Identify 3 characteristics of a MAC address?
A.) Burned into the NIC
B.) 48 bits long
C.) Length is 32 bits
D.) Used to identify a host device
E.) Contains a network portion and a host portion
Answers were Sorted based on User's Feedback
Answer / haja bahurudeen m
Ans : A,B,D
Network address lenth - 32 bits
MAC - contain hardware address
MAC address 48 bits - first 24 bits OUI
second 24 bits device id
Is This Answer Correct ? | 5 Yes | 0 No |
With one method for transmitting frames through a switch, the switch receives the complete frame and checks the frame CRC before forwarding the frame. What is the switch transmission method called? A. CSMA/CD B. Full Duplex C. Cut-Through D. Half-Duplex E. Fragmentation F. Store and Forward
What is cisco?
Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do? A. It tells the router to check the corresponding bit value. B. It tells the router to ignore the corresponding bit value. C. It tells the router to check its alternate routing list. D. It tells the router to use its primary routing list.
Which two types of route table entries are used by a Layer 3 router to determine the appropriate path to destination? (Choose two) A. static route entry B. default route entry C. Dynamic route entry D. temporary route entry E. permanent route entry
What is 100BaseFX?
Hi Gyes There are any sites where we can practice online for ccna exams?Plz let me know because i get time to study in my working hours only
The Cisco Discovery Protocol (CDP) periodically sends out a multicast packet (at layer 2). Which command will alter the default interval of 60 seconds? A.) cdp hold 111 B.) cdp wait 111 C.) cdp interval 111 D.) cdp 111 E.) cdp timer 111
When you cords an IP address on a place router which command stale the IP processing on the interface? A. ip enable B. network ip-address C. ip address ip-address subnet mask D. the exit command from the enabled configuration E. copy running-configuration to startup-configuration
what is secure hand shake protocol
Which layer is responsible for routing through an internetwork? A.) Physical B.) Session C.) Network D.) Transport E.) Application F.) Data Link
Which of the following use PVCs at layer 2? A.) X.25 B.) HDLC C.) Frame relay D.) ISDN
What device has content-addressable memory (CAM) and what is stored in it? 1 A: Switch, learned IP addresses 2 B: Router, learned IP addresses 3 C: Switch, learned MAC addresses 4 D: Router, learned MAC addresses