Identify the purpose of ARP?
A.) Avoiding routing loops
B.) Determining a workstation's IP address
C.) Sending a directed broadcast
D.) Determining a workstation's MAC address
Answers were Sorted based on User's Feedback
Answer / guest
Answer: D
ARP is used to find a devices MAC address given an IP address.
Is This Answer Correct ? | 12 Yes | 2 No |
Answer / kapilasdhir
D.) Determining a workstation's MAC address
Is This Answer Correct ? | 9 Yes | 0 No |
Answer / sukhwinder singh gharuan
ARP(Address Resolution Protocol) is a protocol which
resolves the ip address to the MAC address(physical
address) of the system. ARP is a layer 3 protocol. another
protocol RARP works in its opposite manner
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / mahesh
The Protocol that trace IP address to MAC address
Is This Answer Correct ? | 0 Yes | 0 No |
how many pass word you can configure on cisco 2500 router
Which type of switching is considered to be 'wire speed?' A.) Cut-Through B.) Multiplexed C.) Inverted D.) Layer 4 E.) Store and Forward F.) Layer 3
HI ALL , wanted to know if the rstp protocol.. rapid spanning tree protocol .. is imp to study with ccna's point of view or study of STP will be enough.. in some books rstp is nt given like todd lamle however in icnd2 its explained in detail.. please suggest asap .. thanks ..
What is the standard ISDN term for a native ISDN modem? A.) ET B.) LE C.) TE2 D.) TE3 E.) TA
how to troubleshoot when protocols is down and link is not getting up
What are the job opportunities i will get once i complete my CCNA certification.
Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) Token Ring E.) FDDI F.) TCP
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to deliver the frame to the end device E.) Contains a network portion and a host portion
Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI
When we use extended access-list?
Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash