7. What is an advantage to using switches in your network?
A. Addressing of hosts by DHCP
B. Ease of administration
C. Stops broadcast storms
D. Works like a repeater




Answers were Sorted based on User's Feedback



7. What is an advantage to using switches in your network? A. Addressing of hosts by DHCP B. Eas..

Answer / kapilasdhir

Answer: B
Switches filter by MAC address and, by default, are
typically easy to administrate. B is the "best" answer

Is This Answer Correct ?    9 Yes 0 No

7. What is an advantage to using switches in your network? A. Addressing of hosts by DHCP B. Eas..

Answer / kushal

d

Is This Answer Correct ?    2 Yes 6 No

Post New Answer




More CCNA Interview Questions

EIGRP send query reply & Acknowledgment on which address ?

3 Answers  


Where is the point between the customers site and the phone carrier that responsibility changes? A.) CO B.) Demarc C.) DCE D.) DTE E.) CPE

1 Answers  


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


what is the boot seqance of cisco router

5 Answers  


As the system administrator, you type "ppp authentication chap pap secret". Which authentication method is used first in setting up a session? A. secret B. PAP C. CHAP D. PPP/SLIP

1 Answers  






Which of the following are examples of the Application Layer? A.) LLC B.) Token Ring C.) Spreadsheet D.) TCP E.) IP F.) Word Processor

1 Answers  


what is quota management?

2 Answers   HCL,


how can we block remote desktop for some user from cisco router through aaccess-list

5 Answers  


What does the command show access-lists 101 list? A. all defended access lists B. all access lists within the router C. the contents of standard access list 101 D. the contents of defended access list 101

1 Answers  


1 whatis te1,te2 and nt1 what is threre functions 2 what are the isdn protocols 3 whait is spid

1 Answers  


What is the protocol number for UDP? A.) 6 B.) 17 C.) 25 D.) 21

4 Answers  


What key do you use to view the last command? A.) Left Arrow B.) Ctrl-P C.) Up Arrow D.) Right Arrow

2 Answers  






Categories