How many valid host IP addresses are available on the
following network/subnetwork? 176.12.44.161/30
A. 2
B. 30
C. 254
D. 16,382
E. 65,534
Answers were Sorted based on User's Feedback
Answer / michael plamer
2 because the CIDR value for /30 is subnet mask 255.255.255.252, and the Octet for 252 is 11111100 where the last two zero's represent the 2 spots available for hosts=2
| Is This Answer Correct ? | 4 Yes | 1 No |
What is the routing metric used by RIP? A.) Route poisoning B.) Split horizon C.) Hop Count D.) TTL
4 Answers jetking, Tata Motors,
Explain the types of communication in ipv4?
What is the second best path name of eigrp?
What is the function of the Transport layer and which protocols reside there? A.) MAC addressing - IP B.) Interhost communication - SQL, NFS C.) Best effort Packet delivery - TCP, UDP D.) End-to-end connections - TCP, UDP
What command displays the OSPF Process ID, Router ID, Address summarizations, Routing Networks, and passive interfaces configured on a router?
What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable
In order to configure a Frame Relay subinterface with IP identify the 2 commands that must be configured on the physical interface? A.) Router(config-if)# encapsulation frame-relay B.) Router(config-if)# no ip address C.) Router(config-if)#encapsulation subinterface frame-relay D.) Router(config)# subinterface s0 encapsulation frame-relay
Define the different kinds of casting
In which access- list type you can't do editing?
Which layer of the 7 layer model is responsible for representing the application information between 2 different OS's? For example, converting ASCII to EBCIDIC. A.) Transport B.) Application C.) Physical D.) Session E.) Presentation F.) Network
Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic
Which two commands allow you to verify address configuration in your unternetword? (Choose two) A. ping B. trace C. verify D. test ip E. Echo ip F. config ip