You have an IP host address of 201.222.5.121 and a subnet
mask of 255.255.255.248. What is the broadcast address?
A. 201.222.5.127
B. 201.222.5.120
C. 201.222.5.121
D. 201.222.5.122
Answer / guest
Answer: A
The easiest way to calculate this is to subtract
255.255.255.248 (subnet mask) from 255.255.255.255, this
equals 7. Convert the address 201.222.5.121 to
binary--11001001 11011110 00000101 01111001. Convert the
mask 255.255.255.248 to binary--11111111 11111111 11111111
11111000. AND them together to get: 11001001 11011110
00000101 01111000 or 201.222.5.120. 201.222.5.120 is the
subnet address, add 7 to this address for 201.222.5.127 or
the broadcast address. 201.222.5.121 through 201.222.5.126
are the valid host addresses.
Is This Answer Correct ? | 15 Yes | 1 No |
How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain
Which show underrate serial 1 status statement indicates that the shutdown command was issued on that interface? A. Serial 1 is up line protocol is up B. Serial 1 is up line protocol is down C. Serial 1 is down line protocol is down D. Serial 1 is administratively down the line protocol is down
In regards to the ISDN BRI standard, which channel is used for control? A.) B B.) D C.) E D.) I E.) Q
Identify the command that configures the bandwidth to 56K? A.) Router(config-if)# bandwidth 56000 B.) Router(config-if)# bandwidth 56k C.) Router(config)# bandwidth 56 D.) Router(config-if)# bandwidth 56
Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection oriented protocol that acknowledges receipt of data packets and is considered reliable
what is different between semi-managed and managed Switch ?
Identify 1 characteristic of RARP? A.) MAC to IP address translation B.) Connectionless delivery of packets C.) Can be used to initiate remote O/S load sequence D.) Generates error and control messages
Explain the difference between collision domain and broadcast domain.
4. What is a disadvantage to using bridges in your network? A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN
How many types of ips?
What is a function of a reliable transport layer connection? A. route selection B. acknowledgements C. session checkpoints D. system authentication
Which of the following are Presentation Layer standards? A.) JPEG and PICT B.) MPEG and MIDI C.) ASCII and EBCDIC D.) NFS and SQL