You are a network administrator and have been assigned the
IP address of 201.222.5.0. You need to have 20 subnets with
5 hosts per subnet. What subnet mask will you use?
A. 255.255.255.248
B. 255.255.255.128
C. 255.255.255.192
D. 255.255.255.240
Answers were Sorted based on User's Feedback
Answer / m haja bahurudeen
Ans : A
IP address 201.222.5.0 - Class C
Default SNM - 255.255.255.0
host - 5
255 . 255 . 255 . 248
11111111.11111111.11111111.11111|000
Total host - 8
Usable host - 6
Total subnet - 32
Usable subnet - 30
Is This Answer Correct ? | 17 Yes | 1 No |
Answer / guest
Answer: A
By borrowing 5 bits from the last octet, you can.
have 30 subnets. If you borrowed only 4 bits you could only
have 14 subnets. The formula is (2 to the power of n)-2.
By borrowing 4 bits, you have (2x2x2x2)-2=14. By borrowing
5 bits, you have (2x2x2x2x2)-2=30. To get 20 subnets, you
would need to borrow 5 bits so the subnet mask would be
255.255.255.248.
Is This Answer Correct ? | 9 Yes | 2 No |
Tell us the name of algorithm of eigrp protocol?
For IPX, what is the DEFAULT Cisco Encapsulation on an Ethernet interface? A.) novell-ether B.) gns C.) snap D.) arpa E.) sap F.) dix
Which ISDN specification series deals with Concepts and Terminology? A.) C- Series B.) I- Series C.) Q-Series D.) 911-Series E.) J-Series F.) F-Series
Which of the following are examples of the Application Layer? A.) LLC B.) Token Ring C.) Spreadsheet D.) TCP E.) IP F.) Word Processor
1) How a router established a neighbor relation ship in ospf
What are 10base2, 10base5 and 10baset ethernet lans?
Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination
Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it
Identify 3 features of IGRP? A.) Composite metric B.) New horizon C.) Flash (triggered) updates D.) 60-second periodic updates E.) Poison reverse
Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up control options on the WAN data link. A.) RFC 1661 B.) High Level Datalink Protocol (HDLC) C.) Challenge Handshake Authentication Protocol (CHAP) D.) SS7 E.) Link Control Protocol (LCP)
IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address
Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts