The Company network needs to pass traffic between VLANs. Which device should be used to accomplish this? ()
A. Hub B. Switch C. Router D. Bridge E. None of the other alternatives apply
pany has implemented numerous multilayer switches that utilize FIB tables. Which statement is true about the Forward Information Base (FIB) table?()
A. The FIB is derived from the IP routing table and is optimized for maximum lookup throughput. B. The FIB table is derived from the Address Resolution Protocol table, and it contains Layer 2 rewrite (MAC) information for the next hop. C. When the FIB table is full, a wildcard entry redirects traffic to the Layer 3 engine. D. The FIB lookup is based on the Layer 2 destination MAC address. E. None of the other alternatives apply
Refer to the exhibit. What type of attack is being defended against? ()
A. snooping attack B. rogue device attack C. STP attack D. VLAN attack E. spoofing attack F. MAC flooding attack