The network portion of an address typically represents a:
A.) Router
B.) Ethernet MAC address.
C.) Computer
D.) Host
E.) Segment
Answers were Sorted based on User's Feedback
Answer / guest
Answer: E
Every network segment is represented by a network or
subnetwork address.
| Is This Answer Correct ? | 7 Yes | 1 No |
Answer / zibrayal.s.mulla
may i please get the answer in brief please sir...?
| Is This Answer Correct ? | 0 Yes | 0 No |
Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default
Which command will give the following output: Tty Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns Int * 0 CTY - - - - - 0 0 0/0 - 1 AUX 9600/9600 - - - - - 0 0 0/0 - * 2 VTY - - - - - 2 0 0/0 - 3 VTY - - - - - 0 0 0/0 - 4 VTY - - - - - 0 0 0/0 - 5 VTY - - - - - 0 0 0/0 - 6 VTY - - - - - 0 0 0/0 -
HI I am Rajveersinh. I am Leaving in Ahmedabad-gujarat. I am Hardware & Networking Stundent In JETKING. my Intersted in CICKO Side. Please send ME totel detail in CICKO surtifiction my E-mail ID IS as_raj@ymail.com
Which OSI layer provides mechanical, electrical, procedural for activating, maintaining physical link? A.) Presentation B.) Network C.) Application D.) Physical E.) Transport F.) Data-Link
Why we use debug command?
Which technologies listed below help prevent network loops in a switched (bridged) environment? A.) Store-and-Forward B.) IEEE 802.1d C.) Diikjstra Algorithm D.) Cut-Through E.) Spanning Tree Protocol F.) Routing
Which layer is responsible for synchronizing sending and receiving applications? A.) Presentation B.) Session C.) Transport D.) Application E.) Network
what is the full fom of ping
Which of the follow do not belong to the customer? A.) CO B.) DCE C.) Router D.) CPE E.) Demarc F.) DTE
Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP
Identify the length of an IPX address and it's components? A.) 80 bits, 48 bits network and 32 bits node B.) 32 bits, 16 bits network and 16 bits node C.) None of the above D.) 80 bits, 32 bits network and 48 bits node
Can you explain the basic of encryption in VPN?