You are given the IP address of 172.16.2.160 with a subnet
mask of 255.255.0.0. What is the network address in binary?
A. 10101100 00010000
B. 00000010 10100000
C. 10101100 00000000
D. 11100000 11110000
Answers were Sorted based on User's Feedback
Answer / m haja bahurudeen
Ans : A
172.16.2.160
Class B IP address - N.N.H.H
Network address - 172.16
172 . 16
10101100.00010000
| Is This Answer Correct ? | 11 Yes | 2 No |
Answer / guest
Answer:: A
To find the network address, convert the IP
address to binary--10101100 000100000 00000010
10100000--then ANDed it with the subnet mask--11111111
11111111 00000000 00000000. The rest is 10101100 00010000
00000000 00000000, which is 172.16.0.0 in decimal.
The first octet rule states that the class of an address can
be determined by the numerical value of the first octet.
| Is This Answer Correct ? | 5 Yes | 0 No |
Identify the command to configure the router to boot from an IOS located on a TFTP server? A.) boot system tftp IOS.exe 172.16.5.1 B.) boot system tftp 172.16.5.1 IOS.exe C.) boot system flash tftp 172.16.5.1 D.) boot system IOS.exe 172.16.5.1
Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
My question is how windows pc will act as a router? Jitendra understand this question? I again want to ask you is it possibele for windows pc to act like a router
GUY i Have attended one interview for the data craft and they are offering me L1 postion and i am working at l2 in cisco so there is no way to get in the datacraft i am posting here the question he asked to and i have tested the interviewer and i come to know he was not having any knowledge. His questions are-: 1) what is Vlan 2) what is stp and what is difference between stp and RSTP 3) what is HSRP and Diffrence betwwen HSRP and GLBP 4) how to configure HSRP 5) Scenario Based question ( if we have two router and both are connected and there are having redundancy means two interface of the router r1 is connected to the two interface of Router R2 (R1)-------------(R2 (R1)-------------(R2 Now he want to configure the router in such a Manner that if one link down second link should come up.My answer was HSRP and his is "F looting static routing was i wrong "i know F looting Static routing is Theoretically possible but it is not fusible in the scenario where you have multiple router connected to the same router and if you have configured sub interface i challenged him and he lost The Battle and he get angary 5) what the eigrp and how it works 6) tables in eigrp 7) the information of feasible successor where it saved now after answering these all he was very angry ( i can fill the heat) 8) then he come to ospf Area type ( he was also not aware) 9) LSA type and its working ( he was also having confusion ) 10) then is asked routing by rummer( Theroy) 11) hello and dead intervel of EIGRp (theory) 12) Selection cretaria for Eigrp slecting best path ( here we have a long discussion on MTU and he lost the battle and agree That MTU never comes in the accounts in this process) 13) what is ACL type of acl ( here he was aware of TWO type Standard and extended i have told him 5 type( he again get Angry) We have 2hr of discussion and and he told me he will call me latter but i know he never call
What are the OSPF router rules????
What key do you use to view the last command? A.) Ctrl+X B.) Ctrl+Z C.) Ctrl+E D.) Ctrl+P
Which OSI layer establishes, maintains and terminates sessions between applications? A.) Application B.) Physical C.) Data-Link D.) Presentation E.) Network F.) Session
Explain the difference between routing and routed protocols?
What is the default behavior of access-list?
Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts
Identify the 2 characteristics regarding MAC addresses? A.) Contains a network portion and host portion B.) Always assigned by System Administrator C.) 48 bits long D.) Contains a vendor code and serial number
what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?