Which of the following is an invalid host address using a
netmask

of 255.255.255.192?

A.) 10.1.1.1

B.) 10.1.1.66

C.) 10.1.1.130

D.) 10.1.1.127

Answers were Sorted based on User's Feedback



Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10...

Answer / guest

Answer: D

Is This Answer Correct ?    5 Yes 1 No

Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10...

Answer / subramani

D.) 10.1.1.127

No of valued hosts is
2^6-2=64-2=62

Therefore subnets are 0,64,128,256
since third subnet starts with 128,
127 will become the broadcast address for the second subnet
which is starting from 64.

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which network mask should you place on a Class C address to accommodate a user requirement of two subnetworks with a maxximum of 35 hosts on each networks A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248

4 Answers  


You want a message to be displayed every time someone tries to log on to the router. Which command is required to accomplish this task? A.) motd#(message)# B.) banner motd(message) C.) banner motd#(message)# D.) banner motd*(message) E.) banner login#(message)#

1 Answers  


Which way of communication bus topology use?

0 Answers  


Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z

2 Answers  


Significance of IP helper-address Command on SW? Is it necessary to put this command?

1 Answers   Accenture,






in router we use config# ip host router2 ipaddress we use it for ping the neighbor router using name provided by us ..........instead of ip address in this max how many ip address can be assigned thanks

1 Answers  


The benefits to segmenting with Bridges are which of the following? A.) Scalability B.) Datagram filtering C.) Manageability D.) Reliability

1 Answers  


How does inter- VLAN communication take place? A. It takes place through any Cisco router B. It takes place through a Cisco router that can run ISL C. It takes place through a router but this disables all the router a security and filtering functionality for the VLANS D. For nonroutable protocals (e.g. NetBeui) the router provides communications between VLAN domains E. Inter-VLAN communication is not possible because each VLAN is a separate broadcast domain

3 Answers  


What are the two most common transport layer protocols? UDP TCP IPX ARP

3 Answers  


Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers C.) Triggered updates D.) Split horizon E.) Area hierarchies F.) Order of router startup

3 Answers   IIHT,


Name the vtp modes?

0 Answers  


What does a router do with a packet that it does not have a destination network for? A.) Sends it to the Serial port B.) Drops the packet C.) Sends it back out the same interface it received it in D.) Forwards the packet to the next hop

2 Answers  


Categories