When configuring the subnet mask for an IP address, which

formats can be used?A. dotted-decimal.

B. Hexadecimal

C. Bit-count

D. Octal

E. Binary



When configuring the subnet mask for an IP address, which formats can be used?A. dotted-decimal. ..

Answer / guest

Answer: A, B &C

Is This Answer Correct ?    4 Yes 3 No

Post New Answer

More CCNA Interview Questions

Is it possible that in a switched network that any port of the switch can be infected with any kind of viruses that jamed and create more traffic in network which cause slow network performance?

8 Answers   HCL,


Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments

1 Answers  


How can you add the 192.168.100.0/30 network to EIGRP without involving the 192.168.100.4/30 network as well?

6 Answers  


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


When we use loop back ip?

0 Answers  


Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25

1 Answers  


What is a protocol

13 Answers   Network, TATA,


How ICMP is used in ping and traceroute facilities

3 Answers  


Explain what is route poisoning?

0 Answers  


What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP

1 Answers  


Which command can verify Application Layer connectivity between 2 hosts? A.) ftp B.) snmp C.) telnet D.) ping E.) traceroute

4 Answers   CTS,


What are the different types of VPN?

0 Answers   CCIE,


Categories