0 evaluări0% au considerat acest document util (0 voturi)
52 vizualizări7 pagini
A Class B network needs to be subnetted such that it supports 100 subnets. If multiple masks meet those design requirements, the engineer should choose the mask that maximizes the number of hosts per subnet.
A Class B network needs to be subnetted such that it supports 100 subnets. If multiple masks meet those design requirements, the engineer should choose the mask that maximizes the number of hosts per subnet.
Drepturi de autor:
Attribution Non-Commercial (BY-NC)
Formate disponibile
Descărcați ca PDF, TXT sau citiți online pe Scribd
A Class B network needs to be subnetted such that it supports 100 subnets. If multiple masks meet those design requirements, the engineer should choose the mask that maximizes the number of hosts per subnet.
Drepturi de autor:
Attribution Non-Commercial (BY-NC)
Formate disponibile
Descărcați ca PDF, TXT sau citiți online pe Scribd
1. Which of the following are private IP networks?
a. 172.31.0.0 b. 172.32.0.0 c. 192.168.255.0 d. 192.1.168.0 e. 11.0.0.0 2. Which of the following is the result of a Boolean AND between IP address 150.150.4.100 and mask 255.255.192.0? a. 1001 0110 1001 0110 0000 0100 0110 0100 b. 1001 0110 1001 0110 0000 0000 0000 0000 c. 1001 0110 1001 0110 0000 0100 0000 0000 d. 1001 0110 0000 0000 0000 0000 0000 0000
3. Which of the following shows the equivalent of subnet mask
255.255.248.0, but in prefix notation? a. /248 b. /24 c. /28 d. /21 e. /20 f. /23 4. If mask 255.255.255.128 were used with a Class B network, how many subnets could exist, with how many hosts per subnet, respectively? a. 256 and 256 b. 254 and 254 c. 62 and 1022 d. 1022 and 62 e. 512 and 126 f. 126 and 510
5. A Class B network needs to be subnetted such that it supports
100 subnetsand 100 hosts/subnet. For this design, if multiple masks meet those design requirements, the engineer should choose the mask that maximizes the number of hosts per subnet. Which of the following masks meets the design criteria? a. 255.255.255.0 b. /23 c. /26 d. 255.255.252.0 6. If mask 255.255.255.240 were used with a Class C network, how many subnets could exist, with how many hosts per subnet, respectively? a. 16 and 16 b. 14 and 14 c. 16 and 14 d. 8 and 32 e. 32 and 8 f. 6 and 30
7. Which of the following subnet masks lets a Class B network
have up to 150 hosts per subnet, and 164 subnets? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.192.0 e. 255.255.240.0 f. 255.255.252.0 8. Which of the following subnet masks let a Class A network have up to 150 hosts per subnet and up to 164 subnets? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.192.0 e. 255.255.252.0 f. 255.255.255.192
9. Which of the following IP addresses are not in the same
subnet as 190.4.80.80, mask 255.255.255.0? a. 190.4.80.1 b. 190.4.80.50 c. 190.4.80.100 d. 190.4.80.200 e. 190.4.90.1 f. 10.1.1.1 10. Which of the following IP addresses is not in the same subnet as 190.4.80.80, mask 255.255.240.0? a. 190.4.80.1 b. 190.4.80.50 c. 190.4.80.100 d. 190.4.80.200 e. 190.4.90.1 f. 10.1.1.1
11. Which of the following IP addresses are not in the same
subnet as 190.4.80.80/25? a. 190.4.80.1 b. 190.4.80.50 c. 190.4.80.100 d. 190.4.80.200 e. 190.4.90.1 f. 10.1.1.1 12. Each of the following answers lists a dotted decimal number and a subnet mask. The dotted decimal number might be a valid IP address that can be used by a host or it might be a subnet number or broadcast address. Which of the answers show an address that can be used by a host? a. 10.0.0.0, 255.0.0.0 b. 192.168.5.160, 255.255.255.192 c. 172.27.27.27, 255.255.255.252 d. 172.20.49.0, 255.255.254.0
13. Which of the following are valid subnet numbers in network
180.1.0.0 when using mask 255.255.248.0? a. 180.1.2.0 b. 180.1.4.0 c. 180.1.8.0 d. 180.1.16.0 e. 180.1.32.0 f. 180.1.40.0 14. Which of the following are not valid subnet numbers in network 180.1.0.0 when using mask 255.255.255.0? a. 180.2.2.0 b. 180.1.4.0 c. 180.1.8.0 d. 180.1.16.0 e. 180.1.32.0 f. 180.1.40.0
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux