What is size of ipv4 mac address?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

How we can see mac address from dos prompt?

0 Answers  


Identify the 2 commands to copy a configuration from a TFTP server to RAM? A.) configure network B.) configure overwrite C.) copy backup-config running-config D.) copy tftp running-config

1 Answers  


Name the command we give on privilege mode for coming back to user execution mode?

0 Answers  


Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection oriented protocol that acknowledges receipt of data packets and is considered reliable

2 Answers  


Which command will display the encapsulation type on interface serial 0? A.) show interface s0 B.) show all C.) show int s0 encap D.) show encap s0 E.) show encap

1 Answers   Cisco,






Which command loads a new version of the Cisco IOS into a router? A. copy flash ftp B. copy ftp flash C. copy flash tftp D. copy tftp flash

2 Answers  


Which command will display adjacent routers found by the Cisco Discovery Protocol? A.) show all B.) show cdp entry C.) show ip neighbors D.) show cdp neighbor detail E.) show cdp neighbor F.) show neighbor

2 Answers  


What does the following series of commands accomplish? router igrp 71 network 10.0.0.0 router igrp 109 network 172.68.7.0 A. It isolates networks 10.0.0.0 and 172.68.7.0. B. It loads igrp for networks 109 and 71. C. It disables RIP. D. It disables all routing protocols.

1 Answers  


A routing table contains static, RIP, and EIGRP routes for the same destination network. Which route would normally be used to forward data?

15 Answers   TCS, Wipro,


Mention the conversion steps of data encapsulation?

0 Answers  


Why we use debug command?

0 Answers  


which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?

0 Answers  


Categories