第4题:

Which of the following is a characteristic of a data center core?()

  • A、 Server-to-server traffic always remains in the core layer.
  • B、 The recommended practice is for the core infrastructure to be in Layer 3.
  • C、 The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.
  • D、 The Cisco Express Forwarding hashing algorithm is the default, based on the IP address andLayer 4 port.
  • E、 Core layer should run BGP along with an IGP because iBGP has a lower administrativedistance than any IGP.

正确答案:B

第5题:

IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual ( ) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the (请作答此空) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.

A.network
B.transport
C.application
D.session

答案:C
解析:

第6题:

Which of the following is a characteristic of a data center core?()

A. Server-to-server traffic always remains in the core layer.

B. The recommended practice is for the core infrastructure to be in Layer 3.

C. The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.

D. The Cisco Express Forwarding hashing algorithm is the default, based on the IP address and Layer 4 port.

E. Core layer should run BGP along with an IGP becauseiBGP has a lower administrative distance than any IGP.


参考答案:B

第7题:

Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?()

A. use a Layer 2 link between distribution switches

B. use a Layer 3 link between distribution switches

C. use a redundant link to the core

D. use a Layer 3 link between distribution switches with route summarization


参考答案:C, D

第8题:

When policy - based routing (PBR) is being configured, which three criteria can the set command specify?()

A. all interfaces in the path toward the destination

B. all networks in the path toward the destination

C. adjacent next hop router in the path toward the destination

D. all routers in the path toward the destination

E. all interfaces through which the packets can be routed

F. type of service and precedence in the IP packets


参考答案:C, E, F

第9题:

Which three of the following descriptions are true about the firewall modes? ()

  • A、 Transparent mode is layer 2.
  • B、 Routed mode is layer 3.
  • C、 Routed mode has 1 IP address.
  • D、 Transparent mode has 1 IP address.

正确答案:A,B,D

第10题:

Why would a network administrator configure port security on a switch?()

  • A、to prevent unauthorized Telnet access to a switch port
  • B、to limit the number of Layer 2 broadcasts on a particular switch port
  • C、to prevent unauthorized hosts from accessing the LAN
  • D、to protect the IP and MAC address of the switch and associated ports
  • E、to block unauthorized access to the switch management interfaces over common TCP ports

正确答案:C

更多相关问题