Your network uses a Class C address of 188.8.131.52. You
must now split up the network into separate shores to handle
multiple buildings separated by routers. Which two steps
must you take to determine the proper shored mask for your
networks? (Choose two)
A. determine the number of seperate networks required
B. determine how many devices will require DHCP addressing
C. determine the maximum number of hosts that will be on
D. determine the miniumum number of hosts that will be on
E. determine which router will be the IP default gateway for
Answer / guest
Answer: A, C
|Is This Answer Correct ?||0 Yes||1 No|
Why ip address called logical address?
b Which protocol for PPP LCP (Link Control Protocol) performs a challenge handshake? A. CHAP B. PAP C. UDP D. IPX
Identify the 2 commands that will display the status and information about interface E0 only? A.) show interface ethernet E0 B.) show interface E0 C.) show E0 D.) show int E0 E.) show interface
Differnce between the communication and transmission?
Based upon the exhibit, create a static route to 172.16.10.0 on Router A A.) Router# ip route 172.16.10.0 255.255.255.0 10.1.0.2 B.) Router(config)# ip static route 172.16.10.0 255.255.255.0 10.1.0.2 C.) Router(config)# ip route 172.16.10.0 10.1.0.2 D.) Router(config)# ip route 172.16.10.0 255.255.255.0 10.1.0.2
What is the difference between hub, switch, and router?
What 3 sources can configuration commands be placed into RAM? A.) HP Openview B.) Console C.) Vterminal D.) TFTP server E.) NVRAM
Why OSPF uses 2 Multicast IP
What are the conversion steps of data encapsulation?
which is following route will be used to froword data in a situation where a routing table tables contains static ,RIP,IGRP routes destined to the same network with each set to its default administrative distance
What parameter is used with statically assigned routers to tell packets which interface to use to reach a distant network? A.) Mask B.) Subnet C.) Default gateway D.) Interface
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity