What is the difference between unicast, multicast, broadcast, and anycast?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Identify the command to configure the router to boot from an alternate IOS located in flash? A.) boot system flash IOS.exe B.) boot system tftp IOS.exe 172.16.5.1 C.) boot system alternate IOS.exe D.) boot system rom IOS.exe

1 Answers  


What layer can optionally support reliability? A.) Transport B.) IP C.) Physical D.) Network E.) Sub-physical layer

2 Answers  


What is subnetting? Why is it used?

0 Answers  


Tell me which cable called roll-over?

0 Answers  


Which Distance Vector characteristic can help to speed up convergence? A.) Triggered Updates. B.) Split Horizon. C.) Poison Reverse. D.) Hold Down timers. E.) Inverse ARP.

1 Answers  






Identify the 3 characteristics of IGRP? A.) Uses hop count as a metric B.) Supports multiple unequal paths C.) Administrative distance is 100 D.) Configured with an Autonomous system number E.) Link state

1 Answers  


Differentiate Logical Topology from Physical Topology

0 Answers  


What does -1 mean in an extended IPX access-list? A.) Any IP address B.) Deny all C.) Deny host D.) Any host or any network

1 Answers  


What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.

1 Answers  


Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon

1 Answers  


You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0

1 Answers  


Identify the order of the 5 step encapsulation? 1) Create the segment 2) Convert the frame to bits 3) Create the packet 4) Create the frame 5) User creates the data A.) 1,2,4,2,5 B.) 2,1,3,4,5 C.) 5,1,3,4,2 D.) 5,3,4,1,2

1 Answers  


Categories