What type of address is analyzed by a Layer 2 switch?

A. network address

B. MAC and network address

C. Protocol type, MAC, and network address

D. MAC address

Answers were Sorted based on User's Feedback



What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network ad..

Answer / guest

Answer: D

Since a switch operates at Layer 2 and MAC addresses reside
at Layer 2, a MAC address is the type of address analyzed by
a Layer 2 switch. Network addresses are Layer 3.

Is This Answer Correct ?    3 Yes 0 No

What type of address is analyzed by a Layer 2 switch? A. network address B. MAC and network ad..

Answer / nilesh

D. MAC Address

Is This Answer Correct ?    2 Yes 1 No

Post New Answer

More CCDA Interview Questions

What would you include in your prototype design for this particular case study?

1 Answers  


What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing

1 Answers   Cisco,


What set of Frame Relay enhancements offer extensions for managing complex internetworks? A. CMT B. SNMP C. LMI D. RMON

1 Answers  


When is the route to a node determined in an SRB (Source Route Bridging) Token Ring network? A. Before any data is transmitted B. After the data is transmitted C. During the transmission of data D. After the first frame is transmitted

1 Answers  


Regarding a full-mesh network and a partial-mesh network, what is the most accurate statement? A. Split Horizon will not work on a full-mesh network B. A full-mesh network is more expensive because more routers are used C. A partial-mesh network is less expensive because less virtual circuits are used D. Broadcasts are more plentiful on a partial-mesh network

1 Answers  






Match the following routing techniques with the correct descriptions: A. Static Routing 1. Mandatory configuration B. Dynamic Routing 2. No route updates 3. Can better tolerate failures 4. Sends update when topology changes 5. Path is determined by the router 7. Traffic is reduced

1 Answers  


What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link

2 Answers  


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


A remote user needs a static IP address to support a specific application.Which remote access VPN addressing technique supports this ?

2 Answers   Pari Networks,


When doing an RFP (Request for Purchase) for a customer, at what step do you reiterate your solution and the customer requirements? A. Design Requirements B. Design Solution C. Summary D. Appendices

1 Answers  


How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS

3 Answers   HCL,


Distance Vector and Link-State protocols converge more quickly if: A. there is router redundancy B. there is router redistribution C. the update interval is set to its maximum D. the whole routing table is sent to announce changes

1 Answers  


Categories