Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the Broadcast MAC Address?

Answers were Sorted based on User's Feedback



What is the Broadcast MAC Address?..

Answer / kapilasdhir

Broad Cast MAC address is-- FF-FF-FF-FF-FF-FF

Is This Answer Correct ?    78 Yes 9 No

What is the Broadcast MAC Address?..

Answer / basha

FF-FF-FF-FF-FF-FF

Is This Answer Correct ?    40 Yes 2 No

What is the Broadcast MAC Address?..

Answer / joop

Every mac address with the first bit = 1 is a broadcast of
multicast mac address.

So when the first character is odd (1,3,5,7,9,b,d,f) it is
a boadcast or multicast mac address

The second bit makes the difference between a broadcast and
a multicast address.

Is This Answer Correct ?    7 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify the OSI layer associated with bits? A.) Physical B.) Network C.) Binary D.) Data link

3 Answers  


Why OSI layers having 7 layers instead of one layer.

8 Answers   HCL,


From Enable mode, a user types the letter 'C' and presses enter. There is more than 1 command that starts with 'C'. What message would the router return? A.) Nothing would be returned, the command is simply ignored. B.) unknown command C.) ambiguous command. D.) Copy to? E.) Configured console from console.

1 Answers  


Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list

1 Answers  


Which layer is responsible for determining if sufficient resources for the intended communication exists? A.) Application B.) Network C.) Session D.) Presentation E.) Transport

3 Answers  


Hi Jitendera, I continuously read your answers which is more knowlegable than books... Q.I am facing some problems in subnetting.can you plzz explain the subnetting process.. will be remain thankful

4 Answers  


When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised

8 Answers   Wipro,


Explain the major types of networks and explain?

0 Answers  


If configuring a Cisco router to connect to a non-Cisco router across a Frame Relay network, which encapsulation type would you select? A.) Q933a B.) ISDN C.) IETF D.) CISCO E.) ANSI

1 Answers  


Which of the following statements are true? A.) Store and forward switching creates variable latency through the switch B.) Cut through switching creates variables latency through the switch C.) Cut through switching works at wire speed D.) Store and forward switching works at wire speed

1 Answers  


How do you get help on a command after you have received the % incomplete command response from a switch CLI? A. type "history" to review the prompt before the error B. enter a question mark to display all the console commands C. type help followed by the command to see command parameters D. reenter the command followed by a question mark to view keywords

1 Answers  


Which two statements about integrated services digital network (ISDN) are true? A. ISDN provides data only capability B. ISDN provides an integrated voice/data capability C. The ISDN standards define the hardware and call setup schemes for end the end digital connectivity D. Users receive more bandwidth on WANS with a leased lin of 56 Cops than with multiple B channels

1 Answers  


Categories