What is the bit length and expression form of a MAC address?

A. 24 bits expressed as a decimal number

B. 24 bits expressed as a hexadecimal number

C. 36 bits expressed as a binary number

D. 48 bits expressed as a decimal number

E. 48 bits expressed as a hexadecimal number

Answers were Sorted based on User's Feedback



What is the bit length and expression form of a MAC address? A. 24 bits expressed as a decimal nu..

Answer / guest

Answer: E

Is This Answer Correct ?    54 Yes 8 No

What is the bit length and expression form of a MAC address? A. 24 bits expressed as a decimal nu..

Answer / kapilasdhir

E. 48 bits expressed as a hexadecimal number

Is This Answer Correct ?    40 Yes 10 No

Post New Answer

More CCNA Interview Questions

What is the name of algorithm of eigrp protocol?

0 Answers  


An user from the LAN is able to ping the default gateway of the router and other sites in the internet. but not able to ping only the google site, no acc list configured and no firewall and no problem with DNS atall. What may be the problem with router?

8 Answers   Satyam,


Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub

1 Answers  


what is difference between hub and switch?

7 Answers   IBM,


You want a message to be displayed every time someone tries to log on to the router. Which command is required to accomplish this task? A.) motd#(message)# B.) banner motd(message) C.) banner motd#(message)# D.) banner motd*(message) E.) banner login#(message)#

1 Answers  






When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.

1 Answers  


Identify the 2 commands to copy a configuration from a TFTP server to RAM? A.) configure network B.) configure overwrite C.) copy backup-config running-config D.) copy tftp running-config

1 Answers  


What are the different types of VPN?

0 Answers   CCIE,


IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port

1 Answers  


The following is partial output from a routing table, identify the 2 numbers in the square brackets; '192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1' A.) 100 = metric, 1300 = administrative distance B.) 100 = administrative distance, 1300 = hop count C.) 100 = administrative distance, 1300 = metric D.) 100 = hop count, 1300 = metric

1 Answers  


What is ISR or NonISR router? Difference between ISR or NonISR router?

3 Answers   HCL,


Identify the command to configure the router to boot from an alternate IOS located in flash? A.) boot system flash IOS.exe B.) boot system tftp IOS.exe 172.16.5.1 C.) boot system alternate IOS.exe D.) boot system rom IOS.exe

1 Answers  


Categories