Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Based upon the 1st octet rule identify the range for a Class A

address?

A.) 1 - 126

B.) 192 - 223

C.) 128 - 191

D.) 1 - 191

Answers were Sorted based on User's Feedback



Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192..

Answer / kapilasdhir

A.) 1 - 126

Is This Answer Correct ?    7 Yes 0 No

Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192..

Answer / guest

Answer: A

Class A address has the 1st octet between 1 - 126. Class B
between 128 -

191 and Class C between 192 - 223.

Is This Answer Correct ?    6 Yes 1 No

Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192..

Answer / robert

A.)1-126

Is This Answer Correct ?    3 Yes 1 No

Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192..

Answer / rakesh

u all r mad ?

explain how can i identify class A address?

u just show me a range.

Is This Answer Correct ?    0 Yes 2 No

Post New Answer

More CCNA Interview Questions

What is the function of the Transport layer and which protocols reside there? A.) MAC addressing - IP B.) Interhost communication - SQL, NFS C.) Best effort Packet delivery - TCP, UDP D.) End-to-end connections - TCP, UDP

2 Answers  


What is overlaod?

0 Answers  


Which of the following is an example of the Network Layer? A.) TCP B.) IP C.) SQL D.) Token Ring E.) LLC

2 Answers  


A server is running HTTP, SMTP and DHCP. Which of the following best explains how the server is able to handle all three services over the same connection? The server has separate buffer areas for each application and forwards all data to each service. If the data does not apply to that application, it is discarded. The server processes each packet one at a time and forwards the data to the application that indicates that it is waiting for a transmission to arrive. The data is discarded if it does not apply to that application. The server uses the destination port number in the TCP/UDP header to identify the service. The data is forwarded to the service identified by the port number. The server uses separate three-way handshake connections to control the flow of the data and relates the service to the proper connection. This relationship allows the server to pass the data to the proper service.

1 Answers  


Identify the command to copy a configuration file from a TFTP server to a routers active configuration? A.) Router# copy running-config tftp B.) Router# copy tftp running-config C.) Router# copy tftp 172.16.0.1 running-config D.) Router(config)# copy tftp running-config

3 Answers  


Wild card mask always in odd value or even?

0 Answers  


1-what is the diffrence between hdlc and ppp protocol 2- why frame realy technogy called NBMA

4 Answers   Brigade,


What is default time of hello packets in ospf?

0 Answers  


Given the IPX address 4a.0002.1111.a999, what is the network ID and what is the node ID? A.) net 4a host 0002.1111.a999 B.) net a999 node 0002.1111 C.) net 0002.1111.a999 node 4a D.) net 0002.1111 node a999

1 Answers  


What is the difference between private ip and public ip?

0 Answers  


Which protocol supenetting is enable by default?

0 Answers  


Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments

1 Answers  


Categories