option
Cuestiones
ayuda
daypo
buscar.php

M8 Protocolo de resolución de direcciones

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
M8 Protocolo de resolución de direcciones

Descripción:
M8 Examen

Fecha de Creación: 2024/11/27

Categoría: Informática

Número Preguntas: 13

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

How does the ARP process use an IP address?. To determine the MAC address of a device on the same network. To determine the MAC address of the remote destination host. To determine the amount of time a packet takes when traveling from source to destination. To determine the network number based on the number of bits in the IP address.

What will a host do first when preparing a Layer 2 PDU for transmission to a host on the same Ethernet network?. It will search the ARP table for the MAC address of the destination host. It will query the local DNS server for the name of the destination host. It will send the PDU to the router directly connected to the network. It will initiate an ARP request to find the MAC address of the destination host.

Refer to the exhibit. Which protocol was responsible for building the table that is shown?. ARP. DNS. DHCP. ICMP.

When an IP packet is sent to a host on a remote network, what information is provided by ARP?. The MAC address of the router interface closest to the sending host. The IP address of the default gateway. The IP address of the destination host. The MAC address of the switch port that connects to the sending host.

A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in the ARP cache. How will the device obtain a destination MAC address?. It will send an ARP request for the MAC address of the default gateway. It will send an ARP request for the MAC address of the destination device. It will send the frame and use the device MAC address as the destination. It will send the frame with a broadcast MAC address. It will send an ARP request to the DNS server for the destination MAC address.

What is the aim of an ARP spoofing attack?. To associate IP addresses to the wrong MAC address. To fill switch MAC address tables with bogus addresses. To flood the network with ARP reply broadcasts. To overwhelm network hosts with ARP requests.

A host needs to reach another host on a remote network, but the ARP cache has no mapping entries. To what destination address will the host send an ARP request?. The broadcast MAC address. The subnet broadcast IP address. The unicast MAC address of the remote host. The unicast IP address of the remote host.

Refer to the exhibit. PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?​. PC2 will send an ARP reply with the PC2 MAC address. RT1 will send an ARP reply with the RT1 Fa0/0 MAC address.​. RT1 will send an ARP reply with the PC2 MAC address.​. SW1 will send an ARP reply with the PC2 MAC address.​. SW1 will send an ARP reply with the SW1 Fa0/1 MAC address.​.

In what kind of memory is the ARP table stored on a device?. RAM. Flash. ROM. NVRAM.

What is a characteristic of ARP messages?. ARP replies are unicast. ARP messages are encapsulated within an IPv4 header. ARP messages have a type field of 0x805. ARP requests are broadcasts, and they are flooded out all ports by the switch.

What statement describes the function of the Address Resolution Protocol?. ARP is used to discover the MAC address of any host on the local network. ARP is used to discover the MAC address of any host on a different network. ARP is used to discover the IP address of any host on the local network. ARP is used to discover the IP address of any host on a different network.

Why would an attacker want to spoof a MAC address?. So that a switch on the LAN will start forwarding frames to the attacker instead of to the legitimate host. So that a switch on the LAN will start forwarding all frames toward the device that is under control of the attacker (that can then capture the LAN traffic). So that the attacker can capture traffic from multiple VLANs rather than from just the VLAN that is assigned to the port to which the attacker device is attached. So that the attacker can launch another type of attack in order to gain access to the switch.

What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward?. Source MAC address. Source IP address. Destination MAC address. Ethernet type. Destination IP address.

Denunciar Test