单项选择题
A. The FIB is derived from the IP routing table and is optimized for maximum lookup throughput.
B. The FIB table is derived from the Address Resolution Protocol table, and it contains Layer 2 rewrite (MAC) information for the next hop.
C. When the FIB table is full, a wildcard entry redirects traffic to the Layer 3 engine.
D. The FIB lookup is based on the Layer 2 destination MAC address.
E. None of the other alternatives apply
单项选择题 Refer to the exhibit. What type of attack is being defended against? ()
单项选择题 Refer to the exhibit. What will happen to traffic within VLAN 14 with a source address of 172.16.10.5?()
单项选择题 Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1?()