Given the following IP address from the Class B address
range 172.35.21.12. Your network plan requires no more than
126 hosts on a shored. Which value should you use as the
subnet mask?
A. 255.255.0.0
B. 255.255.128.0
C. 255.255.126.0
D. 255.255.255.128
E. 255.255.255.252
Answers were Sorted based on User's Feedback
Answer / m haja bahurudeen
ANS : D
Default Class B SNM : 255.255.0.0
Maxi host : 126
SNM : 255.255.255.128
| Is This Answer Correct ? | 4 Yes | 1 No |
Answer / rav
hi guys D. 255.255.255.128 is correct answer
let me explain
our requirement 126 host and possible host in subnet is 128
formula is total no of host in class/total no of required host
then key value is 9
and calculated subnet bits is 16+9=25
answer 255.255.255.128
| Is This Answer Correct ? | 0 Yes | 0 No |
You would like to have a notation that when a user issues the command 'show interface serial 0', a line is displayed indicating that, 'This is the connection to Company A.' What interface command would accomplish this? A.) banner motd #This is the connection to Company A.# B.) interface This is the connection to Company A. C.) This cannot be done for an individual interface. D.) description This is the connection to Company A. E.) banner This is the connection to Company A. F.) display This is the connection to Company A.
You have two Cisco routers setup back-to-back in a lab using DTE/DCE cables. To which router would you add the clockrate command? A.) The serial port on the DCE router B.) The Ethernet port on the DTE router C.) The Ethernet port on the DCE router D.) The serial port on the DTE router
What are the three sources of signal degradation on a data link?
Identify the effect of Ctrl-Z? A.) Exits back to privileged exec mode B.) Disconnect from the router C.) Abort the ping operation D.) Exits privileged exec mode
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
Identify the X.25 addressing standard? A.) X.121 B.) X.25a C.) ITU-1 D.) Q933a
What ISDN protocol specifies concepts, terminology, and services? A.) Q B.) S C.) I D.) E
What will be the prefix length of 224 in vlsm?
Which two of the following protocols are used at the Transport layer? A.) ARP B.) UDP C.) ICMP D.) RARP E.) TCP F.) BootP
HOW MPLS IS DIFFERENT FROM OSPF? WHY NOW A DAYS MPLS IS PREFERED OVER ANY NETWORK PROTOCOL?
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
Which two of the following are valid ways to have multiple encapsulation types on a single interface? A.) This is not possible B.) subinterfaces C.) additional physical interfaces D.) secondary addresses