QUESTION 71:
What is the network address for a host with the IP address 201.100.5.68/28?
A. 201.100.5.0
B. 201.100.5.32
C. 201.100.5.64
D. 201.100.5.65
E. 201.100.5.31
F. 201.100.5.1
Explanation:
This is a C ip with a subnet mask of 255.255.255.240 the host 201.100.5.68/28 belong to the second subnet which is 201.100.5.64 this is determined by doing the following: subnets?2^4-2=14 hosts?2^4-2=14 valid subnet range?256-240=16 16+16=32,16+32=48,16+48=64,64+16=80 and so as you can see the ip 201.100.5.68 belongs to the second subnet which is.64
QUESTION 72:
Which of the following IP addresses fall into the CIDR block of 115.54.4.0/22? Select three
A. 115.54.8.32
B. 115.54.7.64
C. 115.54.6.255
D. 115.54.3.32
E. 115.54.5.128
F. 115.54.12.128
Explanation:
Given the CIDR block of 115.54.4.0 /22 the subnet mask is 255.255.252.0.
This gives us theIP address range of 115.54.4.1 to 115.54.7.254. Therefore, 115.54.5.128
(E),115.54.6.255 (C) and 115.54.7.64 (B) are correct.
QUESTION 73:
If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet?
A. 1024
B. 2046
C. 4094
D. 4096
E. 8190
Explanation:
Given IP address of 172.16.112.1 / 20, subnet mask: 255.255.240.0 max. num of hosts =(( 2^12) -2 ) = 4096-2 = 4094
QUESTION 74:
You work as network consultant. Your customer, Certkiller Inc, has a class C network license. Certkiller wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts.
Which network mask should you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252
F. 255.255.255.254
Explanation:
The default subnet mask for class C network is 255.255.255.0. If one has to create 5 subnets, then 3 bits are required. With 3 bits we can create 6 subnets. Remaining 5 bits are used for Hosts. One can create 30 hosts using 5 bits in host field. This matches with requirement.
QUESTION 75:
Your Certkiller trainee Bob asks you what 11111001 binary is in decimal. What should you tell him?
A. 6
B. 193
C. 225
D. 241
E. 249
Explanation:
The binary number 11111001 translates to 128 + 64+32+16+8+1 = 249
QUESTION 76:
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that use the 255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
E. 31
F. 32
Explanation:
The subnet mask 255.255.255.224 means that there are 27 network bits. The remaining 5 bits are the host bits. The maximum possible combinations with 5 bits are 25 = 32. As all zero's and all one's hosts are not allowed so, maximum number of valid hosts with the mask 255.255.255.224 are 25 -2 =32-2 = 30 Hosts
QUESTION 77:
Which of the following IP addresses for the network 27.35.16.32/28 can be assigned to hosts? (Choose three)
A. 27.35.16.32
B. 27.35.16.33
C. 27.35.16.48
D. 27.35.16.47
E. 27.35.16.45
F. 27.35.16.44
Explanation: 25 26 27 /28 .128 64 32 16 8 4 2 1
/28 0 0 0 0 1 1 1 1 network 32 0 0 1 0 0 0 0 0 next network 0 0 1 1 0 0 0 0 (which equals 48) Range of host values are:
RANGE 0 0 1 0 0 0 0 1
TO RANGE 0 0 1 0 1 1 1 0
network is 32 the next network is 32 + 16 = 48 the range is 32 + 1 to 48 - 2.
this results in a range 33 to 46.
Incorrect Answers:
32 cannot be used it is the network; 47 cannot be used it is the broadcast.
A, C: These choices are both network addresses.
D. This is a broadcast address.
QUESTION 78:
DRAG DROP
Certkiller has three locations and has plans to redesign the network accordingly. The networking team received 192.168.236.0 to use as the addressing for entire network from the administrator. After subnetting the address, the team is ready to assign the address.
The administrator plans to configure ip subnet-zero and use RIP v2 as the routing protocol. As a member of the networking team, you must address the network and at the same time converse unused addresses for future growth.
Being mindful of these goals, drag the host addresses on the left to the correct router interface. One of the routers is partially configured. Move the mouse over a router to view its configuration (** This information is missing**). Not all of the host addresses on the left will be used.
Answer:
QUESTION 79:
DRAG DROP
Certkiller has three locations and has plans to redesign the network accordingly. The networking team received 192.168.132.0 to use as the addressing for entire network from the administrator. After subnetting the address, the team is ready to assign the address.
The administrator plans to configure ip subnet-zero and use RIP v2 as the routing protocol. As a member of the networking team, you must address the network and at the same time converse unused addresses for future growth.
Being mindful of these goals, drag the host addresses on the left to the correct router interface. One of the routers is partially configured. Move the mouse over a router to view its configuration (** This information is missing**). Not all of the host addresses on the left will be used.
Answer:
QUESTION 80:
In network that support VLSM, which network mask should be used for point-to-point WAN links in order to reduce waste of IP addresses?
A. /24
B. /30
C. /27
D. /26
E. /32
Explanation:
A 30-bit mask is used to create subnets with two valid host addresses. This is the exact number needed for a point-to-point connection.
What is the network address for a host with the IP address 201.100.5.68/28?
A. 201.100.5.0
B. 201.100.5.32
C. 201.100.5.64
D. 201.100.5.65
E. 201.100.5.31
F. 201.100.5.1
Explanation:
This is a C ip with a subnet mask of 255.255.255.240 the host 201.100.5.68/28 belong to the second subnet which is 201.100.5.64 this is determined by doing the following: subnets?2^4-2=14 hosts?2^4-2=14 valid subnet range?256-240=16 16+16=32,16+32=48,16+48=64,64+16=80 and so as you can see the ip 201.100.5.68 belongs to the second subnet which is.64
QUESTION 72:
Which of the following IP addresses fall into the CIDR block of 115.54.4.0/22? Select three
A. 115.54.8.32
B. 115.54.7.64
C. 115.54.6.255
D. 115.54.3.32
E. 115.54.5.128
F. 115.54.12.128
Explanation:
Given the CIDR block of 115.54.4.0 /22 the subnet mask is 255.255.252.0.
This gives us theIP address range of 115.54.4.1 to 115.54.7.254. Therefore, 115.54.5.128
(E),115.54.6.255 (C) and 115.54.7.64 (B) are correct.
QUESTION 73:
If an Ethernet port on router was assigned an IP address of 172.16.112.1/20, what is the maximum number of hosts allowed on this subnet?
A. 1024
B. 2046
C. 4094
D. 4096
E. 8190
Explanation:
Given IP address of 172.16.112.1 / 20, subnet mask: 255.255.240.0 max. num of hosts =(( 2^12) -2 ) = 4096-2 = 4094
QUESTION 74:
You work as network consultant. Your customer, Certkiller Inc, has a class C network license. Certkiller wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts.
Which network mask should you use?
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. 255.255.255.252
F. 255.255.255.254
Explanation:
The default subnet mask for class C network is 255.255.255.0. If one has to create 5 subnets, then 3 bits are required. With 3 bits we can create 6 subnets. Remaining 5 bits are used for Hosts. One can create 30 hosts using 5 bits in host field. This matches with requirement.
QUESTION 75:
Your Certkiller trainee Bob asks you what 11111001 binary is in decimal. What should you tell him?
A. 6
B. 193
C. 225
D. 241
E. 249
Explanation:
The binary number 11111001 translates to 128 + 64+32+16+8+1 = 249
QUESTION 76:
What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that use the 255.255.255.224 subnet mask?
A. 14
B. 15
C. 16
D. 30
E. 31
F. 32
Explanation:
The subnet mask 255.255.255.224 means that there are 27 network bits. The remaining 5 bits are the host bits. The maximum possible combinations with 5 bits are 25 = 32. As all zero's and all one's hosts are not allowed so, maximum number of valid hosts with the mask 255.255.255.224 are 25 -2 =32-2 = 30 Hosts
QUESTION 77:
Which of the following IP addresses for the network 27.35.16.32/28 can be assigned to hosts? (Choose three)
A. 27.35.16.32
B. 27.35.16.33
C. 27.35.16.48
D. 27.35.16.47
E. 27.35.16.45
F. 27.35.16.44
Explanation: 25 26 27 /28 .128 64 32 16 8 4 2 1
/28 0 0 0 0 1 1 1 1 network 32 0 0 1 0 0 0 0 0 next network 0 0 1 1 0 0 0 0 (which equals 48) Range of host values are:
RANGE 0 0 1 0 0 0 0 1
TO RANGE 0 0 1 0 1 1 1 0
network is 32 the next network is 32 + 16 = 48 the range is 32 + 1 to 48 - 2.
this results in a range 33 to 46.
Incorrect Answers:
32 cannot be used it is the network; 47 cannot be used it is the broadcast.
A, C: These choices are both network addresses.
D. This is a broadcast address.
QUESTION 78:
DRAG DROP
Certkiller has three locations and has plans to redesign the network accordingly. The networking team received 192.168.236.0 to use as the addressing for entire network from the administrator. After subnetting the address, the team is ready to assign the address.
The administrator plans to configure ip subnet-zero and use RIP v2 as the routing protocol. As a member of the networking team, you must address the network and at the same time converse unused addresses for future growth.
Being mindful of these goals, drag the host addresses on the left to the correct router interface. One of the routers is partially configured. Move the mouse over a router to view its configuration (** This information is missing**). Not all of the host addresses on the left will be used.
Answer:
QUESTION 79:
DRAG DROP
Certkiller has three locations and has plans to redesign the network accordingly. The networking team received 192.168.132.0 to use as the addressing for entire network from the administrator. After subnetting the address, the team is ready to assign the address.
The administrator plans to configure ip subnet-zero and use RIP v2 as the routing protocol. As a member of the networking team, you must address the network and at the same time converse unused addresses for future growth.
Being mindful of these goals, drag the host addresses on the left to the correct router interface. One of the routers is partially configured. Move the mouse over a router to view its configuration (** This information is missing**). Not all of the host addresses on the left will be used.
Answer:
QUESTION 80:
In network that support VLSM, which network mask should be used for point-to-point WAN links in order to reduce waste of IP addresses?
A. /24
B. /30
C. /27
D. /26
E. /32
Explanation:
A 30-bit mask is used to create subnets with two valid host addresses. This is the exact number needed for a point-to-point connection.
0 ความคิดเห็น:
Subscribe to:
Post Comments (Atom)