Using the TCP/IP protocol suite a message is sent from host
A to a destination IP address on the same LAN. How does
host A determine the destination of MAC address?

A. It uses a proxy APP

B. It uses APP requests

C. It uses RARP requests

D. It uses a router lookup table



Using the TCP/IP protocol suite a message is sent from host A to a destination IP address on the sa..

Answer / guest

Answer: B

Is This Answer Correct ?    4 Yes 0 No

Post New Answer

More CCNA Interview Questions

The Cisco IOS is stored in: A.) ROM B.) CD C.) Flash D.) NVRAM

5 Answers  


CSMA/CD stand for which of the following? A.) Carrier Sense, Multiple Access with Collision Detection B.) Collision Sense, Multiple Access with Collision Detection C.) Collision Sense, Multiple Access with Carrier Detection D.) Carrier Sense, MAC address with Collision Detection

3 Answers  


How do you disable CDP on the entire Router? A.) Router#no cdp run B.) Rotuer(config-if)# no cdp enable C.) Router(config)# no cdp enable D.) Router(config)# no cdp run

1 Answers  


Which is true regarding store-and-forward switching method? A.) Latency varies depending on frame-length B.) Latency is constant C.) It is default for all Cisco switches D.) It only reads the destination hardware address before forwarding the frame

1 Answers  


Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface

2 Answers   Wipro,


Identify the 2 characteristics regarding MAC addresses? A.) Contains a network portion and host portion B.) Always assigned by System Administrator C.) 48 bits long D.) Contains a vendor code and serial number

1 Answers  


Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link

2 Answers  


How do we do encryption and authentication in L2F?

0 Answers   CCIE,


The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC

3 Answers  


hi friends i am jitendera kumar sinha.i have a question in mind that what is the diffrence between router and l3 switch i serched on google and found that switch L3 is best in lan and router are best in wan and switch are more faster then router.beside that any short of technical diffrence if you body know then plz plz and plz reply. my 2nd question is that why we canot replace router with L3 switches (donot tell that it is costly then router).i want any technical cause. this is 1 am hope in noon when ever i logg again i will find the answer posted by you. thanks onse again plz pzl make reply thanks jitendera kumar sinha jitenerasinha.it@gmail.com

5 Answers  


Which protocol will let neighbor routers know if your internetwork experienced congestion on a serial port? A.) BootP B.) IP C.) ICMP D.) ARP E.) FTP F.) RARP

1 Answers  


What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message

1 Answers  


Categories