Compare cert salaries and plan your next career move
When a switch receives a frame, the first thing it will do is determine if the frame's MAC address is already inits MAC table. If it is not, as in this scenario, it will send the frame out on all access ports and any 802.1q trunks with the exception of the port on which it arrived. In the MAC table shown, there is no listing for the MAC address aaaa.aaaa.aaaa.aaaa. This indicates that the destination is not directly connected to this switch. Therefore, the switch will send the frame to all trunk links, which in this case would be the 802.1q trunks and all access links with the exception of the one on which it arrived, which was not identified in this scenario.
When a switch receives a frame, the first thing it will do is determine if the frame's MAC address is already inits MAC table. If it is not, as in this scenario, it will send the frame out on all access ports and any 802.1q trunks with the exception of the port on which it arrived.In the MAC table shown, there is no listing for the MAC address aaaa.aaaa.aaaa.aaaa. This indicates that the destination is not directly connected to this switch. Therefore, the switch will send the frame to all trunk links, which in this case would be the 802.1q trunks and all access links with the exception of the one on which it arrived, which was not identified in this scenario.
j4rt02 wrote: » Can Transcender be trusted?!?!
j4rt02 wrote: » That is what I'm thinking, but this practice question appears to be contradicting:
j4rt02 wrote: » So, in the mac table output, what do 11, 55, and 66 mean?
Compare salaries for top cybersecurity certifications. Free download for TechExams community.