A、The first 23 bits of the multicast MAC address are 0x01-00-5E. This is a reserved value thatindicates a multicast application
B、The last 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E. This is a reservedvalue that indicates a multicast application
C、To calculate the Layer 2 multicast address, the host maps the last 23 bits of the IP address intothe last 24 bits of the MAC address. The high-order bit is set to 0
D、The first 3 bytes (24 bits) of the multicast MAC address are 0x01-00-5E. This is a reservedvalue that indicates a multicast application
您可能感興趣的試卷
你可能感興趣的試題
A.show ip ospf
B.show ip route
C.show ip protocols
D.show ip ospf database
E.None of the other alternatives apply
A.Layer 5
B.Layer 4
C.Layer 3
D.Layer 2
E.Layer 1
A.show ip protocol
B.show ip route
C.show ip ospfinterface
D.show ip ospf
E.show ip nterface
F.None of the other alternatives apply
A.show ip ospf
B.show ip protocols
C.show ip ospfneighbor
D.show ip ospfinterface
A.show ip protocols
B.show running-config
C.show ip ospfneighbor
D.show ip ospfborder-routers
最新試題
Drag each element of the Cisco IOS Firewall Feature Set from the above and drop onto itsdescription on the below.
Study the exhibit carefully.Routers A and B are customer routers. Routers 1, 2, 3 and 4 are provider routers. The routers areoperating with various IOS versions. Which frame mode MPLS configuration statement is true?()
Drag the DSL technologies on the left to their maximum(down/up) data rate values on the below.
As a network engineer, study the exhibit carefully. Router Net is unable to establish an ADSLconnection with its provider. Which action would correct this problem?()
Drag and drop question. The upper gives the MPLS functions, the bottom describes the planes.Drag the above items to the proper location at the below
Identify the recommended steps for worm attack mitigation by dragging and dropping them into thetarget area in the correct order.
Drag and drop each function on the above to the hybrid fiber-coaxial architecture component that itdescribes on the below.
Which statement correctly describes IPsec VPN backup technology?()
Drag and drop each management protocol on the above to the correct category on the below.
Study the exhibit carefully. The Cisco IOS IPsec High Availability (IPsec HA) Enhancementsfeature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways - that is, Cisco IOS Software-based routers. What are the twooptions that are used to provide High Availability IPsec?()