Which of the following is an invalid host address using a
netmask
of 255.255.255.192?
A.) 10.1.1.1
B.) 10.1.1.66
C.) 10.1.1.130
D.) 10.1.1.127
Answers were Sorted based on User's Feedback
Answer / subramani
D.) 10.1.1.127
No of valued hosts is
2^6-2=64-2=62
Therefore subnets are 0,64,128,256
since third subnet starts with 128,
127 will become the broadcast address for the second subnet
which is starting from 64.
| Is This Answer Correct ? | 2 Yes | 0 No |
What are the two components of an IPX address? A. network number IP address B. MAC address node number C. network number MAC address D. network number arched number
If a frame is received at a switch and only the destination hardware address is read before the frame is forwarded, what type of switching method is this? A.) Store-and-drop B.) Latency C.) Store-and-forward D.) Cut-through
Who controls mac address uniqueness and how?
Identify the command that configures serial0 for PPP encapsulation? A.) Router(config)# encapsulation ppp B.) Router(config-if)# encapsulation serial ppp C.) Router(config-if)# encapsulation ppp D.) Router# encapsulation ppp
What is the cladding?
What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos
What utility can you use to see the path a packet takes through an internetwork? A.) Route B.) SNMP C.) Trace D.) Ping
What is the updates time of routing table,and what is the invalid timer, and also what is the flush timer in IGRP and EIGRP?
Is it possible that in a switched network that any port of the switch can be infected with any kind of viruses that jamed and create more traffic in network which cause slow network performance?
What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic D.) Distance Vector
A server is running HTTP, SMTP and DHCP. Which of the following best explains how the server is able to handle all three services over the same connection? The server has separate buffer areas for each application and forwards all data to each service. If the data does not apply to that application, it is discarded. The server processes each packet one at a time and forwards the data to the application that indicates that it is waiting for a transmission to arrive. The data is discarded if it does not apply to that application. The server uses the destination port number in the TCP/UDP header to identify the service. The data is forwarded to the service identified by the port number. The server uses separate three-way handshake connections to control the flow of the data and relates the service to the proper connection. This relationship allows the server to pass the data to the proper service.
Identify the 2 commands to copy a configuration from a TFTP server to RAM? A.) configure network B.) configure overwrite C.) copy backup-config running-config D.) copy tftp running-config