Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is masking? why is needed?

Answers were Sorted based on User's Feedback



What is masking? why is needed?..

Answer / singh1jeet

masking is used to identify the network and host portions
in an ip address generally noted in a.b.c.d format eg
255.255.255.0 for an class b address for further readings
read wildcard masking and vlsm

Is This Answer Correct ?    3 Yes 1 No

What is masking? why is needed?..

Answer / jitendera sinha.

masking is nonthing it is simply conserned with from which
classe any ip address belong.in the anthor way we can say
that the masking is conserned with identification of class
of any given ip.

Is This Answer Correct ?    2 Yes 1 No

What is masking? why is needed?..

Answer / purbi sinha

yeah jitendera sinha is wright but some one confused me by
markoing it wrong plz write the correct answer

purbi sinha

Is This Answer Correct ?    0 Yes 0 No

What is masking? why is needed?..

Answer / shahin

Some guys used to do time pass here. They don't have guts to
put any question ya answer any question. They only know how
to screw someone.

Those are the fellow visitors of this site.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC

2 Answers  


Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router

3 Answers  


On which interface we always apply access-list?

0 Answers  


Identify the OSI layer associated with bits? A.) Physical B.) Network C.) Binary D.) Data link

3 Answers  


Which statement is true when a broadcast is sent in an Ethernet/802.3 ITAN? A. The ip shored used is 255.255.255.0 B. The IP address used is 255.255.255.255 C. The MAC address used is 00 00 00 00 00 00 D. The MAC address used is FF FF FF FF FF FF

1 Answers  


Which command switches from User mode to Privileged mode? A.) login B.) privilege C.) admin D.) enable E.) enter F.) root

5 Answers  


Which 3 statements describe default encapsulation and LMI type configuration? A.) There are only 4 encapsulations and 3 LMI type options B.) The LMI type config term options C.) In release 11.2 the LMI type is autosensed D.) The default LMI is Cisco E.) IETF encapsulation must be configured unless the connecting routers are both Cisco

1 Answers  


HI friends mine one of the friends have ask a good question i also donot know the answer so i am putting here Please poet the answer no matter it is wright or wrong put yours view here The question is like that when we are going to configure ospf then there are three way 1st way router ospf 10 netwrok 192.168.1.0 0.0.0.255 area 0 network 192.168.2.0 0.0.0.255 area 0 the 2nd way is like that router ospf 10 netwrok 192.168.0.0 0.0.255.255 area 0 but he inrodused the thrird way like router ospf 10 netwrok 192.168.00000001.0 < ?.?.?.?>area 0 router ospf 10 netwrok 192.168.00000010 <?.?.?.?>area 0 now problem is that what should i put the mask in this way so i puted ? sign Please solve this problem i think this is good one plz donot see for answer please contribute any thing i am reqesting Than you Jitendera kuamr sinha

5 Answers  


Explain the term 'unicast'.

0 Answers  


Which of the following is an example of the Datalink Layer? A.) LLC B.) TCP C.) SQL D.) IPX E.) Token Ring F.) MAC

2 Answers  


In which protocol supenetting is enable by default?

0 Answers  


What is the name of best path in eigrp protocol?

0 Answers  


Categories