Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Given an IP host address of 172.16.2.160 and a shored mask
of 255.255.255.192 to which shored does the host belong?

A. 172.16.2.32

B. 172.16.2.64

C. 172.16.2.96

D. 172.16.2.128

E. 172.16.2.192

Answers were Sorted based on User's Feedback



Given an IP host address of 172.16.2.160 and a shored mask of 255.255.255.192 to which shored does ..

Answer / subramani

since subnet mask is 255.255.255.192
192=1100 0000
therefore no of networks is 2 to the power 2=4
no of hosts is 2 to the power 6=64

Block size is 0-64-128-192
so the given host comes in between 128 and 190

Is This Answer Correct ?    9 Yes 2 No

Given an IP host address of 172.16.2.160 and a shored mask of 255.255.255.192 to which shored does ..

Answer / guest

Answer: D

Is This Answer Correct ?    6 Yes 2 No

Post New Answer

More CCNA Interview Questions

What are 10baset ethernet lans?

0 Answers  


Identify 2 characteristics of PPP? A.) Uses LLC to establish the link B.) Default serial encapsulation C.) Support multiple layer 3 protocols D.) Offers two types of authentication; PAP and CHAP

1 Answers  


What is the bit length and expression form of a MAC address? A. 24 bits expressed as a decimal number B. 24 bits expressed as a hexadecimal number C. 36 bits expressed as a binary number D. 48 bits expressed as a decimal number E. 48 bits expressed as a hexadecimal number

2 Answers  


Identify the 2 methods to modify the routers boot sequence? A.) Setup program B.) Boot system commands C.) RXBoot D.) Config-register

1 Answers  


Which reserve port number talent use?

0 Answers  


Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's

2 Answers  


Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list

1 Answers  


Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address

1 Answers  


Which information must a router know in order to perform proper and pungent routing? A. destination application of an incoming packet B. number of other packets in a single flow of data C. destination network address of an incoming packet D. number of routers that also know a path to the destination

1 Answers  


Identify the type of routing protocol that exchanges entire routing tables at regular intervals? A.) Link state B.) Interior gateway protocols C.) Appletalk routing D.) Distance vector

1 Answers  


Company XYZ has an employee that works out of the home. The employee runs big client server applications and must quickly transfer large files. The company wants the best cost/benefit on this connection. What would be the most practical solution? A. an ISDN Basic Rate Interface (BRI) connection to the user at home B. a dedicated T1 connection to the user at home C. a dedicated Frame Relay connection to the user at home D. a standard 28.8 analog dialup connection to the user at home

2 Answers  


Can you explain how L2F data tunneling process works?

1 Answers   CCIE,


Categories