Which addresses are valid host addresses?
A. 201.222.5.17
B. 201.222.5.18
C. 201.222.5.16
D. 201.222.5.19
E. 201.222.5.31
Answers were Sorted based on User's Feedback
Answer / m haja bahurudeen
Ans : A,B & D
C - Subnet address
E - Broadcast address
| Is This Answer Correct ? | 7 Yes | 0 No |
Answer / guest
Answer: A,B & D
Subnet addresses in this situation are all in
multiples of 8. In this example, 201.222.5.16 is the
subnet, 201.22.5.31 is the broadcast address. The rest are
valid host IDs on subnet 201.222.5.16.
| Is This Answer Correct ? | 5 Yes | 3 No |
if i am using active directory,i have router also.then how i configure router,means which address will be default gatway in active directory & roter how to give ip address details in router.
I am just getting into this,I want to jump ahead a do the packet tracers in discovery working at a small to medium business or ISP but I am trying to get the last lab putting it all together. Does anyone have anything for this. I know it is ahead of me but I would like to get this so I can look at the beginning and understand it more
Where would network testing be included in an IP packet? A. IP Options field B. Identification field C. Type of Service field D. Reservation field
The Internet Protocol (IP) occurs at what layer of the seven layer model? A.) Physical B.) Presentation C.) Network D.) Datalink E.) Session F.) Transport
Identify 1 characteristic of RARP? A.) MAC to IP address translation B.) Connectionless delivery of packets C.) Can be used to initiate remote O/S load sequence D.) Generates error and control messages
What is segmentation and fragmentation?
When a router knows the IP address, but does not know the MAC address of the device it wishes to contact, it uses the ARP (Address resolution protocol) to determine the MAC address. After it learns the MAC address, it stores this information in the ARP cache. What is the command to view the ARP cache? A.) sh mac B.) show cache C.) show arp D.) sh arp interfaces E.) show ip cache
Why is vlan used?
On which interface we always apply access-list?
What is ‘round-trip time’?
Which protocol can do load balancing on unequal cost also?
Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic