Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the distance limitation for 100BaseT?

A. 607 ft

B. 25 Meters

C. 1,000 ft

D. 185 Meters



What is the distance limitation for 100BaseT? A. 607 ft B. 25 Meters C. 1,000 ft D. 185 ..

Answer / guest

Answer: D

Is This Answer Correct ?    5 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS

2 Answers  


which is following route will be used to froword data in a situation where a routing table tables contains static ,RIP,IGRP routes destined to the same network with each set to its default administrative distance

9 Answers   HCL,


5. What is an advantage of using routers in your network? (Choose all that apply) A. Stops broadcast storms B. Reduces downtime on your network C. Creates internetworks D. Can filter by logical address

6 Answers  


Can you explain transport and tunnel mode in detail with datagram packets?

1 Answers   CCIE,


What is the usage of service password encryption?

0 Answers  


Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts

1 Answers  


What is Summarization and supernetting and what its use?

4 Answers  


What is true when using DDR? A.) HDLC is the preferred encapsulation B.) You must use static routing C.) You should use dynamic routing D.) You should use ISDN

1 Answers  


Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session

1 Answers   Rooman,


Which peer authentication method and which ipsec mode is used to connect to the branch locations?

0 Answers  


Which layer of the 7 layer model provides services to the Application layer over the Session layer connection? A.) Transport B.) Application C.) Session D.) Network E.) Datalink F.) Presentation

2 Answers   CTS,


Identify 3 characteristics of ISDN? A.) Transports voice and data B.) Transports voice only C.) Support both BRI and PRI D.) Runs over existing phone lines E.) Same as X.25

1 Answers  


Categories