logo

CuriousTab

CuriousTab

Discussion


Home Certification CISCO Certification Comments

  • Question
  • Differentiate a MAC address and an IP address and describe how and when each address type is used in a network?


  • Correct Answer
  • A MAC address is a hexadecimal number identifying the physical connection of a host MAC addresses are said to operate on layer 2 of the OSI model IP addresses, which can be expressed in binary or decimal format, are logical identifiers that are said to be on layer 3 of the OSI model Hosts on the same physical segment locate one another with MAC addresses, while IP addresses are used when they reside on different LAN segments or subnets Even when the hosts are in different subnets , a destination IP address will be converted to a MAC address when the packet reaches the destination network via routing 


  • CISCO Certification problems


    Search Results


    • 1. What is the bit length and expression form of a MAC address?
    • Discuss
    • 2. Which layer chooses and determines the availability of communicating partners along with the resources necessary to make the connection, coordinates partnering applications, and forms a consensus on procedures for controlling data integrity and error recovery?
    • Discuss
    • 3. Acknowledgments, sequencing , and flow control are characteristics of which OSI layer?

    • Options
    • A. Layer 2
    • B. Layer 3
    • C. Layer 4
    • D. Lawer 7
    • Discuss
    • 4. Which of the following devices do not operate at all levels of the OSI model?

    • Options
    • A. Network management stations (NMSs)
    • B. Routers
    • C. Web and application servers
    • D. Network hosts
    • Discuss
    • 5. What does a firewall?

    • Options
    • A. Examines packets and decides which ones should be allowed to pass from one network to another.
    • B. Maintains a table which maps the IP addresses of two network so that packets can be redirected between the networks.
    • C. Compares packets to virus signatures so that packets which are know to be dangerous can be identified and stopped.
    • D. Prevents viruses from moving any further through a network
    • Discuss
    • 6. What type of RJ45 UTP cable do you use to connect a PC's COM port to a router or switch console port?

    • Options
    • A. Straight - through
    • B. Crossover cable
    • C. Crossover with a CSU/DSU
    • D. Rolled
    • Discuss
    • 7. You have the following binary number :10110111. What are the decimal and hexadecimal equivalents?

    • Options
    • A. 69/0x2102
    • B. 183/B7
    • C. 173/A6
    • D. 83/0xC5
    • Discuss
    • 8. Your company wants to reconfigure a Catalyst 2950. Which actions must be taken to erase the old configuration?(Choose three) A. Erase flash B. Restart the switch C. Delete the VLAN database D. Erase the startup configuration
    • Discuss
    • 9. If one of the host connected to Sw-AC3 wants to send message to ip 190.0.2.5 (or any ip on a different subnet) what will be the destination MAC address ?
    • Discuss
    • 10. Which three IP addresses can be assigned to hosts if the subnet mask is /27 and subnet zero is usable? A. 10.15.32.17 B. 17.15.66.128 C. 66.55.128.1 D. 135.1.64.34 E. 129.33.192.192 F. 192.168.5.63
    • Discuss


    Comments

    There are no comments.

Enter a new Comment