What is an example of a valid MAC address?

A. 192.201.63.251

B. 19-22-01-63-25

C. 0000.1234.FEGA

D. 00.00.12.34.FE.AA




Answers were Sorted based on User's Feedback



What is an example of a valid MAC address? A. 192.201.63.251 B. 19-22-01-63-25 C. 0000.1234..

Answer / rain

d

Is This Answer Correct ?    3 Yes 0 No

What is an example of a valid MAC address? A. 192.201.63.251 B. 19-22-01-63-25 C. 0000.1234..

Answer / jercey28

D

Is This Answer Correct ?    2 Yes 0 No

What is an example of a valid MAC address? A. 192.201.63.251 B. 19-22-01-63-25 C. 0000.1234..

Answer / n+

The answer is D as a MAC address is a 12-digit(48-bit) hexadecimal number (0-9 and A-F) MAC address can be divided into parts with dashes periods and colons so D could also be presented as 0000.1234.FEAA.the reason C is incorrect is because of the G "0000.1234.FEGA" as this is outside of the hexadecimal area A-F hope this helps for those wondering how and why

Is This Answer Correct ?    1 Yes 0 No




What is an example of a valid MAC address? A. 192.201.63.251 B. 19-22-01-63-25 C. 0000.1234..

Answer / bokbok

b.

Is This Answer Correct ?    2 Yes 2 No

Post New Answer



More CCNA Interview Questions

Which two does 100BaseT use? A.) CSMA/CD B.) IEEE 802.5 C.) 802.3u D.) Switching with 53-byte cells

1 Answers  


What is the maximum number of subnets that can be assigned to networks when using the address 172.16.0.0 with a subnet mask of 255.255.240.0? (Assume older version UNIX workstations are in use.) A. 16 B. 32 C. 30 D. 14 E. It is an invalid subnet mask for the Network.

2 Answers  


What is the command use to add a banner to a cisco router configuration?

0 Answers  


What is the maximum hop count for Link-State protocols? A.) 15 B.) there is no hop count limit C.) 256 D.) 16

1 Answers  


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  






Identify 2 PPP characteristics? A.) Is proprietary to Cisco B.) Supports authentication C.) Support compression D.) Run on a multi-access network

1 Answers  


i have donE B.E. IN COMPUTER SCIENCE AND THEN CCNA CERTIFICATOIN PLEASW LET ME KNOW IF ANY COMPANIES R HIRING FRESHERS PLEASE REPLY ON MY EMAIL ID karnailthakur@gmail.com

0 Answers   HCL, Wipro,


ip dhcp excluded-address 192.168.0.1 192.168.0.19 what is the use of that command can any one explain it

9 Answers  


- What is EGIRP and IGRP - How EGIRP and IGRP works

1 Answers   Airtel,


Explain usage of ICMP in IP routing

3 Answers  


If configuring a Cisco router to connect to a non-Cisco router across a Frame Relay network, which encapsulation type would you select? A.) Q933a B.) ISDN C.) IETF D.) CISCO E.) ANSI

1 Answers  


Identify 2 reasons for disabling CDP? A.) If the router is not configured for RIP B.) Save bandwidth by eliminating overhead C.) If the router is configured for Appletalk D.) When connected to a non-Cisco router

1 Answers  






Categories