What is the purpose of ARP?

A.) IP to host name resolution

B.) Host name to IP address resolution

C.) Mac to IP address resolution

D.) IP to Mac address resolution

Answers were Sorted based on User's Feedback



What is the purpose of ARP? A.) IP to host name resolution B.) Host name to IP address resolut..

Answer / guest

Answer: D

Address Resolution Protocol resolves the MAC address if the
IP address

is known. It is a layer 3 protocol.

Is This Answer Correct ?    82 Yes 7 No

What is the purpose of ARP? A.) IP to host name resolution B.) Host name to IP address resolut..

Answer / monami85

ARP is used to find MAC address from the known ip address.

RARP is used to find ip address from the knowm MAC address.

Is This Answer Correct ?    43 Yes 5 No

What is the purpose of ARP? A.) IP to host name resolution B.) Host name to IP address resolut..

Answer / kapilasdhir

D.) IP to Mac address resolution

Is This Answer Correct ?    27 Yes 2 No

What is the purpose of ARP? A.) IP to host name resolution B.) Host name to IP address resolut..

Answer / yuvaraj

Address resolution protocol is used to find the MAC address
or hardware address from destination IP address through ARP
request by network layer.

Is This Answer Correct ?    21 Yes 5 No

Post New Answer

More CCNA Interview Questions

Define the virtual path?

0 Answers  


Hi Jitendera, I continuously read your answers which is more knowlegable than books... Q.I am facing some problems in subnetting.can you plzz explain the subnetting process.. will be remain thankful

4 Answers  


What is the terminal emulation?

0 Answers  


Can you explain VPN tunneled packet in detail?

0 Answers   CCIE,


Explain the difference between arp and rarp?

0 Answers  






When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes

1 Answers  


Name the different types of networks

0 Answers  


What does -1 mean in an extended IPX access-list? A.) Any IP address B.) Deny all C.) Deny host D.) Any host or any network

1 Answers  


Why we use debug command?

0 Answers  


What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.

2 Answers  


Which of the following encapsulation types can be used on leased-line connections? (Choose two) ❍ A. HDLC ❍ B. Frame Relay ❍ C. ISDN ❍ D. PPP

10 Answers   Wipro,


Hi all, suppose more than two network administrators are configure same router with different configuration through telnet at the same time.. then whose(admin's) configuration will use router for routing ?

2 Answers  


Categories