You are a network administrator and have been assigned the

IP address of 201.222.5.0. You need to have 20 subnets with

5 hosts per subnet. What subnet mask will you use?

A. 255.255.255.248

B. 255.255.255.128

C. 255.255.255.192

D. 255.255.255.240

Answers were Sorted based on User's Feedback



You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to..

Answer / m haja bahurudeen

Ans : A


IP address 201.222.5.0 - Class C
Default SNM - 255.255.255.0

host - 5

255 . 255 . 255 . 248
11111111.11111111.11111111.11111|000

Total host - 8
Usable host - 6
Total subnet - 32
Usable subnet - 30

Is This Answer Correct ?    17 Yes 1 No

You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to..

Answer / guest

Answer: A

By borrowing 5 bits from the last octet, you can.

have 30 subnets. If you borrowed only 4 bits you could only

have 14 subnets. The formula is (2 to the power of n)-2.

By borrowing 4 bits, you have (2x2x2x2)-2=14. By borrowing

5 bits, you have (2x2x2x2x2)-2=30. To get 20 subnets, you

would need to borrow 5 bits so the subnet mask would be

255.255.255.248.

Is This Answer Correct ?    9 Yes 2 No

Post New Answer

More CCNA Interview Questions

Tell us the name of algorithm of eigrp protocol?

0 Answers  


For IPX, what is the DEFAULT Cisco Encapsulation on an Ethernet interface? A.) novell-ether B.) gns C.) snap D.) arpa E.) sap F.) dix

1 Answers  


Which ISDN specification series deals with Concepts and Terminology? A.) C- Series B.) I- Series C.) Q-Series D.) 911-Series E.) J-Series F.) F-Series

1 Answers  


Which of the following are examples of the Application Layer? A.) LLC B.) Token Ring C.) Spreadsheet D.) TCP E.) IP F.) Word Processor

1 Answers  


1) How a router established a neighbor relation ship in ospf

1 Answers   Infosys,






What are 10base2, 10base5 and 10baset ethernet lans?

0 Answers  


Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination

3 Answers  


Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it

1 Answers  


Identify 3 features of IGRP? A.) Composite metric B.) New horizon C.) Flash (triggered) updates D.) 60-second periodic updates E.) Poison reverse

1 Answers  


Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up control options on the WAN data link. A.) RFC 1661 B.) High Level Datalink Protocol (HDLC) C.) Challenge Handshake Authentication Protocol (CHAP) D.) SS7 E.) Link Control Protocol (LCP)

2 Answers  


IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address

2 Answers  


Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts

1 Answers  


Categories