While analyzing the contents of the IP routing table in a router, the administrator notices the following routes in the table: PrefixNextHop IPInterface 192.168.1.0 /24172.16.31.1 Ethernet0 192.168.2.0 /24172.16.31.1 Ethernet0 172.16.31.0 /24 Directly Connected Ethernet0 0.0.0.0/0172.16.31.2 Ethernet0 Which of the following BEST describes what would occur if a packet from 192.168.1.4 were sent to 192.168.3.4?
A. The packet will be dropped as there is no matching route in the IP routing table to reach the destination network
B. An ICMP network unreachable message will be sent to 192.168.1.4
C. The packet will be forwarded to 172.16.31.2
D. The packet will be forwarded to 172.16.31.1 since the source IP address is in the 192.168.1.0/24 range
Answer: C. The packet will be forwarded to 172.16.31.2
You might also like to view...
What is true about the following statement?
cout << setw(4) << num4 << " "; a. It allows four spaces for the value in num4. b. It outputs "setw(4)" before the value in num4. c. It is incorrect because it should use setw(10). d. It is incorrect because it should use setw(num4).
Sorting by ________ arranges data together for cells containing a particular fill or font color
Fill in the blank(s) with correct word
Which of the following is an open-source virtual machine manager developed by Red Hat?
A. Virtual PC B. Xen C. Virtual Box D. KVM
One form of online vandalism is ____________________ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.
A. hacktivist B. phreak C. hackcyber D. cyberhack