what is ip address?
Answers were Sorted based on User's Feedback
Answer / boby k
IP address is internet protocol address used to identify
particular PC in the network.
| Is This Answer Correct ? | 7 Yes | 1 No |
Answer / ashvani dubey
IP ADDRESSES ARE LOGICAL ADDRESSES WHICH UNIQEILY IDENTIFY A NETWORK DEVICE ON THE NETWORK
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / moganraj
IP ADDRESS IS COMBINE OF HOST AND NETWORKING ADDRESS ,IT IS
USED FOR IDENTIFY A PARTICULAR HOST,SUBNET,CLASS
| Is This Answer Correct ? | 0 Yes | 0 No |
What’s the simplest way to remotely configure a router?
Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols
What is a back off on an 802.3 networks? A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. It is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged
Write out a config to permit only the below MAC address to pass traffic through a port on your switch. in another way writhe a confrigation which permit only mac address trfaic through a port of your switch
Which of the following are Distant Vector protocols? A.) IGRP B.) RIP C.) OSFP D.) EIGRP
What is cisco?
Which layer hides details of network dependent information from the higher layers by providing transparent data transfer? A.) Transport B.) Physical C.) Data Link D.) Session E.) Application F.) Network
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
What is the second best path name of eigrp?
What is the default behavior of access-list?
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
Which statements are true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not at the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth