Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


You need to come up with a TCP/IP addressing scheme for your

company. How

many network IDs must you allow for when you define the
subnet mask for

the network?

A.) One for each WAN link

B.) One for each router interface

C.) One for each NIC installed in each client

D.) One for each subnet with hosts

E.) One for each host ID



You need to come up with a TCP/IP addressing scheme for your company. How many network IDs mus..

Answer / guest

Answer: A D

Is This Answer Correct ?    9 Yes 0 No

Post New Answer

More CCNA Interview Questions

Can you define in short what VPN is?

5 Answers   CCIE,


What are the netbios and netbeui?

0 Answers  


What is an advantage of local area network (LAN) segmentation? A. smaller collision domains B. elimination of broadcasts C. decreased cost of implementation D. larger number of users within the same domain

1 Answers  


Which of the following are ways to provide login access to a router? A.) HTTP B.) Console C.) Telnet D.) Aux Port E.) SNMP F.) LLC

3 Answers  


What is STP and what is the difference between PVST and RSTP

0 Answers   Infosys, Wipro,


Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session

2 Answers  


What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.

1 Answers  


Which is true regarding half duplex Ethernet operation? A.) Half Duplex ethernet technology provides a transmit circuit connection wired directly to the receiver circuit at the other end B.) Half duplex transmission between stations is achieved by using point to multipoint Ethernet and Fast Ethernet C.) With Half Duplex transmission logically circuits feed into a single cable creating a situation similar to a one way bridge D.) Half Duplex transmission between stations is achieved using Point to Point Ethernet & Fast Ethernet

1 Answers  


Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's

2 Answers  


What is the simplest way to remotely configure a router?

0 Answers  


What is the maximum hop count for IP RIP? A.) Infinity B.) 16 C.) 15 D.) 1

2 Answers  


What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic

1 Answers  


Categories