Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What address is 12 hexadecimal, resides in the Data-Link
layer, and is burned in the ROM by the manufacturer.

Answers were Sorted based on User's Feedback



What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the man..

Answer / guest

Answer: Media Access Control (MAC)

Is This Answer Correct ?    1 Yes 0 No

What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the man..

Answer / harish

MAC Address

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

In an ATM network, which type of device is in a LAN per ELAN (Emulated LAN)? A. LAN Emulation Workstation B. LAN Emulation Router C. LAN Emulation Server D. LAN Emulation Bridge

1 Answers  


What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs

1 Answers  


You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling

1 Answers  


It is not necessary to build an entire network to prove your network design. A. True B. False

1 Answers  


What are three LAPB features supported by SDLC? A. Frame types B. Frame format C. Field functions D. ABM

1 Answers  


Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. 10.0.0.0 255.0.0.0 B. 172.16.0.0 255.255.0.0 C. 172.16.0.0 255.240.0.0 D. 192.168.0.0 255.255.0.0

1 Answers  


How many networks will be advertised using route summarization within an OSPF network if you are given the following networks? 192.108.168.0 192.108.169.0 192.108.170.0 192.108.171.0 192.108.172.0 192.108.173.0 192.108.174.0 192.108.175.0 A. 1 B. 2 C. 3 D. 4 E. 5

1 Answers  


Which address is updated at each hop in the path in path switching?

1 Answers  


What are two services that the OSPF Hello protocol provides? A. It discovers neighbor routers B. It gets routes from neighbors during startup C. It helps elect a designated router D. It allows administrator to test for connectivity between two devices

1 Answers  


Our company order a cisco ws-c3750x-48t-s(here i bought from http://www.3anetwork.com/cisco-ws-c3750x-48t-s-price_p104.html), As for the switch, in addition to the port module and optical module can be extended, what else module can also be extended?

0 Answers   Aptron,


When characterizing a network, how many buffer misses should not be exceeded on a Cisco router per hour? A. 10 B. 25 C. 50 D. 100

1 Answers  


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


Categories