only the low-order 23 bits of the MAC address are used to map IP addresses
only the low-order 24 bits of the MAC address are used to map IP addresses
only the high-order 23 bits of the MAC address are used to map IP addresses
only the low-order 23 bits of the IP address are used to map MAC addresses
the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
第1题:
A.hostname
B.static route
C.virtual router
D.loopback reference
第2题:
A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
C. only the high-order 23 bits of the MAC address are used to map IP addresses
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
第3题:
A.When uptime is critical
B.When data must be refactored
C.When application concurrency is static
D.When data loss is unacceptable
E.When application is a single point of failure
第4题:
You are designing a forest and domain structure to address the concerns of Contoso, Ltd., and to meet the business and technical requirements. You want to use the minimum number of domains and forests that are required. Which domain structure should you use?()
第5题:
When delivering the results of a Solutions Recommendation, which two of the following components should be included in the solutions presentation?()
第6题:
A. Voice needs to be assigned to the hardware priority queue.
B. Voice needs to be assigned to the software priority queue.
C. Call signaling must have guaranteed bandwidth service.
D. Strict-priority queuing should be limited to 50 percent of the capacity of the link.
第7题:
When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()
第8题:
A. Define application type.
B. Enable AppFlow for the application.
C. Enable monitoring for the application.
D. Define source and destination IP addresses.
第9题:
A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()
第10题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)