Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which of the following protocols are used to get an IP
address from a

known MAC address?

A.) BootP

B.) TCP

C.) IP

D.) ARP

E.) RARP

F.) ICMP

Answers were Sorted based on User's Feedback



Which of the following protocols are used to get an IP address from a known MAC address? A.) ..

Answer / guest

Answer: A E

Is This Answer Correct ?    5 Yes 1 No

Which of the following protocols are used to get an IP address from a known MAC address? A.) ..

Answer / ananth

E

Is This Answer Correct ?    2 Yes 1 No

Which of the following protocols are used to get an IP address from a known MAC address? A.) ..

Answer / imran

bootp and rarp

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More CCNA Interview Questions

Layer 1 and Layer 2 devices must forward a broadcast. Which of the following devices fall into this category? Gateway Switch Router All of the above.

1 Answers   Sutherland,


What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.

1 Answers  


Which of the following is an example of a Transport Layer protocol? Ethernet IP TCP RS-232

2 Answers  


What is a benefit of a virtual LAN (VLAN)? A. It increases the number of broadcast domains B. It decreases the number of broadcast domains C. It increases the numberr of collision domains D. It decreases the number of collision domains E. Since it is a vitual Interface it never shuts down

4 Answers   jetking,


What would be the proper wildcard mask to permit all odd numbered hosts on the 10.48.0.0/12 network? access-list 1 permit 10.48.0.0 0.15.255.255 access-list 1 permit 10.48.0.1 0.15.255.254 access-list 1 permit 10.48.0.0 0.15.255.1 access-list 1 permit 10.48.0.0 0.0.0.254 access-list 1 permit 10.48.0.0 0.0.0.255

5 Answers  


Wnat do you know about zenpeck

2 Answers  


What is a Frame Relay?

0 Answers  


Define the igp (interior gateway protocol)?

0 Answers  


what is the basic rules for ACLs?

4 Answers  


Identify 3 characteristics of IP RIP? A.) Distance vector B.) Administrative distance is 120 C.) Periodic updates every 60 seconds D.) Uses a composite metric E.) Can load balance

1 Answers  


how can we block remote desktop for some user from cisco router through aaccess-list

5 Answers  


What is true when using DDR? A.) HDLC is the preferred encapsulation B.) You must use static routing C.) You should use dynamic routing D.) You should use ISDN

1 Answers  


Categories