Which statement is true when a broadcast is sent in an
Ethernet/802.3 ITAN?

A. The ip shored used is 255.255.255.0

B. The IP address used is 255.255.255.255

C. The MAC address used is 00 00 00 00 00 00

D. The MAC address used is FF FF FF FF FF FF



Which statement is true when a broadcast is sent in an Ethernet/802.3 ITAN? A. The ip shored use..

Answer / guest

Answer: D

Is This Answer Correct ?    3 Yes 1 No

Post New Answer

More CCNA Interview Questions

Tell me which protocol works only on cisco routers?

0 Answers  


You are logged into a router, what command would show you the IP addresses of routers connected to you? A. show cdp neighbors detail B. show run C. show neighbors D. show cdp

2 Answers  


Identify the command to configure the configuration-register? A.) Router# config-register 0x2102 B.) Router(config)# config-register 0x2102 C.) Router(config-reg)# 0x2102 D.) Router> config-register 0x2102

2 Answers  


In regards to the ISDN BRI standard, which channel is used for control? A.) B B.) D C.) E D.) I E.) Q

2 Answers  


What command would show the version of the IOS that you are running? A.) show nvram B.) show version C.) show startup-config D.) show ios E.) ver -a F.) show ram

1 Answers  






Where is the point between the customers site and the phone carrier that responsibility changes? A.) CO B.) Demarc C.) DCE D.) DTE E.) CPE

1 Answers  


Which OSI Reference Layer is concerned with logical addressing? A.) Network B.) Transport C.) Datalink D.) Physical E.) Session

1 Answers  


Give some benefits of LAN switching.

0 Answers  


Identify the command to run 'setup'? A.) Router(config)#setup B.) Router?setup C.) Router#setup D.) Router>setup

1 Answers   Karrox,


Which IP packet field will prevent endless loops? type-of-service identificationf lags time-to-live header checksum

1 Answers  


The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC

2 Answers  


Can you explain the basic of encryption in VPN?

0 Answers   CCIE,


Categories