Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which of the following is an invalid host address using a
netmask

of 255.255.255.192?

A.) 10.1.1.1

B.) 10.1.1.66

C.) 10.1.1.130

D.) 10.1.1.127

Answers were Sorted based on User's Feedback



Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10...

Answer / guest

Answer: D

Is This Answer Correct ?    5 Yes 1 No

Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10...

Answer / subramani

D.) 10.1.1.127

No of valued hosts is
2^6-2=64-2=62

Therefore subnets are 0,64,128,256
since third subnet starts with 128,
127 will become the broadcast address for the second subnet
which is starting from 64.

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

What are the two components of an IPX address? A. network number IP address B. MAC address node number C. network number MAC address D. network number arched number

1 Answers  


If a frame is received at a switch and only the destination hardware address is read before the frame is forwarded, what type of switching method is this? A.) Store-and-drop B.) Latency C.) Store-and-forward D.) Cut-through

2 Answers  


Who controls mac address uniqueness and how?

0 Answers  


Identify the command that configures serial0 for PPP encapsulation? A.) Router(config)# encapsulation ppp B.) Router(config-if)# encapsulation serial ppp C.) Router(config-if)# encapsulation ppp D.) Router# encapsulation ppp

1 Answers  


What is the cladding?

0 Answers  


What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos

1 Answers  


What utility can you use to see the path a packet takes through an internetwork? A.) Route B.) SNMP C.) Trace D.) Ping

2 Answers  


What is the updates time of routing table,and what is the invalid timer, and also what is the flush timer in IGRP and EIGRP?

1 Answers   HP,


Is it possible that in a switched network that any port of the switch can be infected with any kind of viruses that jamed and create more traffic in network which cause slow network performance?

8 Answers   HCL,


What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic D.) Distance Vector

4 Answers  


A server is running HTTP, SMTP and DHCP. Which of the following best explains how the server is able to handle all three services over the same connection? The server has separate buffer areas for each application and forwards all data to each service. If the data does not apply to that application, it is discarded. The server processes each packet one at a time and forwards the data to the application that indicates that it is waiting for a transmission to arrive. The data is discarded if it does not apply to that application. The server uses the destination port number in the TCP/UDP header to identify the service. The data is forwarded to the service identified by the port number. The server uses separate three-way handshake connections to control the flow of the data and relates the service to the proper connection. This relationship allows the server to pass the data to the proper service.

1 Answers  


Identify the 2 commands to copy a configuration from a TFTP server to RAM? A.) configure network B.) configure overwrite C.) copy backup-config running-config D.) copy tftp running-config

1 Answers  


Categories