Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

You are a system administrator and you want to deny access to a

group of computers with addresses 172.30.16.0 to
172.30.31.0. Which

wildcard mask would you use?

A. 0.0.15.255

B. 0.0.255.255

C. 0.0.31.255

D. 0.0.127.255

E. 0.0.255.255

Answer Posted / guest

Answer:: A

0.0.15.255 will check the last 13 bits of an address so that
computers

172.30.16.0 to 172.30.31.0 will be denied access. 0.0.31.255
would check

the last 6 binary digits and deny access to addresses
172.30.32.0 to

172.30.63.0. 0.0.127.255 would check the last 7 binary
digits and deny

access to addresses 172.30.64.0 to 172.30.127.0. 0.0.255.255
would deny

172.30.0.0 to 172.30.254.0. If you write decimal 15 in
binary, you have

0001111, the 1's tell the router to ignore address with
these bits set;

0's tell the router to check the bits. The third octet for
172.30.16.0

is 00010000. The third octet for 172.30.31.0 would be
00011111. So,

traffic from these addresses would be denied.

Is This Answer Correct ?    6 Yes 0 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is window in networking terms?

1250


What is the purpose of a data link?

1072


Can you explain tunneling?

1937


What is collision?

1129


How many parts of ping?

1061


What is the difference between dynamic ip and static ip addressing?

1154


Differentiate full-duplex from half-duplex.

1112


How does PPP use LCP for link control?

1905


Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)

1272


How are straight and crossable cables different from each other?

1059


How much hold down time of eigrep protocol?

1113


What is trigger rip and from which ios version it starts?

1068


2500 Value in which type of access list?

1031


Which works router do?

1114


What is the function of the Application Layer in networking?

1071