HOSTS file entries are limited to how many characters?
A.
8
B.
255
C.
500
D.
Unlimited
E.
None of the above

1 Answer

Answer :

255

Related questions

Description : You are working with a network thathas the network ID 192.168.10.0. What subnet should you use that supportsup to 25 hosts and a maximum number of subnets? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248 E. 255.255.255.252

Last Answer : 255.255.255.224

Description : If a Company require 60 hosts then What is the best possible subnet mask? a. 255.255.255.0 b. 255.255.255.192 c. 255.255.225.224 d. 225.225.255.240

Last Answer : b. 255.255.255.192

Description : A subnet has been assigned a subnet mask of 255.255.255.192. What is the maximum number of hosts that can belong to this subnet? a. 14 b. 30 c. 62 d. 126

Last Answer : c. 62

Description : hosts per subnet. What subnet mask will you use? * 255.255.255.248 * 255.255.255.128 * 255.255.255.192 * 255.255.255.240

Last Answer : Correct answer: A By borrowing 5 bits from the last octet, you can. have 30 subnets. If you borrowed only 4 bits you could only have 14 subnets. The formula is (2 to the power of n)-2. By borrowing ... To get 20 subnets, you would need to borrow 5 bits so the subnet mask would be 255.255.255.248

Description : Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available? * 254 * 510 * 126 * 16,372

Last Answer : 254

Description : A network on the Internet has a subnet mask of 255.255.240.0. What is the maximum number of hosts it can handle ? (A) 1024 (B) 2048 (C) 4096 (D) 8192

Last Answer : (C) 4096

Description : What is IP class and number of sub- networks if the subnet mask is 255.224.0.0? a. Class A, 3 b. Class A, 8 c. Class B, 3 d. Class B, 32

Last Answer : b. Class A, 8

Description : You are designing a network which needs to support 200 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? Select the best answer. A. 255.255.0.0 B. 255.255.255.0 C. 255.0.0.0 D. 255.224.0.0 E. 255.255.255.200

Last Answer : 255.255.255.0

Description : Which address is the loopback address? A. 0.0.0.1 B. 127.0.0.0 C. 127.0.0.1 D. 255.255.255.255 E. None of the above

Last Answer : 255.255.255.255

Description : Which of the following best illustrates the default subnet mask for a class A,B, and C Network? A. 0.0.0.0,0.0.0.1, 0.0.1.1 B. 255.255.255.0, 255.255.0.0,255.0.0.0 C. 255.0.0.0, 255.255.0.0, 255.255.255.0 D. 255.255.0.0, 255.255.255.0,255.255.255.255 E. None of the above

Last Answer : 255.0.0.0, 255.255.0.0, 255.255.255.0

Description : What is the default subnet mask for a class C network? A. 127.0.0.1 B. 255.0.0.0 C. 255.255.0.0 D. 255.255.255.0 E. None of the above

Last Answer : 255.255.255.0

Description : You havea class A network address 10.0.0.0 with 40subnets,but arerequiredto add 60 new subnets very soon. You would like to still allow for the largest possible number of host IDs per subnet. Which subnet mask should youassign? A. ... B. 255.248.0.0 C. 255.252.0.0 D. 255.254.0.0 E. 255.255.255.255

Last Answer : 255.254.0.0

Description : In a block, the mask is 255.255.192.0; what is the prefix length? A) /20 B) /28 C) /18 D) none of the above

Last Answer : /18

Description : In a block, the prefix length is /15; what is the mask? A) 255.254.0.0 B) 255.255.255.0 C) 255.255.255.128 D) none of the above

Last Answer : 255.254.0.0

Description : In a block, the prefix length is /24; what is the mask? A) 255.255.255.0 B) 255.255.242.0 C) 255.255.0.0 D) none of the above

Last Answer : 255.255.255.0

Description : Which one is nota contiguous mask? A) 255.255.255.254 B) 255.255.224.0 C) 255.148.0.0 D) all are

Last Answer : 255.148.0.0

Description : What is the resultof ANDing 0 and15? A) 255 B) 15 C) 0 D) none of the above

Last Answer : 0

Description : What is the resultof ANDing 255 and 15? A) 255 B) 15 C) 0 D) none of the above

Last Answer : 15

Description : You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and192.168.7.0. What subnet mask can you use to combine these addresses intoone? A. 255.255.252.0 B. 225.255.254.0 C. 255.255.255.240 D. 255.255.255.252

Last Answer : 255.255.252.0

Description : In the network 200.10.11.144/27, the fourth octet (in decimal) of the last IP address of the network which can be assigned to a host is ________ a. 158 b. 255 c. 222 d. 223

Last Answer : a. 158

Description : What is the loopback address of localhost? A. 0.0.0.0 B. 127.0.0.1 C. 172.16.12.1 D. 255.0.0.0

Last Answer : C. 172.16.12.1

Description : In a block, the prefix length is /24; what is the mask? A. 255.255.255.0 B. 255.255.242.0 C. 255.255.0.0 D. none of the above

Last Answer : A. 255.255.255.0

Description : A device is sending out data at the rate of 2000 bps. How long does it take to send a file of 1,00,000 characters ? a. 50 b. 200 c. 400 d. 800

Last Answer : c. 400

Description : With anIP address set starting with 150, you currently havesix offices that you are treating as subnets. Plans are in place toopen 10 more officesbefore the end of theyear. What subnet mask should you useto ... maximize thenumberof hosts available at eachsite? A. 192 B. 224 C. 240 D. 248 E. 252

Last Answer : 248

Description : With anIP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? A. 192 B. 224 C. 240 D. 248 E. 252

Last Answer : 252

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Memo data type allows you to store only 255 characters in the table. -Technology

Last Answer : False Memo data type is used when character size is more than 255.

Description : f four hosts on anetworkbelong tothesame group, a totalof _______ sent inresponse to a general query message. A) one membership report is B) two membership reports are C) three membership reports are D) noneof the above

Last Answer : two membership reports are

Description : A _______is an ARP thatacts on behalf of a set of hosts. A) ARP B) RARP C) proxy ARP D) noneof the above

Last Answer : proxy ARP

Description : A one-to-many communication between one sourceand a specific group of hosts is classifiedas a _______ communication. A) unicast B) multicast C) broadcast D) none of the above

Last Answer : multicast

Description : A one-to-all communication between one source and all hosts on a network is classified as a_______ communication. A) unicast B) multicast C) broadcast D) none of the above

Last Answer : broadcast

Description : Which of the following statement is true? I. An address with all bits 1 is interpreted as all networks or all hosts. II. The class A network 128.0.0.0 is defined as the loopback network. a. i only b. ii only c. Both A and B d. None of the above

Last Answer : a. i only

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : The address of a class B host is to be split into subnets with a 6-bit subnet number. What is the maximum number of subnets and the maximum number of hosts in each subnet? a. 62 subnets and 262142 hosts. b. 64 subnets and 262142 hosts. c. 62 subnets and 1022 hosts. d. 64 subnets and 1024 hosts

Last Answer : c. 62 subnets and 1022 hosts.

Description : The ………………………. protocol was originally developed as a mechanism to enable diskless hosts to be remotely booted over a network as workstations. A. RARP B. ARP C. DHCP D. BOOTP

Last Answer : D. BOOTP

Description : DHCP stands for……………………………….. A. Dynamic Host Control Protocol B. Diskless Hosts Control protocol C. Diskless Hosts Configuration protocol D. Dynamic Host configuration Protocol

Last Answer : D. Dynamic Host configuration Protocol

Description : Find out the components of DHCP: 1) A protocol that delivers host-specific configuration parameters from a server to a host. 2) The client determines its own hardware address; this is normally in a ROM on the hardware. 3) ... or permanent network addresses to hosts. A. 1,2 B. 1,3 C. 2,3 D. 1,2,3

Last Answer : B. 1,3

Description : ……………………………. extends …………………………. to provide the full set of configuration parameters defined in the Requirements for Internet Hosts RFC. A. DHCP, BOOTP B. BOOTP, DHCP C. RARP, BOOTP D. DHCP, RARP

Last Answer : A. DHCP, BOOTP

Description : ………………...is a minimal protocol that allows isolated hosts to link via TCP/IP over the telephone network and ………………..uses a proposed international standard for transmitting HDLC over asynchronous lines. A. LCP, PPP B. PPP, LCP C. SLIP, PPP D. PPP, SLIP

Last Answer : C. SLIP, PPP

Description : The _______ domains define registered hosts according to their general behavior. A. generic B. country C. inverse D. none of the above

Last Answer : A. generic

Description : A dynamic table is one _______. A) with manual entries B) which isupdated automatically C) either aor b D) none of the above

Last Answer : which isupdated automatically

Description : A static table is one _______. A) with manual entries B) which isupdated automatically C) either aor b D) none of the above

Last Answer : with manual entries

Description : The idea of address aggregation wasdesigned to alleviate theincreasein routing table entries when using ________. A) classful addressing B) classless addressing C) both a and b D) none of the above

Last Answer : classless addressing

Description : The Dynamic routing table is one _______ A. with manual entries B. which is updated automatically C. MAC entries D. none of the above

Last Answer : B. which is updated automatically

Description : The static routing table is one _______ A. with manual entries B. which is updated automatically C. MAC entries D. none of the above

Last Answer : A. with manual entries

Description : SHCIL was established in 1986 under the Government of India as __________ A. Private Ltd B. Public Ltd C. Limited Liability Partnership D. Unlimited company E. None of the Above

Last Answer : B. Public Ltd Explanation: Stock Holding Corporation of India Limited(SHCIL) was established in 1986 under the Government of India as public limited company.

Description : Which of the following is true for variable names in Python? a) unlimited length b) all private members must have leading and trailing underscores c) underscore and ampersand are the only two special characters allowed d) none of the mentioned

Last Answer : Answer: a Explanation: Variable names can be of any length.

Description : Do you get more done when you only have a limited amount of time to do it in, vs having an unlimited amount of time to do it in?

Last Answer : Yes—I get way more done when there is limited time. With no real deadline, I procrastinate and get nothing done. That reminds me—I should be working on…

Description : What occurs when there when there are limited resources but unlimited wants and needs?

Last Answer : Need answer

Description : Is single party state unlimited or limited government?

Last Answer : To answer a question we need a who, what, when, where, why, orhow question.