What is the Broadcast MAC Address?
Answers were Sorted based on User's Feedback
Answer / kapilasdhir
Broad Cast MAC address is-- FF-FF-FF-FF-FF-FF
| Is This Answer Correct ? | 78 Yes | 9 No |
Answer / joop
Every mac address with the first bit = 1 is a broadcast of
multicast mac address.
So when the first character is odd (1,3,5,7,9,b,d,f) it is
a boadcast or multicast mac address
The second bit makes the difference between a broadcast and
a multicast address.
| Is This Answer Correct ? | 7 Yes | 0 No |
Identify the OSI layer associated with bits? A.) Physical B.) Network C.) Binary D.) Data link
Why OSI layers having 7 layers instead of one layer.
From Enable mode, a user types the letter 'C' and presses enter. There is more than 1 command that starts with 'C'. What message would the router return? A.) Nothing would be returned, the command is simply ignored. B.) unknown command C.) ambiguous command. D.) Copy to? E.) Configured console from console.
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
Which layer is responsible for determining if sufficient resources for the intended communication exists? A.) Application B.) Network C.) Session D.) Presentation E.) Transport
Hi Jitendera, I continuously read your answers which is more knowlegable than books... Q.I am facing some problems in subnetting.can you plzz explain the subnetting process.. will be remain thankful
When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised
Explain the major types of networks and explain?
If configuring a Cisco router to connect to a non-Cisco router across a Frame Relay network, which encapsulation type would you select? A.) Q933a B.) ISDN C.) IETF D.) CISCO E.) ANSI
Which of the following statements are true? A.) Store and forward switching creates variable latency through the switch B.) Cut through switching creates variables latency through the switch C.) Cut through switching works at wire speed D.) Store and forward switching works at wire speed
How do you get help on a command after you have received the % incomplete command response from a switch CLI? A. type "history" to review the prompt before the error B. enter a question mark to display all the console commands C. type help followed by the command to see command parameters D. reenter the command followed by a question mark to view keywords
Which two statements about integrated services digital network (ISDN) are true? A. ISDN provides data only capability B. ISDN provides an integrated voice/data capability C. The ISDN standards define the hardware and call setup schemes for end the end digital connectivity D. Users receive more bandwidth on WANS with a leased lin of 56 Cops than with multiple B channels