Which IP Address Class can have 16 million subnets but support 254 hosts?
* Class C
* Class A
* Class B
* Class D

1 Answer

Answer :

Correct answer: A
Possible Subnets IP Address Class Possible Hosts

Related questions

Description : Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available? * 254 * 510 * 126 * 16,372

Last Answer : 254

Description : You havea class A network address 10.0.0.0 with 40subnets,but arerequiredto add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should youassign? A. ... B. 255.248.0.0 C. 255.252.0.0 D. 255.254.0.0 E. 255.255.255.255

Last Answer : 255.254.0.0

Description : You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? * 10101100 00010000 * 00000010 10100000 * 10101100 00000000 * 11100000 11110000

Last Answer : Correct answer: A To find the network address, convert the IP address to binary-10101100 000100000 00000010 10100000-then ANDed it with the subnet mask-11111111 11111111 00000000 00000000. The rest is ... that the class of an address can be determined by the numerical value of the first octet

Description : Which IP Address Class is INCORRECTLY paired with its range of network numbers? * Class A addresses include 192.0.0.0 through 223.255.255.0 * Class A addresses include 1.0.0.0 through 126.0.0.0 * Class B ... 192.0.0.0 through 223.255.255.0 * Class D addresses include 224.0.0.0 through 239.255.255.0

Last Answer : 1

Description : The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and the maximum number of hosts in each subnet? a. 62 subnets and 262142 hosts. b. 64 subnets and 262142 hosts. c. 62 subnets and 1022 hosts. d. 64 subnets and 1024 hosts

Last Answer : c. 62 subnets and 1022 hosts.

Description : hosts per subnet. What subnet mask will you use? * 255.255.255.248 * 255.255.255.128 * 255.255.255.192 * 255.255.255.240

Last Answer : Correct answer: A By borrowing 5 bits from the last octet, you can. have 30 subnets. If you borrowed only 4 bits you could only have 14 subnets. The formula is (2 to the power of n)-2. By borrowing ... To get 20 subnets, you would need to borrow 5 bits so the subnet mask would be 255.255.255.248.

Description : You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.248.0, A, 15.16.192.0, 15.16.199.255 * 255.255.248.0, B, 15.16.192.0, ... 0, A, 15.16.199.255, 14.15.192.0 * 255.255.242.0, A, 15.16.192.0, 15.16.199.255

Last Answer : Correct answer: A,B & D Subnet addresses in this situation are all in multiples of 8. In this example, 201.222.5.16 is the subnet, 201.22.5.31 is the broadcast address. The rest are valid host IDs on subnet 201.222.5.16.

Description : You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.255.252, B,128.16.32.12, 128.16.32.15 * 255.255.255.252, C,128.16.32.12 ... , B,128.16.32.15, 128.16.32.12 * 255.255.255.248, B,128.16.32.12, 128.16.32.15

Last Answer : Correct answer: A * 255.255.255.248,

Description : There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? * RARP * ARP * RIP * IGRP

Last Answer : Correct answer: A ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.

Description : You have an IP host address of 201.222.5.121 and a subnet mask of 255.255.255.248. What is the broadcast address? * 201.222.5.127 * 201.222.5.120 * 201.222.5.121 * 201.222.5.122

Last Answer : Correct answer: A The easiest way to calculate this is to subtract 255.255.255.248 (subnet mask) from 255.255.255.255, this equals 7. Convert the address 201.222.5.121 to binary- ... mask 255.255.255.248 to binary-11111111 11111111 11111111 11111000. AND them together to get: 11001001 1101111

Description : When configuring the subnet mask for an IP address, which formats can be used? * dotted-decimal. * Hexadecimal * Bit-count * Octal * Binary

Last Answer : Correct answer: A, B &C

Description : With anIP address set starting with 150, you currently havesix offices that you are treating as subnets. Plans are in place toopen 10 more officesbefore the end of theyear. What subnet mask should you useto ... maximize thenumberof hosts available at eachsite? A. 192 B. 224 C. 240 D. 248 E. 252

Last Answer : 248

Description : With anIP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? A. 192 B. 224 C. 240 D. 248 E. 252

Last Answer : 252

Description : hosts per subnet. What subnet mask will you use? * 255.255.255.248 * 255.255.255.128 * 255.255.255.192 * 255.255.255.240

Last Answer : Correct answer: A By borrowing 5 bits from the last octet, you can. have 30 subnets. If you borrowed only 4 bits you could only have 14 subnets. The formula is (2 to the power of n)-2. By borrowing ... To get 20 subnets, you would need to borrow 5 bits so the subnet mask would be 255.255.255.248

Description : In classful addressing, the IP address 190.255.254.254 belongs to (A) Class A (B) Class B (C) Class C (D) Class D

Last Answer : (B) Class B

Description : You are given the following address: 153.50.6.27/25. Determine the subnet mask, address class, subnet address, and broadcast address. * 255.255.255.128, B,153.50.6.0, 153.50.6.127 * 255.255.255.128, C,153.50.6.0, 153 ... .128, C,153.50.6.127, 153.50.6.0 * 255.255.255.224, C,153.50.6.0, 153.50.6.127

Last Answer : Correct answer: A 255.255.255.224,

Description : How do I determine which, if any, static IP addresses are being used on my home WiFi network?

Last Answer : Check the status page of your Router setup.

Description : "Local area connection doesn't have a valid IP configuration" on Windows 7; Why?

Last Answer : Have you tried disabling and enabling the LAN connection in control panel > network connections? This is the first thing I would try. Then if that doesn’t work it might be a faulty Ethernet cable. Lastly, the drivers you are using for you NIC card might be incorrect since you let windows pick them.

Description : Explain the different Layers of TCP/IP Model.

Last Answer : Application Layer, Transport Layer, Network or Internet Layer, Network interface layer.

Description : What do you mean by the TCP/IP Model?

Last Answer : TCP/IP stands for Transmission control protocol and Internet protocol. It describes how the data will get transmitted and routed from end to end communication. 

Description : Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? * Identification * Flags * Frag Offset * Type of Service * Total Length

Last Answer : Correct answer: A, B & C The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) ... Address (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : What field tells the Internet layer how to handle an IP packet? * Type of Service * IdentificationFlags * Frag Offset

Last Answer : Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Where would network testing be included in an IP packet? * IP Options field * Identification field * Type of Service field * Reservation field

Last Answer : Correct answer: A The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type of ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : Two of the protocols that can be carried in the Protocol field of an IP packet are? * TCP * UDP * FTP * TFTP

Last Answer : Correct answer: A & B The following are the fields in an IP segment, their length, and their definitions: VERS (Version number - 16 bits) HLEN (Number of 32-bit words in the header - 4 bits) Type ... (32 bits) IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).

Description : You are working with a network thathas the network ID 192.168.10.0. What subnet should you use that supportsup to 25 hosts and a maximum number of subnets? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248 E. 255.255.255.252

Last Answer : 255.255.255.224

Description : Which processes does TCP, but not UDP, use?Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data * Destination Port - 16 bits, Source Port - 16 bits, Length - ... * Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

Last Answer : Correct answer: A The UDP format for a segment is as follows: Source Port 16 bits Destination Port 16 bits Length 16 bits Checksum 16 bits Data xx bits

Description : When you join a new " social networking site " that is asking for your home address before you can become a member, how can you be sure this information will not be used inappropriatly?

Last Answer : Here's one option: When this happens, open a new tab and do a google search with the following. Type the name of the site in question and then type the word review after it (e.g mastersofhearts.com review) ... your gut likes the most. A review will, of course, tell you if the site is legit or not.

Description : When using access lists, what does a Cisco router check first? * To see if the packet is routable or bridgeable * The destination address * The source address * The packet contents

Last Answer : Correct answer: A The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.

Description : Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? * ICMP * UDP * TCP * TFTP

Last Answer : Correct answer: A ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time ... Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.

Description : Which addresses are INCORRECTLY paired with their class? * 240 - 255, Class D * 240 - 255, Class E * 224 - 239, Class D

Last Answer : Correct answer: A & D Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and 240 to 255, Class E.

Description : Which addresses are INCORRECTLY paired with their class? * 1 to 126, Class A * 128 to 191, Class A * 1 to 126, Class B * 128 to 191, Class B

Last Answer : Correct answer: B & C. Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and .

Description : Which addresses are INCORRECTLY paired with their class? * 128 to 191, Class B * 192 to 223 Class B * 128 to 191, Class C * 192 to 223, Class C

Last Answer : Correct answer: B & C Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and

Description : Consider the given network implementation scenario. For the given classful NID 199.10.20.0/24, the requirement is to create 13 subnets. With given details, find the range of first and last valid IP in 15th subnet. a. ... .20.225 to 199.10.20.238 c. 199.10.20.193 to 199.10.20.206 d. Not of these

Last Answer : a. A Only

Description : I haven't networked anything but am going to do that to my computers and printers, plus a tv later. Can I get a good reference book or where should I go to get this done?

Last Answer : answer:Hi @igottaknow, welcome to Fluther! Your network will be built around a router. Everything will connect to that device. And instruction manuals for routers usually give a pretty good introduction, as ... - Home Networking 101 PCWorld - Step-By-Step: How to Build a Safe, Secure Network

Description : Ok, i was host in Modern Warfare 2 today, and people say they lagg but i dont. please help?

Last Answer : it means that they had a sub-par connection to your computer. Because the game is hosted on your computer, you have little to no lagg. I’d suggest stopping any downloads you have going on if you’re going to host, as that tends to hog your bandwidth. Or, you could just let someone else host.

Description : An organization isgranteda block;one address is2.2.2.64/20. The organization needs 10 subnets. What is thesubnet prefix length? A) /20 B) /24 C) /25 D) none of the above

Last Answer : /24

Description : An organization is granted the block 130.34.12.64/26. It needs to have 4 subnets. Which of the following is not an address of this organization? a. 130.34.12.124 b. 130.34.12.89 c. 130.34.12.70 d. 130.34.12.132

Last Answer : d. 130.34.12.132

Description : Which of the following statement is true? I. An address with all bits 1 is interpreted as all networks or all hosts. II. The class A network 128.0.0.0 is defined as the loopback network. a. i only b. ii only c. Both A and B d. None of the above

Last Answer : a. i only

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or all hosts. ii) The class A network 128.0.0.0 is defined as the loopback network. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : Do spam-bot accounts on Twitter automatically unfollow you if you are not tweeting cetain keywords?

Last Answer : answer:I wish I could say I knew enough about Twitter to say with any certainty. Always lovely to see you though, Keith!

Description : Would it be more advantageous to meet as many people as I can? Or be extremely selective as it pertains to multiple industries?

Last Answer : As a musician one would think that you are already known the the Community? Are you not playing at local concerts,coffee houses,events ( even volunteering your musical talents)? Also start a blog or Utube ... or American Idol too? If music and creating IS your passion then play it up! Good luck.

Description : Does anybody frequent any other question/answer site other than Fluther?

Last Answer : Was at Answer Bag before migrating here with a large school of AB’rs when they messed up that site. Also a member over at Experience Project. EP is so messed up now that it looks like some members have new start up that they hope will bring back the fun they once had there.

Description : Any advice on networking for the first time at an event?

Last Answer : I think dressing fairly professionally would be a good way to go. As this is meeting people in a possible business capacity, it is important to look the part. I think if you just go up and introduce ... being asked for their advice. These after all, are the best people to give their advice to you.

Description : Artists, businesses, public figures: How do you personally separate your social media?

Last Answer : I use Twitter, Instagram and Facebook. I follow a whole range of celebrities all over the place, really. Someone who puts up really good pictures, I will follow on Instagram. However if someone has a ... celebrities on there, as well as many pages on all sorts of things (musicians, brands, etc).

Description : What can you tell me about Freemasonry? (This is not a conspiracy theory thread)

Last Answer : answer:I used to date a Mason. He was fairly serious about it, and his father before him had been very serious, raised to the 33rd degree. My boyfriend told me lots of things, and I ... this: they do support worthy causes. The Shriners' hospital in Boston for pediatric burns cases is one example.

Description : How to get an Open NAT using Wireless Adapter for Xbox 360?

Last Answer : answer:Go to www.portforward.com It will tell explain exactly what you need to do. Walshy

Description : Why is PPTP blocking RV016 login?

Last Answer : Have you previously been able to access the router's config pages over the VPN? If I were administering the network I would disable remote admin access to the device. Is it possible that your client has done ... go on here. I'm afraid the best answer I have right now is to contact Linksys support.

Description : How to extend the range of wireless router?

Last Answer : First, I recommend trying the signal at different points in the garage. If the wireless adapter is USB-based this is trivially easy, but if it's a PCI adapter (inside the computer) then you might need an ... , and it might be worthwhile for other reasons too- I don't see any reason not to try it.

Description : What do you know about Freemasons?

Last Answer : answer:@youcancallmemoonman Some of the finest men I've ever known, have been masons. Having said that, I'll try to return tomorrow to answer to your question. This one can't be done lightly. I am ... to know. My best to you. Two family birthday parties in three days have left me a bit toasted!

Description : What is your expertise that you would share or mentor another Jelly on?

Last Answer : Pfft, if any jellies had a DIRE NEED to learn how to transcribe and play video game music on the piano, train their pokemon to perfection, photoshop a picture, do a derivative, or diagnose a kidney stone, I’m their go-to girl.