Which command would configure Interface E0 with an IP address of

12.23.4.5 using a Subnet mask of 255.255.255.0 ?

A.) ip address 12.23.4.5 255.255.255.0

B.) ip address 12.23.4.5 /24

C.) ip address 12.23.4.5 mask 255.255.255.0

D.) ip address 12.23.4.5 mask ff:ff:ff:0

E.) that is an invalid mask for a class 'A' address

Answers were Sorted based on User's Feedback



Which command would configure Interface E0 with an IP address of 12.23.4.5 using a Subnet mask of..

Answer / harsh singh

router(config-if)#ip address 12.23.4.5 255.25.255.0

Is This Answer Correct ?    3 Yes 0 No

Which command would configure Interface E0 with an IP address of 12.23.4.5 using a Subnet mask of..

Answer / guest

Answer: A but B & D can be used if the router is configured
through

Router#(config)ip netmask-format (bitcount | decimal |
hexadecimal)

Is This Answer Correct ?    0 Yes 0 No

Which command would configure Interface E0 with an IP address of 12.23.4.5 using a Subnet mask of..

Answer / alex

router(config-if)#ip address 12.23.4.5 255.255.255.0

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

hello friend i have answerd more time of your question or doute.now i am seeing towards you for help,plz send the soln before monedya the problem is i have three router r1 and r2 and r3 they are conested in that maneer thai is r1---r2---r3---server | | server bothe server have diffrent ip now i have to implemnt access list on the r3 router in such a way that user from r1 can access only one server while user from r2 can access whole servre i ahve done it but both user of r1 and r2 uses all server i need help please help me this time? i have repalsced my firwall by r3 router so bacicaly i have to implement it on my firewall but you tell me on cisco router please help

2 Answers  


Which command we give on privilege mode for coming back to user execution mode?

0 Answers  


The administrator of a comapny needs to ensure that a web server in their network is accessible from the Internet. Since the network uses private addressing, this requires an IP-to-registered-address mapping. The following command is entered on the router: router(config)# ip nat inside source static 192.168.2.1 198.18.1.254 After unsuccessful results from a ping to the Internet, the administrator issues the show ip nat translations command and the output is blank. What could be the problem with the NAT configuration for this mapping? A. The keyword overload is missing from the command. B. The administrator needs to define a NAT pool first. C. An access list must be defined to create static NAT translations. D. The interfaces need to be configured for NAT.

4 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


Which of the following is true regarding standard ISDN BRI service? A.) ISDN BRI B channels are typically 64K. B.) ISDN BRI can handle only voice. C.) ISDN BRI can handle only data. D.) ISDN BRI has 2B and 1D channels. E.) ISDN BRI D channels are 16K. F.) ISDN BRI can handle voice and data.

2 Answers  






How many maximum paths you can give on latest ios in rip?

0 Answers  


Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport

2 Answers  


Identify the components in the following command 'interface serial0/1/1' A.) Serial interface, port number 0, slot 1, port adapter 1 B.) Serial interface, slot 1, port number 1, port adapter 0 C.) Serial interface, slot 0, port adapter 1, port number 1

2 Answers  


Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection oriented protocol that acknowledges receipt of data packets and is considered reliable

2 Answers  


what is LAPB

2 Answers   ASD Lab,


If a frame is received at a switch and only the destination hardware address is read before the frame is forwarded, what type of switching method is this? A.) Store-and-drop B.) Latency C.) Store-and-forward D.) Cut-through

2 Answers  


Which of the following statements are true? A.) Store and forward switching creates variable latency through the switch B.) Cut through switching creates variables latency through the switch C.) Cut through switching works at wire speed D.) Store and forward switching works at wire speed

1 Answers  


Categories