When a Layer 3 switch sends IP packets originating from one VLAN to another LAN, which field in the following options is overridden? (Single choice questions).

When a Layer 3 switch sends IP packets originating from one VLAN to another LAN, which field in the following options is overridden? (Single choice questions).A . Three layers of TTLB . Layer 3 destination addressC . Layer 3 source addressD . Layer 3 Transport ProtocolE . Two-tier TTLView AnswerAnswer:...

May 15, 2022 No Comments READ MORE +

The following description of the link state protocol is plausible?

The following description of the link state protocol is plausible?A . CPU utilization is high and loops are easy to generateB . Slow convergence and low CPU utilizationC . Fast convergence and low CPU utilizationD . Fast convergence and high CPU utilizationView AnswerAnswer: D

May 15, 2022 No Comments READ MORE +

If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the sending and receiving of source or member multicast data, which one is described correctly below for the DR election rule?

If a DR needs to be elected between multicast routers running PIM-SM to be responsible for the sending and receiving of source or member multicast data, which one is described correctly below for the DR election rule?A . PIM routers with long interface masks are elected dr.B . Compare the...

May 15, 2022 No Comments READ MORE +

A VRRP virtual router configuration VRID is 3 and the virtual IP address is 100 1. 1. 10, so what is the virtual MAC address?

A VRRP virtual router configuration VRID is 3 and the virtual IP address is 100 1. 1. 10, so what is the virtual MAC address?A . O0-00-5E-00-01-64B . 01-00-5E-00-01-03C . 01-00-5E-00-01-54D . 00-00-5E-00-01-03View AnswerAnswer: D

May 15, 2022 No Comments READ MORE +

SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer data

SSH uses asymmetric encryption algorithms AES and DES to achieve security for data transmission, and uses HMAC to ensure the complete integrity of integer dataA . TRUEB . FALSEView AnswerAnswer: A

May 14, 2022 No Comments READ MORE +

In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement is

In different scenarios, RSTP provides different protection functions, and the wrong statement about this statement isA . The root protection feature is enabled for the specified port, and its port role can only remain as the specified portB . When the anti-TC-BPDU packet attack feature is enabled, the number of...

May 14, 2022 No Comments READ MORE +

The DHCP protocol assigns to clients―some TCPIP-related parameter information―in the process DHCP defines a variety of messages that are encapsulated at the transport layer: (sortic).

The DHCP protocol assigns to clients―some TCPIP-related parameter information―in the process DHCP defines a variety of messages that are encapsulated at the transport layer: (sortic).A . PPP packageB . IP encapsulationC . TCP EncapsulationD . UDP EncapsulationView AnswerAnswer: D

May 13, 2022 No Comments READ MORE +