You need to come up with a TCP/IP addressing scheme for your
company. How many network IDs must you allow for when you
define the
subnet mask for the network?
A.) One for each WAN link
B.) One for each router interface
C.) One for each NIC installed in each client
D.) One for each subnet with hosts
E.) One for each host ID
Answer / guest
Answer: A D
When determining Network Ids, you need to take into account
each Subnet
and Each WAN link you will have. Add these numbers up and
you will find
the answer to which Network ID you can use.
| Is This Answer Correct ? | 4 Yes | 1 No |
What is the meaning of synchronization?
What is the checksum?
Which of the following are Transport layer protocols? A.) UDP B.) TCP C.) NBP D.) IP E.) SPX
Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not at the same time
What is ISR or NonISR router? Difference between ISR or NonISR router?
What is loop back ip in ipv6?
what is standard and extended acess list? what are the commands for extended and acess list?
Given the command 'cl?', what will it display? A.) Syntax of the 'clock' command B.) Syntax of the 'clear' command C.) All commands that begin with 'cl' D.) All commands that begin with 'c'
Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols
What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message
What is fcs?
What is Phase od VPN in site to site and what information you will require to configure a SITE to SITE VPN