What would be the proper wildcard mask to permit all odd
numbered hosts on the 10.48.0.0/12 network?
access-list 1 permit 10.48.0.0 0.15.255.255
access-list 1 permit 10.48.0.1 0.15.255.254
access-list 1 permit 10.48.0.0 0.15.255.1
access-list 1 permit 10.48.0.0 0.0.0.254
access-list 1 permit 10.48.0.0 0.0.0.255
Answers were Sorted based on User's Feedback
Answer / jitendera kumar sinha
the coreect answer is
B becoz if we slect A then it will permint all the ip
address which are even to.so to permit only odd numbred of
host it is nessery that last bit is on.
so as far as my best of knowledge B should be wright answer
plz mark on my answer if i am wright becoz this time i am
confuse between b and c and i think d and e have the wrong
wild card masking
| Is This Answer Correct ? | 9 Yes | 0 No |
Answer / sohan
hi manju
urs answer is lokking as the copy paste of jitendera kumar
sinha answer.
i am asking that why c is not a correct options
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / manju
B becoz if we slect A then it will permint all the ip
address which are even to.so to permit only odd numbred of
host it is nessery that last bit is on.
so as far as my best of knowledge B should be wright answer
| Is This Answer Correct ? | 4 Yes | 3 No |
Answer / kote
C is correct access-list 1 permit 10.48.0.0 0.15.255.1
it will match last bit turned on in wildcard mask.
B will match all even hosts.
| Is This Answer Correct ? | 2 Yes | 3 No |
Answer / praveen srivastava
access-list 1 permit 10.48.0.0 0.0.0.255
| Is This Answer Correct ? | 0 Yes | 8 No |
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
How do you disable CDP on the entire Router? A.) Router#no cdp run B.) Rotuer(config-if)# no cdp enable C.) Router(config)# no cdp enable D.) Router(config)# no cdp run
Explain what is the default behavior of access-list?
Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default
Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group
Explain the term 'broadcast'.
What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos
What is VLSM? Why we Create? When we Create? Implement VLSM with example?
Identify the 3 Internet layer IP protocols? A.) NetBios B.) IPX C.) ARP D.) IP E.) RARP
Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP
Explain the difference between static and dynamic routing?
What is hold down time formula of ospf?