You are a system administrator and you want to deny access to a
group of computers with addresses 172.30.16.0 to
172.30.31.0. Which
wildcard mask would you use?
A. 0.0.15.255
B. 0.0.255.255
C. 0.0.31.255
D. 0.0.127.255
E. 0.0.255.255
Answer / guest
Answer:: A
0.0.15.255 will check the last 13 bits of an address so that
computers
172.30.16.0 to 172.30.31.0 will be denied access. 0.0.31.255
would check
the last 6 binary digits and deny access to addresses
172.30.32.0 to
172.30.63.0. 0.0.127.255 would check the last 7 binary
digits and deny
access to addresses 172.30.64.0 to 172.30.127.0. 0.0.255.255
would deny
172.30.0.0 to 172.30.254.0. If you write decimal 15 in
binary, you have
0001111, the 1's tell the router to ignore address with
these bits set;
0's tell the router to check the bits. The third octet for
172.30.16.0
is 00010000. The third octet for 172.30.31.0 would be
00011111. So,
traffic from these addresses would be denied.
| Is This Answer Correct ? | 6 Yes | 0 No |
what is secure hand shake protocol
What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards
Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) DDP E.) Ethernet
"sap" is used by the Cisco IOS for which encapsulation types? A. Ethernet_802.2 B. Token-Ring C. FDDI_SNAP D. Ethernet_802.3 E. FDDI_802.2
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
If i connect two routers through ethernet cable and serial cable then which has high speed and which is better among two?
10 Answers Compaq, Inspace, Wipro,
What are two ways IPX supports multiple logical networks on an individual underrate? (Choose two) A. network number B. routing protocol C. encapsulation type D. autonomous system number
Identify the effect of Ctrl-Z? A.) Exits back to privileged exec mode B.) Disconnect from the router C.) Abort the ping operation D.) Exits privileged exec mode
why we use AS no. in IGRP and EIGRP?
Identify the number range for IPX SAP filters? A.) 900 - 999 B.) 1000 - 1099 C.) 800 -899 D.) 100 - 199
Hi, Jitendra thanks for letting me know my answer. I know ip addressess classes & there subnet masks. Waht i want to know is the exact address? Ex.In the organization there are 70 pcs which type of address we can use there what will be the range for ip address?
Explain why UDP is lease favored when compared to TCP?