Which addresses are INCORRECTLY paired with their class?
A. 128 to 191, Class B
B. 192 to 223 Class B
C. 128 to 191, Class C
D. 192 to 223, Class C
Answers were Sorted based on User's Feedback
Answer / m haja bahurudeen
Ans : B & C
Class A : 1 - 126 (127 assign loopback address)
Class B : 128 - 191
Class C : 192 - 223
Class D : 224 - 239
Class E : 240 - 255
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / guest
Answer: B & C
Address classes are:
1 to 126, Class A;
128 to 191, Class B,
192 to 223, Class C;
224 to 239, Class D; and
240 to 255, Class E.
The first octet rule states that the class of an address can
be determined by the numerical value of the first octet.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / javid
B), D).
YOUR EXPLANATIONS IS RIGHT , BUT THE ANSWER IS D NOT C.
| Is This Answer Correct ? | 0 Yes | 3 No |
8. When is Frame Tagging used? A. When you install repeaters in your network B. When you install bridges in your network C. When you install routers in your network D. When you use Switches configured with multiple VLANS
What's the default CDP holdtime in seconds for Cisco routers? A.) 30 seconds B.) 180 seconds C.) 90 seconds D.) 60 seconds
How often does IP RIP send out routing table updates by default? A.) They send complete updates every 30 seconds B.) They send partial updates every 30 seconds C.) They send complete updates every 60 seconds D.) They send partial updates every 60 seconds
What does vlan provide?
The Cisco IOS is stored where? A.) ROM B.) CD C.) Flash D.) NVRAM
Identify the command that forces the router to load into ROM mode upon a reload? A.) boot system rom B.) rom boot C.) boot system flash rom D.) boot router rom
Tell me which cable we connect in db-9?
What is the subnetmask of / 27 in network based and host based?
Identify the command to display all the valid commands at the given mode? A.) Help all B.) Help C.) All commands D.) ?
Utilizing RIP, what is the limit when it comes to number of hops?
What are the three sources of signal degradation on a data link?
Can you explain the broader steps of how L2F establishes the tunnel?