Which of the following is an invalid host address using a
netmask

of 255.255.255.192?

A.) 10.1.1.1

B.) 10.1.1.66

C.) 10.1.1.130

D.) 10.1.1.127

Answers were Sorted based on User's Feedback



Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10...

Answer / guest

Answer: D

Is This Answer Correct ?    7 Yes 1 No

Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10...

Answer / nitin sharma

a

Is This Answer Correct ?    1 Yes 0 No

Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10...

Answer / ohadfink

D

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify the command to determine if an IP access-list is grouped on interface e0? A.) Router(config)# show ip interface e0 B.) Router> show ip interface e0 C.) Router# show interface e0 D.) Router# show ip interface e0

1 Answers  


what is the difference between switch and router??

16 Answers   Infosys, Precision Techserve, Thomson,


what is the purpose of multicast packets?

2 Answers  


What is the syntax to use to configure the port on a Catalyst 5000 switch? A.) slot port/type B.) type slot/port C.) port slot/type D.) port type/slot

2 Answers  


What is Phase od VPN in site to site and what information you will require to configure a SITE to SITE VPN

0 Answers   Infosys,






What is ping? What is the usage of ping?

0 Answers  


Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1

2 Answers  


What is the difference between TCP and UDP? A.) TCP is connection-oriented; UDP uses acknowledgements only B.) TCP is connection-oriented; UDP is connectionless C.) Both TCP and UDP are connection-oriented, but only TCP uses windowing D.) TCP and UDP both have sequencing, but UDP is connectionless

2 Answers  


How do we do encryption and authentication in L2F?

0 Answers   CCIE,


What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops

2 Answers  


What is the syntax to add a banner to the Cisco router? A.) motd banner # B.) banner C.) banner motd # D.) banner #

1 Answers   Sun Broadband,


The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments

2 Answers  


Categories