Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is a key use of a device hardware address?

A. to obtain a vendor code / serial number from the user

B. to transmit a frame from one Interface to another Interface

C. to transmit a packet from one local device to another
local device

D. to transmit data from one local device to a remote device
across the internet

E. to contain logical information about the device to use
for end-to-end transmission



What is a key use of a device hardware address? A. to obtain a vendor code / serial number from t..

Answer / guest

Answer: B

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More CCNA Interview Questions

what is stub router

11 Answers   Satyam,


Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it

1 Answers  


The network portion of an address typically represents a: A.) Router B.) Ethernet MAC address. C.) Computer D.) Host E.) Segment

3 Answers  


What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.

1 Answers  


Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical

6 Answers   Wipro,


i want to ask one question that why u guys are not posting the questions is any thing wrong please post question for your and others including me knowledge

3 Answers  


what is distance vector protocol link state protocol and what is the diffrence between them

6 Answers   HCL, Wipro,


Identify the command to display all the valid commands at the given mode? A.) Help all B.) Help C.) All commands D.) ?

3 Answers  


Hi Jitendera, I need ur suggestion. I completed my CCNA certification & also hving some sort of real time experience. Now i m planning to do CCNP. Little bit confusion is that whether it wud be better for me to go for CCNP ya CCNA (Security). As off my goal is to reach CCIE (Security & Switching/Routing). So tell me some solution of my confusion yaar..!!! Thanx & Regards Shahin..

1 Answers  


why we give clock rate to DCE and not to DTE what is the difference in the two.

3 Answers  


The ICMP (referred to in RFC 1700) is implented by all TCP/IP hosts. A. true B. false

1 Answers  


what is the difference between eigrp and ospf

6 Answers   IBM, Wipro,


Categories