Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


You are a system administrator and you want to deny access to a

group of computers with addresses 172.30.16.0 to
172.30.31.0. Which

wildcard mask would you use?

A. 0.0.15.255

B. 0.0.255.255

C. 0.0.31.255

D. 0.0.127.255

E. 0.0.255.255



You are a system administrator and you want to deny access to a group of computers with addresses..

Answer / guest

Answer:: A

0.0.15.255 will check the last 13 bits of an address so that
computers

172.30.16.0 to 172.30.31.0 will be denied access. 0.0.31.255
would check

the last 6 binary digits and deny access to addresses
172.30.32.0 to

172.30.63.0. 0.0.127.255 would check the last 7 binary
digits and deny

access to addresses 172.30.64.0 to 172.30.127.0. 0.0.255.255
would deny

172.30.0.0 to 172.30.254.0. If you write decimal 15 in
binary, you have

0001111, the 1's tell the router to ignore address with
these bits set;

0's tell the router to check the bits. The third octet for
172.30.16.0

is 00010000. The third octet for 172.30.31.0 would be
00011111. So,

traffic from these addresses would be denied.

Is This Answer Correct ?    6 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify 3 IP routing protocols? A.) RIP B.) AURP C.) OSPF D.) IGRP E.) ARP F.) ICMP

2 Answers  


Which IP packet field will prevent endless loops? type-of-service identificationf lags time-to-live header checksum

1 Answers  


Which statements are true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not at the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth

2 Answers  


How broadcast is created in switch

1 Answers  


Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up control options on the WAN data link. A.) RFC 1661 B.) High Level Datalink Protocol (HDLC) C.) Challenge Handshake Authentication Protocol (CHAP) D.) SS7 E.) Link Control Protocol (LCP)

2 Answers  


Which command can verify Application Layer connectivity between 2 hosts? A.) ftp B.) snmp C.) telnet D.) ping E.) traceroute

4 Answers   CTS,


Explain protocol?

0 Answers  


Identify IPX GNS and it's purpose? A.) Go Network Server - sends a print job to a network server B.) Get Nearest Server - locate the nearest server C.) Guaranteed Network Services - allocates resources to users D.) Get Notes Server - locates Domino Server

1 Answers  


Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM

1 Answers  


Identify the command to configure ALL the default VTY ports? A.) Router(config)# line vty 0 4 B.) Router# line vty 0 4 C.) Router(config)# line vty D.) Router(config)# line vty 0

2 Answers  


What are the different IPX access lists?

0 Answers  


Identify the 2 commands the saves the running-config to NVRAM? A.) write memory B.) copy running-config startup-config C.) write network D.) write backup

2 Answers  


Categories