Identify the purpose of the wildcard mask?
A.) Match a certain portion of the IP address while ignoring
the rest of
the address
B.) Determine the class of the IP address
C.) Determine the network portion of an IP address
D.) Hide the host portion of an IP address
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A
The purpose of the wildcard mask to match a certain portion
of the IP
address while ignoring the rest.
Is This Answer Correct ? | 6 Yes | 1 No |
Answer / sushama
match a certain portion of the ip address while ignoring
the rest of the address.
Is This Answer Correct ? | 5 Yes | 1 No |
Answer / ankit
Match a certain portion of the IP address while ignoring the rest of the address
Is This Answer Correct ? | 2 Yes | 0 No |
As a system administrator, you want to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use? A. debug IP igrp event B. debug IP igrp-events C. debug IP igrp summary D. debug IP igrp events
What is a L2F protocol?
Which network mask should you place on a Class C address to accommodate a user requirement for five networks with a maximum of 17 hosts on each networks A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248
tell me our traditional ip routing is what A--conectless b----conection orented c-----pacekt switching d------ckt switching slect any two this is the question which i forgot to incoprate next-questions
What is the network brouter?
Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, that network is advertised with an infinite metric
Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) Privileged exec is a subset of the user exec mode C.) They both require the enable password D.) User exec is a subset of the privileged exec mode
Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP
Which of the following is used to manage and monitor the network? A.) SNMP B.) HTTP C.) IP D.) FTP
frends i am suffring from newfolder.exe virus in my server 2000 win how i have to remove it plz help me Jitendera sinha
Which of the following encapsulation types can be used on leased-line connections? (Choose two) ❍ A. HDLC ❍ B. Frame Relay ❍ C. ISDN ❍ D. PPP
What type of switching creates variable latency through the switch? A.) Cut-Through B.) Inverted C.) Layer 4 D.) Multiplexed E.) Store and Forward