What is the Broadcast MAC Address?
Answers were Sorted based on User's Feedback
Answer / kapilasdhir
Broad Cast MAC address is-- FF-FF-FF-FF-FF-FF
| Is This Answer Correct ? | 78 Yes | 9 No |
Answer / joop
Every mac address with the first bit = 1 is a broadcast of
multicast mac address.
So when the first character is odd (1,3,5,7,9,b,d,f) it is
a boadcast or multicast mac address
The second bit makes the difference between a broadcast and
a multicast address.
| Is This Answer Correct ? | 7 Yes | 0 No |
What are three benefits of Integrated Services Digital Network (ISDN) (Choose three) A. PVCs are faster and more reliable B. No specialized equipment is required C. Data transfer is faster than typical modems D. Call setup is faster than with standard telephone service E. It carries many types of data tramp such as voice video and data
ip dhcp excluded-address 192.168.0.1 192.168.0.19 what is the use of that command can any one explain it
Identify 2 HDLC characteristics? A.) Default serial encapsulation B.) Open standard C.) Supports Stacker compression D.) Supports point-to-point and multipoint
Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A. trace B. ping C. telnet D. bootp
Which technology is used by Catalyst switches to resolve topology loops and ensure data flows properly through a single network path? A. virtual LANS (VLANS) B. frame filtering C. cut-through switching D. spanning-tree protocol
Which mode we can't skip when we come back from interface mode?
Which of the following is a valid TCP/IP socket for an Email connection? 101.34.2.125:25 00-00-03-1B-CA-6F:143 202.167.23.101:21 60.4:110
why we give clock rate to DCE and not to DTE what is the difference in the two.
Briefly explain the conversion steps in data encapsulation.
Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery
What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.
What are two characteristics of the RARP protocol? (Choose two) A. it generates parameter problem messages B. it maps IP addresses to Ethernet addresses C. it maps Ethernet addresses to IP addresses D. it is implemented directly on top of the data link layer