A.DAI intercept all ARP packets on untrusted ports
B.DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the DHCP Snooping database.
C.DAI is used to prevent against a DHCP Snooping attack.
D.DAI forwards all ARP packets received on a trusted interface without any checks.
E.DAI forwards all ARP packets on untrusted ports.
F.DAI determines the validity of an ARP packet based on the valid MAC address-to-IP address bindings stored in the CAM table.
您可能感興趣的試卷
你可能感興趣的試題
A.Classifying and marking traffic should be done as close to the traffic source as possible.
B.Classifying and marking traffic should be done at the distribution layer.
C.Traffic is classified and marked as it travels through the network.
D.If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.
E.The trust boundary moves depending on the type of traffic entering the network.
Refer to the exhibit.
What problem is preventing users on VLAN 100 from pinging addresses on VLAN 200?()
A.No default route on DLS1.
B.Encapsulation mismatch between switches.
C.Native VLAN mismatch.
D.Subinterfaces should be created on Fa0/7 and Fa0/8 on DLS1.
E.Trunking needs to be enabled.
F.The ip routing command is missing on DLS1.
Cisco Express Forwarding has been enabled on router TK1.
With CEF, prefixes that require exception processing can be cached with one of which four special adjacencies? ()
A.Kick
B.Drop
C.Forward
D.Null
E.Discard
F.Glean
G.Express
Your boss, Miss ,is interested in CEF.
What should you tell her? ()
A.The FIB lookup is based on the Layer 3 destination address prefix (shortest match).
B.The adjacent table is derived from the ARP table.
C.The FIB table is derived from the IP routing table.
D.When the adjacency table is full, a CEF TCAM table entry points to the Layer 3 engine to redirect the adjacency.
E.CEF IP destination prefixes are stored in the TCAM table, from the least specific to the most specific entry.
F.When the CEF TCAM table is full, packets are dropped.
Refer to the exhibit. DHCP snooping is enabled for selected VLANs to provide security on the network.
How do the switch ports handle the DHCP messages?()
A.Ports Fa2/1 and Fa2/2 source DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages and respond to DHCP requests.
B.Ports Fa2/1 and Fa2/2 respond to DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages.
C.Ports Fa2/1 and Fa2/2 are eligible to source all DHCP messages and respond to DHCP requests. Port Fa3/1 can source DHCP request only.
D.All three ports, Fa2/1, Fa2/2, and Fa3/1, are eligible to source all DHCP messages and respond to DHCP requests.
最新試題
Refer to the exhibit. For what purpose is the command show ip cef used?()
What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Which two statements about the various implementations of STP are true?()
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()
Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()
Which three statements are true of the Link Aggregation Control Protocol (LACP)?()
During routine maintenance, G1/0/1 on DS1 was shutdown. All other interface were up. DS2 became the active HSRP device for Vlan101 as desired. However, after G1/0/1 on DS1 was reactivated. DS1 did not become the active HSRP device as desired. What need to be done to make the group for Vlan101 function properly ? ()
Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()
Which two statements are true when the extended system ID feature is enabled? ()