You need to come up with a TCP/IP addressing scheme for your
company. How many network IDs must you allow for when you
define the
subnet mask for the network?
A.) One for each WAN link
B.) One for each router interface
C.) One for each NIC installed in each client
D.) One for each subnet with hosts
E.) One for each host ID
Answer / guest
Answer: A D
When determining Network Ids, you need to take into account
each Subnet
and Each WAN link you will have. Add these numbers up and
you will find
the answer to which Network ID you can use.
Is This Answer Correct ? | 4 Yes | 1 No |
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to identify a host device E.) Contains a network portion and a host portion
What is 10base2 ethernet lans?
How many types of IP routings?
14 Answers CK, TCS,
Which dynamic type draw back is, if single link down, it removes its routing table?
What is a key use of a device hardware address? A. to obtain a vendor code / serial number from the user B. to transmit a frame from one Interface to another Interface C. to transmit a packet from one local device to another local device D. to transmit data from one local device to a remote device across the internet E. to contain logical information about the device to use for end-to-end transmission
Hi Friend. i have to let you know that now i have been selected for cisco india in bangalore. i am thanking to all of you guys that u have been posted such good question and the respective answer. from today i will be not able to visit this site on regular basic and hopeing that you will continue to post the question.the question you are posting is not very usefull to you but also usefull to another. i am again thanking to all of you and hope for best for your feature. Jitendera kumar sinha Network engineer-L2 cisco india Bangalore
Which of the following are examples of the Network Layer? A.) Token Ring B.) LLC C.) SQL D.) IP E.) TCP F.) IPX
what is the binary value of loop back address
What is the routing metric used by RIP? A.) Route poisoning B.) Split horizon C.) Hop Count D.) TTL
Can you define LAC
As the system administrator, you enter the following commands at the command prompt: ipx routing access-list 800 permit 2b 4d int e0 ipx network 4d ipx access-group 800 out int e1 ipx network 2b int e2 ipx network 3c What did these command accomplish? A. Traffic from network 4c destined for network 4d will be forwarded out Ethernet0. B. Traffic from network 3c destined for network 4d will be forwarded out Ethernet0. C. Traffic from network 2b destined for network 4d will be forwarded out Ethernet0. D. Traffic from network 4d destined for network 2d will be forwarded out Ethernet0.
what is telnet,ssh?? what is the perpose of this? wer r this configured and how to configured??