Identify 1 characteristic of RARP?
A.) MAC to IP address translation
B.) Connectionless delivery of packets
C.) Can be used to initiate remote O/S load sequence
D.) Generates error and control messages
Answers were Sorted based on User's Feedback
Answer / m haja bahurdeen
Ans : A
ARP - IP to MAC address translation
RARP - MAC to IP address translation
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / punit singhal
A. MAC to IP translation
C. Can be used to initiate remote O/S load sequence
(Reverse Address Resolution Protocol is used to obtain a layer 3 address if the MAC address is known which then facilitates the loading of the O/S.)
Is This Answer Correct ? | 2 Yes | 0 No |
what does the clock rate do?
Define the different kinds of casting
Identify the 2 hardware components used to manage and/or configure a router? A.) Auxiliary port B.) ROM port C.) Management port D.) Console port
Identify the definition of demarcation? A.) Date in which the WAN service contract expires B.) Cabling which extends from the WAN service provider to the customer C.) Division of responsibility, where the CPE ends and the local loop begins D.) Equipment which is located at the customer premises
there is three mode of vtp let there are three switch s1 in server mode s2 in transparent mede and s3 in clint mode then will that tranparnt mode going to effect the network if yes then how and if no then what it will do
Identify the 2 methods to modify the routers boot sequence? A.) Setup program B.) Boot system commands C.) RXBoot D.) Config-register
Which two statements about frame tagging are true? (Choose two) A. A filtering table is developed for each switch. B. Frame tagging assigns a unique user defined ID to each frame. C. A unique identifier is placed in the header of each frame as it is forwarded between switches. D. Frame tagging is a technique that examines particular information about each frame based on user defined offsets.
What is Cisco register bits? How they help?
Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john
Which OSI layer performs code conversion, code formatting and encryption? A.) Physical B.) Data-Link C.) Application D.) Transport E.) Presentation F.) Network
What are the different memories that are used in a cisco router?
Which OSI layer incorporates the MAC address and the LLC? A.) Data link B.) Network C.) Physcial D.) Transport