logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Networking Comments

  • Question
  • Which of the following best illustrates the default subnet mask for a class A,B, and C Network?


  • Options
  • A. 0.0.0.0, 0.0.0.1, 0.0.1.1
  • B. 255.255.255.0, 255.255.0.0, 255.0.0.0
  • C. 255.0.0.0, 255.255.0.0, 255.255.255.0
  • D. 255.255.0.0, 255.255.255.0, 255.255.255.255
  • E. None of the above

  • Correct Answer
  • 255.0.0.0, 255.255.0.0, 255.255.255.0 


  • Networking problems


    Search Results


    • 1. To connect a computer with a device in the same room, you might be likely to use

    • Options
    • A. a coaxial cable
    • B. a dedicated line
    • C. a ground station
    • D. All of the above
    • Discuss
    • 2. Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?

    • Options
    • A. Layer 7 protocols
    • B. Layer 6 protocols
    • C. Layer 5 protocols
    • D. Layer 4 protocols
    • E. None of the above
    • Discuss
    • 3. With an IP address set starting with 150, you currently have six offices that you are treating as subnets. Plans are in place to open 10 more offices before the end of the year. What subnet mask should you use to satisfy the needed number of subnets and maximize the number of hosts available at each site?

    • Options
    • A. 192
    • B. 224
    • C. 240
    • D. 248
    • E. 252
    • Discuss
    • 4. Which of the following refers to the terms "residual error rate"?

    • Options
    • A. the number of bit errors per twenty four hours of continuous operation on an asynchronous line
    • B. The probability that one or more errors will be undetected when an error detection scheme is used
    • C. the probability that one or more errors will be detected when an error detection mechanism is used
    • D. signal to noise ratio divided by the ratio of energy per bit to noise per hertz
    • E. None of the above
    • Discuss
    • 5. Which address is the loopback address?

    • Options
    • A. 0.0.0.1
    • B. 127.0.0.0
    • C. 127.0.0.1
    • D. 255.255.255.255
    • E. None of the above
    • Discuss
    • 6. HOSTS file entries are limited to how many characters?

    • Options
    • A. 8
    • B. 255
    • C. 500
    • D. Unlimited
    • E. None of the above
    • Discuss
    • 7. You are working with three networks that have the network IDs 192.168.5.0, 192.168.6.0, and 192.168.7.0. What subnet mask can you use to combine these addresses into one?

    • Options
    • A. 255.255.252.0
    • B. 225.255.254.0
    • C. 255.255.255.240
    • D. 255.255.255.252
    • Discuss
    • 8. The first step in troubleshooting many problems is to verify which of the following?

    • Options
    • A. The subnet mask is valid
    • B. TCP/IP is installed correctly on the client
    • C. The WINS server is running
    • D. The BDC is operable
    • E. None of the above
    • Discuss
    • 9. Which of the following statement is correct?

    • Options
    • A. Buffering is the process of temporarily storing the data to allow for small variation in device speeds
    • B. Buffering is a method to reduce cross-talks
    • C. Buffering is a method to reduce the routing overhead
    • D. Buffering is storage of data within the transmitting medium until the receiver is ready to receive
    • E. None of the above
    • Discuss
    • 10. Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings?

    • Options
    • A. PING
    • B. TRACERT
    • C. ARP
    • D. IPCONFIG
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment