当前位置: 首页 > 问题分类 > 计算机类考试 > 思科认证 > 问题详情
问题

Regarding DHCP (dynamic host configuration protocol), which two of the following choices below are true? (Select two answer choices)

A. The DHCP Discover message uses FF-FF-FF-FF-FF as the Layer 2 destination address.

B. The DHCP Discover message uses UDP as the transport layer protocol.

C. The DHCP Discover message uses a special Layer 2 multicast address as the destination address.

D. The DHCP Discover message uses TCP as the transport layer protocol.

E. The DHCP Discover message does not use a Layer 2 destination address.

F. The DHCP Discover message does not require a transport layer protocol.

参考答案
正确答案:AB
A,B 解析:Explanation:
DHCP uses UDP as its transport protocol. DHCP messages from a client to a server are sent to the DHCP server port (UDP port 67), and DHCP messages from a server to a client are sent to the DHCP client port (UDP port 68).The client broadcasts a DHCPDISCOVER message on its local physical subnet. The DHCPDISCOVER message may include options that suggest values for the network address and lease duration. BOOTP relay agents may pass the message on to DHCP servers not on the same physical subnet.

Each server may respond with a DHCPOFFER message that includes an available network address in the "ipaddr" field (and other configuration parameters in DHCP options). Servers need not reserve the offered network address, although the protocol will work more efficiently if the server avoids allocating the offered network address to another client. The server unicasts the DHCPOFFER message to the client (using the DHCP/BOOTP relay agent if necessary) if possible, or may broadcast the message to a broadcast address (preferably 255.255.255.255) on the client's subnet.

Incorrect Answers:
C. DHCP messages are broadcast to the "all hosts" address. IP multicast addresses are not used.

D. UDP is used, not TCP.

E. Since DHCP is used so that a client can obtain an IP address, a layer two destination address must be used, as the layer 3 IP address does not yet exist on the client for the return traffic.

F. DHCP, along with nearly every other type of traffic, requires the use of a transport layer protocol.
您可能感兴趣的试题
  • The LAN needs are expanding at the Ezonexam corporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the Ezonexam network.

    Which of the following are layer 1 devices that you can use? (Choose all that apply.)

    A.A switch

    B.A router

    C.A network adapter card

    D.A hub

    E.A repeater

  • The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)

    A.Configure port Fa0/1 to accept connections only from the static IP address of the server

    B.Configure the MAC address of the server as a static entry associated with port Fa0/1

    C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectors

    D.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server

    E.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address

  • Which of the following statements correctly describe the differences between half-duplex and full-duplex Ethernet? (Select two answer choices.)

    A.Full-duplex Ethernet uses CSMA/CD to prevent collisions.

    B.Half-duplex Ethernet uses a loopback circuit to detect collisions.

    C.A full-duplex Ethernet card allows 20Mbps for data transmission.

    D.Full-duplex Ethernet makes use of two pairs of wires for data.

    E.An Ethernet hub can operate both half and full duplex simultaneously.

  • When is a switched network that is running the Spanning Tree Protocol considered to be fully converged?

    A.when all switches have the same BID as the root switch

    B.when all switches have received the MAC address of each neighboring switch

    C.when every enabled switch port has been assigned a unique identifier

    D.when every operating switch port is in either the blocking or forwarding state

    E.when all switches are in either client, server, or transparent mode