Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which of the following three sets of IP addresses and subnet
masks are private IP addresses?

A. 10.0.0.0 255.0.0.0

B. 172.16.0.0 255.255.0.0

C. 172.16.0.0 255.240.0.0

D. 192.168.0.0 255.255.0.0



Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. ..

Answer / guest

Answer: A, C, and D

The IP addresses and subnet masks that are for use on
private networks are 10.0.0.0 ? Mask 255.0.0.0, 172.16.0.0
through 172.31.255.255 ? Mask 255.240.0.0, and 192.168.0.0
through 192.168.255.255 ? Mask 255.255.0.0. Usually,
networks that don?t connect to the global Internet use these
addresses. If these addresses are used in a network that
also uses a globally unique IP address or registered
address, the private addresses must be filtered with access
lists to avoid advertising them to the Internet.

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More CCDA Interview Questions

What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs

1 Answers  


What are three advantages of using fiber? A. Security B. Eliminate RFI and EMI C. Low cost D. High speed

1 Answers  


You want to assign IP addresses to a large number of workstations. What is the best way to do this? A. Cisco Network Registrar B. Cisco IOS NAT Feature C. Assign them static IP addresses D. Let the workstation assign its own IP address

1 Answers  


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


EIGRP was developed to improve what two protocols? A. OSPF B. RIP C. BGP D. IGRP

7 Answers  


What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer

1 Answers  


What is the second step when creating a prototype? A. Develop a test plan B. Review the customer requirements C. Investigate what the competition will be proposing D. Define how big the prototype will be

1 Answers  


When characterizing a network, how many buffer misses should not be exceeded on a Cisco router per hour? A. 10 B. 25 C. 50 D. 100

1 Answers  


What are two true statements regarding DDR (Dial-on-Demand Routing)? A. Allows a router to automatically initiate and end a circuit-switched session B. DDR cannot be configured because it is set with a default configuration C. Can configure it to be used during non-peak hours D. Can only be used with Cisco PIX

1 Answers  


Which condition does not create LAN media problems? A. Protocol doesn?t scale well B. Long wait for the token C. Excessive collisions D. Too many devices

1 Answers  


Traffic Shaping does which one of the following? A. Eliminates bottlenecks by throttling back traffic volume at the source or outbound end B. Reduces the frame size so bandwidth is better utilized C. It increases source traffic to a configured bit rate D. Allows you to control hubs and repeaters

1 Answers  


What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing

1 Answers   Cisco,


Categories