Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


The maximum distance on a 10BaseT network from the hub to a

workstation is which of the following?

A.) 500 meters

B.) 1000 meters

C.) 100 meters

D.) 1500 meters

Answers were Sorted based on User's Feedback



The maximum distance on a 10BaseT network from the hub to a workstation is which of the following..

Answer / guest

Answer: C

The standard for 10BaseT networks is 100 meters, or
approximately 330 feet.

Is This Answer Correct ?    14 Yes 2 No

The maximum distance on a 10BaseT network from the hub to a workstation is which of the following..

Answer / harsh singh

100 meters.

Is This Answer Correct ?    13 Yes 2 No

Post New Answer

More CCNA Interview Questions

Which is true regarding half duplex Ethernet operation? A.) Half Duplex ethernet technology provides a transmit circuit connection wired directly to the receiver circuit at the other end B.) Half duplex transmission between stations is achieved by using point to multipoint Ethernet and Fast Ethernet C.) With Half Duplex transmission logically circuits feed into a single cable creating a situation similar to a one way bridge D.) Half Duplex transmission between stations is achieved using Point to Point Ethernet & Fast Ethernet

1 Answers  


You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255

1 Answers  


How many LMI types are available on Cisco routers? A.) Four B.) Two C.) Five D.) Three

3 Answers  


When configuring a router utilizing both physical and logical interfaces, what factor must be considered in determining the OSPF router ID?

0 Answers  


Suppose a Switch interface went in error-dis mode what you will do for Troubleshooting List all Possibilities

0 Answers   Infosys,


What is the routing metric used by RIP? A.) Route poisoning B.) Split horizon C.) Hop Count D.) TTL

1 Answers  


What are the two types of transmission technology use in ccna?

0 Answers  


Which command we give on privilege mode for coming back to user execution mode?

0 Answers  


Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon

1 Answers  


Which statement is true? A. While bridges are used to segment networks, they will not isolate broadcast or multicast packets. B. A bridge looks at every packet within its network segment and works like a hub re-broadcasting the packet if the destination is within its network segment. C. A bridge maintains a table of the IP addresses of the hosts within its network segment and forwards the packet directly to the destination based upon the IP address. D. A bridge resets the hop count by keeping all packets within the network segment. Only packets addressed to a specific destination host outside the network segment are allowed to pass through the bridge.

1 Answers  


What is the Network Layer of the OSI responsible for? A.) Bridging B.) Routing packets through an internetwork C.) Regenerating the digital signal D.) Gateway services

3 Answers  


Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP

3 Answers  


Categories