多項選擇題In computer networking a multicast address is an identifier for a group of hosts that have joined amulticast group. Multicast addressing can be used in the Link Layer (OSI Layer 2), such as Ethernet Multicast, as well as at the Internet Layer (OSI Layer 3) as IPv4 or IPv6 Multicast. Whichtwo descriptions are correct regarding multicast addressing?()

A、The first 23 bits of the multicast MAC address are 0x01-00-5E. This is a reserved value thatindicates a multicast application
B、The last 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E. This is a reservedvalue that indicates a multicast application
C、To calculate the Layer 2 multicast address, the host maps the last 23 bits of the IP address intothe last 24 bits of the MAC address. The high-order bit is set to 0
D、The first 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E. This is a reservedvalue that indicates a multicast application


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which IOS command would you use to find out which networks are routed by a particular OSPF process()

A.show ip ospf
B.show ip route
C.show ip protocols
D.show ip ospf database
E.None of the other alternatives apply

3.單項選擇題Which command would display OSPF parameters such as filters,default metric,maximum paths,and number of areas configured on a outer()

A.show ip protocol
B.show ip route
C.show ip ospfinterface
D.show ip ospf
E.show ip nterface
F.None of the other alternatives apply

4.多項選擇題An OSPF link can be in multiple states at any givenmoment(ie.Exstart,exchange,full). Which two IOS commands let you view the state of the link()

A.show ip ospf
B.show ip protocols
C.show ip ospfneighbor
D.show ip ospfinterface

最新試題

Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.

題型:問答題

Drag the correct statements about MPLS-based VPN on the left to the boxes on the right.(Not allstatements will be used)

題型:問答題

Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()

題型:多項選擇題

Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.

題型:問答題

cisco ios command to interface dialer 0

題型:問答題

Refer to the exhibit. Which two statements about the AAA configuration are true?()

題型:多項選擇題

Which three statements accurately describe IOS Firewall configurations?()

題型:多項選擇題

Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.

題型:問答題

Match the xDSL type on the above to the most appropriate implementation on the below.

題型:問答題

Network Topology Exhibit:Configuration Exhibit:NET(config)# access-list 112 deny icmp any any echo logNET(config)# access-list 112 deny imp any any redirect logNET(config)# access-list 112 deny icmp any any mask-request logNET(config)# access-list 112 permit icmp any 10.1.1.0 0.0.0.255NET(config)# interface Fa0/1NET(config-if)# ip access-group 112 inYou work as a network administrator at networkTut.com, study the exhibit carefully. Theconfiguration has been applied to router NET to mitigate the threat of certain types of ICMPbasedattacks while allowing some ICMP traffic to the corporate LAN to work. However, the configurationis incorrect. On the basis of the information in the exhibit, which configuration option wouldcorrectly configure router NET?()

題型:單項選擇題