Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is a key use of a device hardware address?

A. to obtain a vendor code / serial number from the user

B. to transmit a frame from one Interface to another Interface

C. to transmit a packet from one local device to another
local device

D. to transmit data from one local device to a remote device
across the internet

E. to contain logical information about the device to use
for end-to-end transmission



What is a key use of a device hardware address? A. to obtain a vendor code / serial number from t..

Answer / guest

Answer: B

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More CCNA Interview Questions

b Which protocol for PPP LCP (Link Control Protocol) performs a challenge handshake? A. CHAP B. PAP C. UDP D. IPX

1 Answers  


What are the two primary operating modes for frame switching? A. Full Duplex B. Half-Duplex C. CSMA/CD D. Cut-through E. Fragmentation F. Store and Forward G. User mode H. Privileged mode

1 Answers  


Explain on which interface we always apply access-list?

0 Answers  


can any budy send the steps for enabling snmp on cisco switches(L2).

1 Answers   DELL,


Which of the following are solutions to the problems encountered with Distance-Vector routing? A.) Defining a Maximum B.) Poison Reverse C.) Triggered Updates D.) Shortest path first algorithm. E.) Split Horizon

1 Answers  


Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged the are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination

1 Answers  


X.25 is characterized by layer 2 identifiers, and what else? A.) Virtual Lan's B.) Session Layer C.) Transport Layer D.) Routing Updates E.) PVC's

1 Answers  


Which EXEC command displays system hardwarde configuration information software version and the names and sources of configuration files and boot images on a router? A. show boot B. show flash C. show config D. show version

1 Answers  


If a frame is received at a switch and only the destination hardware address is read before the frame is forwarded, what type of switching method is this? A.) Store-and-drop B.) Latency C.) Store-and-forward D.) Cut-through

1 Answers  


what is the binary value of loop back address

13 Answers  


What requirements should a VPN fulfill?

0 Answers   CCIE,


What is de-encapsulation?

0 Answers  


Categories