What would be the proper wildcard mask to permit all odd
numbered hosts on the 10.48.0.0/12 network?
access-list 1 permit 10.48.0.0 0.15.255.255
access-list 1 permit 10.48.0.1 0.15.255.254
access-list 1 permit 10.48.0.0 0.15.255.1
access-list 1 permit 10.48.0.0 0.0.0.254
access-list 1 permit 10.48.0.0 0.0.0.255
Answers were Sorted based on User's Feedback
Answer / jitendera kumar sinha
the coreect answer is
B becoz if we slect A then it will permint all the ip
address which are even to.so to permit only odd numbred of
host it is nessery that last bit is on.
so as far as my best of knowledge B should be wright answer
plz mark on my answer if i am wright becoz this time i am
confuse between b and c and i think d and e have the wrong
wild card masking
Is This Answer Correct ? | 9 Yes | 0 No |
Answer / sohan
hi manju
urs answer is lokking as the copy paste of jitendera kumar
sinha answer.
i am asking that why c is not a correct options
Is This Answer Correct ? | 5 Yes | 0 No |
Answer / manju
B becoz if we slect A then it will permint all the ip
address which are even to.so to permit only odd numbred of
host it is nessery that last bit is on.
so as far as my best of knowledge B should be wright answer
Is This Answer Correct ? | 4 Yes | 3 No |
Answer / kote
C is correct access-list 1 permit 10.48.0.0 0.15.255.1
it will match last bit turned on in wildcard mask.
B will match all even hosts.
Is This Answer Correct ? | 2 Yes | 3 No |
Answer / praveen srivastava
access-list 1 permit 10.48.0.0 0.0.0.255
Is This Answer Correct ? | 0 Yes | 8 No |
Explain what is 5-4-3 rule?
Why do we have a Layered Model? 1) It reduces complexity 2) Allows for a standardized interface 3) Facilitates modular engineering 4) Ensures interoperable technology 5) Accelerates evolution 6) Simplifies teaching and learning
What is the maximum hop count for IP RIP? A.) Infinity B.) 16 C.) 15 D.) 1
What will transport layer do when data coming from session layer. They asked about intial operation(3 - way handshake)
Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface
Given the IPX address 4a.0002.1111.a999, what is the network ID and what is the node ID? A.) net 4a host 0002.1111.a999 B.) net a999 node 0002.1111 C.) net 0002.1111.a999 node 4a D.) net 0002.1111 node a999
Windowing is a type of? A.) Negative acknowledgement B.) Address resolution C.) Layer transition mechanism D.) Flow control
. Which command sequence will allow only traffic from network 185.64.0.0 to enter interface s0? A. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-list 25 out B. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-group 25 out C. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-list 25 in D. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-group 25 in
What IP command would you use to test the entire IP stack? A.) Stack-test B.) Arp C.) Telnet D.) Ping E.) Trace
Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP
Hi, gys i am Hasnain alamI want to get certification how do it ? please sugges me.
What is Spanning Tree Protocol and how it work? I know it is - STP is Spanning tree Protocol. It Stops the looping in the network? How STP work? How it stop Looping in network?