How many total hosts are possible with a Class C address and
a subnet mask of 255.255.255.252?

A. 4

B. 30

C. 60

D. 62

E. 112

F. 124

Answers were Sorted based on User's Feedback



How many total hosts are possible with a Class C address and a subnet mask of 255.255.255.252? A..

Answer / amol chirutkar

A . 4

Is This Answer Correct ?    12 Yes 3 No

How many total hosts are possible with a Class C address and a subnet mask of 255.255.255.252? A..

Answer / m haja bahurudeen

Ans : A

host :4

NID :30
Host ID : 2

Is This Answer Correct ?    6 Yes 3 No

How many total hosts are possible with a Class C address and a subnet mask of 255.255.255.252? A..

Answer / guru

a 4

Is This Answer Correct ?    2 Yes 0 No

How many total hosts are possible with a Class C address and a subnet mask of 255.255.255.252? A..

Answer / nathan

We can get only 2 host ip.

Is This Answer Correct ?    4 Yes 6 No

How many total hosts are possible with a Class C address and a subnet mask of 255.255.255.252? A..

Answer / narendra

D 62

Is This Answer Correct ?    1 Yes 4 No

How many total hosts are possible with a Class C address and a subnet mask of 255.255.255.252? A..

Answer / guest

Answer: F

Is This Answer Correct ?    10 Yes 14 No

How many total hosts are possible with a Class C address and a subnet mask of 255.255.255.252? A..

Answer / akhil sikri

252 == 11111100
So total no. of hosts possible are 2^6 - 2 ( reserved)
answer is D (62)

Is This Answer Correct ?    3 Yes 9 No

Post New Answer

More CCNA Interview Questions

In order to configure a Frame Relay subinterface with IP identify the 2 commands that must be configured on the physcial interface? A.) Router(config-if)# encapsulation frame-relay B.) Router(config-if)# no ip address C.) Router(config-if)#encapsulation subinterface frame-relay D.) Router(config)# subinterface s0 encapsulation frame-relay

2 Answers  


How do you set the encapsulation type to PPP for an interface? A.) encap ppp B.) ppp encapsulation C.) encapsulation ppp D.) encapsulation ppp enable E.) ppp enable encapsulation

2 Answers  


Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default

1 Answers  


What are the job opportunities i will get once i complete my CCNA certification.

2 Answers  


Why do we have a Layered Model? 1) It reduces complexity 2) Allows for a standardized interface 3) Facilitates modular engineering 4) Ensures interoperable technology 5) Accelerates evolution 6) Simplifies teaching and learning

1 Answers  






How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain

1 Answers  


1900 Value in which type of access list?

0 Answers  


What command do you enter at the keyboard to begin a user mode session? A.) Type 'CTRL-P' B.) Type 'login' C.) Just press . D.) Type 'enable' E.) Press 'Shift + Ctrl + 6' at the same time.

1 Answers  


Identify the purpose of the TCP 3 step handshake? A.) Setup a un-reliable connection B.) Initialize routing tables C.) Synchronize sequence numbers between hosts D.) Connection tear down process

1 Answers  


The Physical layer works with which of the following: A.) Segments B.) Datagrams C.) Packets D.) Bits E.) Frames

3 Answers   BITS,


Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments

1 Answers  


You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0

1 Answers  


Categories