Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify the purpose of the wildcard mask?

A.) Match a certain portion of the IP address while ignoring
the rest of

the address

B.) Determine the class of the IP address

C.) Determine the network portion of an IP address

D.) Hide the host portion of an IP address



Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ig..

Answer / guest

Answer: A

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify the effect of Ctrl-Z? A.) Exits back to privileged exec mode B.) Disconnect from the router C.) Abort the ping operation D.) Exits privileged exec mode

1 Answers  


What is the function of Layer 2 Device?

3 Answers  


Which of the following are Transport layer protocols? A.) UDP B.) TCP C.) NBP D.) IP E.) SPX

4 Answers   TCP,


which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?

0 Answers  


What is the difference between arp and rarp?

0 Answers  


Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon

1 Answers  


How convergence happen in ospf?

3 Answers   TCS,


Which encapsulation methods are most commonly used with dialup Integrated Services Digital Network (ISDN)? A. IP and IPX B. IP and PPP C. PPP and SDLC D. PPP and HDLC

2 Answers  


Two of the protocols that can be carried in the Protocol field of an IP packet are? A. TCP B. UDP C. FTP D. TFTP

2 Answers  


the situation iz like ths -at a specific time in our company the internet connectivity goes off...v hav two networks in our company...but out of it only one link goes down for 5-10 sec...a fastethernet port becomes down for few sec and automatically becomes Up... Is this occures becoz of Power?? If yes thn y the 2nd network is not affected??

2 Answers   SoftTech,


When using access lists, what does a Cisco router check first? A. To see if the packet is routable or bridgeable B. The destination address C. The source address D. The packet contents

1 Answers  


What hppends when ping 127.0.0.1 command executes?

10 Answers   CMS, Wipro,


Categories