Which network mask should you place on a Class C network to
accommodate a user requirement of ten subnetworks?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
Answers were Sorted based on User's Feedback
Answer / swamy
Sub=2x
=2x2x2x2
=16
128.64.32.16.8.4.2.1
0 . 0. 0. 0.1.1.1.1
subnet mask 11111111.11111111.11111111.11110000.
192.168.1.0
192.168.1.16
192.168.1.32
upto 192.168.1.240 as we cant use 192.168.1.256
so the subnet mask is 255.255.255.240
| Is This Answer Correct ? | 11 Yes | 0 No |
Answer / gaurav mishra
For Class C Address, there are 8 host/subnet bits :-
255.255.255.0
We want 10 subnets :-
2*2*2=8 (less than 10.)
2*2*2*2=16 (fullfill the requirement of 10.)
We see that here 4 bits are required for 10 subnets.
128 192 224 240 248 252 254 255
1 1 1 1 0 0 0 0
So the mask is 255.255.255.240
| Is This Answer Correct ? | 0 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
Class C range from 192 to 228 .So,the Subnet mask will
range from 255.255.255.192 to 255.255.255.202 which comes
under class C range of ip address.
| Is This Answer Correct ? | 0 Yes | 0 No |
Of the following switching types, which one has the highest latency? A.) Cut-through B.) None C.) Store-and-forward D.) Fragment Free
Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10.1.1.1 B.) 10.1.1.66 C.) 10.1.1.130 D.) 10.1.1.127
Identify 2 PPP characteristics? A.) Is proprietary to Cisco B.) Supports authentication C.) Support compression D.) Run on a multi-access network
How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain
what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how to block some site on that which form user not able to access site and basic firwall config and why are we using firwall please jittendra explain it.can u send me doc of firwall in my gmail id - dsoni89@gmail.com
Which command displays access list 111? A. show access-list 111 B. show ip access-list 111 C. display ip access-list 111 D. display access-list 111 details
Of the following switching types, which one has the lowest latency? A.) Cut-through B.) Fragment Free C.) None D.) Store-and-forward
Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric
When we use loop back ip?
Explain what is 5-4-3 rule?
How would you set the clock rate to 64K, on interface serial 0, from the interface configuration mode? A.) clock rate 64000 B.) bandwidth 64 C.) clock 64 D.) rate 64 E.) clock rate 64k F.) clock rate 64
What IP command would you use to test the entire IP stack? A.) Stack-test B.) Arp C.) Telnet D.) Ping E.) Trace