Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which of the following three sets of IP addresses and subnet
masks are private IP addresses?

A. 10.0.0.0 255.0.0.0

B. 172.16.0.0 255.255.0.0

C. 172.16.0.0 255.240.0.0

D. 192.168.0.0 255.255.0.0



Which of the following three sets of IP addresses and subnet masks are private IP addresses? A. ..

Answer / guest

Answer: A, C, and D

The IP addresses and subnet masks that are for use on
private networks are 10.0.0.0 ? Mask 255.0.0.0, 172.16.0.0
through 172.31.255.255 ? Mask 255.240.0.0, and 192.168.0.0
through 192.168.255.255 ? Mask 255.255.0.0. Usually,
networks that don?t connect to the global Internet use these
addresses. If these addresses are used in a network that
also uses a globally unique IP address or registered
address, the private addresses must be filtered with access
lists to avoid advertising them to the Internet.

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More CCDA Interview Questions

ISDN is referenced by a suite of ITU-T (International Telecommunication Union Telecommunication Standardization Sector) standards encompassing what three layers of the OSI reference model? A. Physical B. Data Link (LAPD) C. Data Link (RMON) D. Network (Q.930 and Q.931)

1 Answers  


Which IP address is not a private address? A. 142.18.0.0 B. 10.0.0.0 C. 172.16.0.0 D. 192.168.0.0

1 Answers   NetMax,


How is data transmitted in a Token Ring network? A. The node calls for a token, appends the data, modifies a bit in the frame, then sends the token B. The node waits for the token, gains possession of it, appends the data, modifies a bit in the frame, then sends the token C. The node transmits the data whenever it wants to D. The active monitor must first grant permission for the node to transmit data. After it receives permission, it sends the data

1 Answers  


What are two services that DUAL (Diffusing Update Algorithm) performs for EIGRP? A. Provides loop-free operation throughout an entire route?s computation B. Simultaneous synchronization of routers involved in a topology change C. Updates the autonomous system number D. Allows advertised distances to use feasible distances

1 Answers  


The following are examples of proactive network management except: A. Allocate sufficient staff time B. Troubleshooting and solving system problems C. Generate reports D. Identify Problems

1 Answers  


Match the following devices with the correct description. A. Switch 1. Operates at the physical layer and extends the cable as if it is a single cable. B. Router 2. Operates at the physical layer and connects all connections into one device or concentrator. C. Repeater 3. Operates at the network layer and can filter both hardware and network addresses. D. Hub 4. Works at the Data-Link layer and transmits a digital signal only to the specific port where the destination MAC address is located.

1 Answers  


What set of Frame Relay enhancements offer extensions for managing complex internetworks? A. CMT B. SNMP C. LMI D. RMON

1 Answers  


When designing a flat switched network you can have: A. the same number of IP and IPX nodes without performance degradation B. more IP than IPX nodes on the same segment C. more IPX than IP nodes on the same segment D. more AppleTalk than IP nodes on the same segment

1 Answers  


What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network

1 Answers  


What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link

2 Answers  


What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.

2 Answers  


What is an advantage of CHAP over PAP? A. Passwords are stored on separate servers in encrypted form B. CHAP sends passwords unencrypted to save connection time C. CHAP does not attempt to verify whether the user is authorized to access the requested resource D. ID?s and passwords are automatically stored in cache

1 Answers  


Categories