Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


You are a system administrator and you want to deny access to a

group of computers with addresses 172.30.16.0 to
172.30.31.0. Which

wildcard mask would you use?

A. 0.0.15.255

B. 0.0.255.255

C. 0.0.31.255

D. 0.0.127.255

E. 0.0.255.255



You are a system administrator and you want to deny access to a group of computers with addresses..

Answer / guest

Answer:: A

0.0.15.255 will check the last 13 bits of an address so that
computers

172.30.16.0 to 172.30.31.0 will be denied access. 0.0.31.255
would check

the last 6 binary digits and deny access to addresses
172.30.32.0 to

172.30.63.0. 0.0.127.255 would check the last 7 binary
digits and deny

access to addresses 172.30.64.0 to 172.30.127.0. 0.0.255.255
would deny

172.30.0.0 to 172.30.254.0. If you write decimal 15 in
binary, you have

0001111, the 1's tell the router to ignore address with
these bits set;

0's tell the router to check the bits. The third octet for
172.30.16.0

is 00010000. The third octet for 172.30.31.0 would be
00011111. So,

traffic from these addresses would be denied.

Is This Answer Correct ?    6 Yes 0 No

Post New Answer

More CCNA Interview Questions

what is secure hand shake protocol

2 Answers  


What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards

1 Answers  


Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) DDP E.) Ethernet

1 Answers  


"sap" is used by the Cisco IOS for which encapsulation types? A. Ethernet_802.2 B. Token-Ring C. FDDI_SNAP D. Ethernet_802.3 E. FDDI_802.2

1 Answers  


What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS

2 Answers  


If i connect two routers through ethernet cable and serial cable then which has high speed and which is better among two?

10 Answers   Compaq, Inspace, Wipro,


What are two ways IPX supports multiple logical networks on an individual underrate? (Choose two) A. network number B. routing protocol C. encapsulation type D. autonomous system number

1 Answers  


Identify the effect of Ctrl-Z? A.) Exits back to privileged exec mode B.) Disconnect from the router C.) Abort the ping operation D.) Exits privileged exec mode

1 Answers  


why we use AS no. in IGRP and EIGRP?

2 Answers   HCL,


Identify the number range for IPX SAP filters? A.) 900 - 999 B.) 1000 - 1099 C.) 800 -899 D.) 100 - 199

1 Answers  


Hi, Jitendra thanks for letting me know my answer. I know ip addressess classes & there subnet masks. Waht i want to know is the exact address? Ex.In the organization there are 70 pcs which type of address we can use there what will be the range for ip address?

2 Answers  


Explain why UDP is lease favored when compared to TCP?

0 Answers  


Categories