Searching for "he"

Q:

Given the following network range 192.168.0.0/24. We want minimum 50 hosts on each of the available subnets. What will be the subnet mask?

A) /24 B) /25
C) /26 D) /27
 
Answer & Explanation Answer: C) /26

Explanation:

Explanation: 50 hosts require 6 bits of the last octet giving us 64 -2 = 62 possible hosts this satisfies our requirement and leaves us 2 bits over for the subnets. The default mask is /24 or 255.255.255.0 adding the 2 bits for the subnets it becomes 255.255.255.192 or /26

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

What is the meaning of amber SYST led on a 2960 switch?

A) This is normal operation B) There is a bridging loop
C) The switch IOS is loading D) The switch failed its POST
 
Answer & Explanation Answer: D) The switch failed its POST

Explanation:

Explanation: When the switch failed its POST, Power-On Self Test, the SYST led will turn amber and the IOS did not load

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

What command will change the hostname of a router?

A) router#host name new name B) router(config-router)#hostname new name
C) router>host name new name D) router(config)#hostname new name
 
Answer & Explanation Answer: D) router(config)#hostname new name

Explanation:

Explanation: To specify or modify the host name for the network server, use the hostname command in global configuration mode.

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

What type of cable is shown in the exhibit?

imageview

A) AEIA/TIA-232 B) EIA-530
C) X.21 D) V.35
 
Answer & Explanation Answer: D) V.35

Explanation:
Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

Which of the following symbols indicate that a ping was successful?

A) ! B) .
C) ? D) U
 
Answer & Explanation Answer: A) !

Explanation:

Explanation: The following table explains the output generated by ping:

! – reply received

. – timed out

U – unreachable

C – congestion

? – unknown packet type

& packet lifetime exceeded

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

What do you use when you want to display a message to all the terminals connected to a router?

A) banner login B) banner motd
C) banner exec D) banner slip-ppp
 
Answer & Explanation Answer: B) banner motd

Explanation:

Explanation: This MOTD banner is displayed to all terminals connected and is useful for sending messages that affect all users (such as impending system shutdowns). Use the no exec-banner or no motd-banner command to disable the MOTD banner on a line. The no exec-banner command also disables the EXEC banner on the line. When a user connects to the router, the MOTD banner appears before the login prompt. After the user logs in to the router, the EXEC banner or incoming banner will be displayed, depending on the type of connection. For a reverse Telnet login, the incoming banner will be displayed. For all other connections, the router will display the EXEC banner. Connection, Menu, and System Banner Commands

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

You are the network administrator and are given the tasks to plan for the future expansion of the network. You decide to subnet the current network of 172.15.0.0. What will be the subnet mask be if every subnet has to allocate 500 hosts.

A) 255.255.0.0 B) 255.0.0.0
C) 255.255.240.0 D) 255.255.254.0
 
Answer & Explanation Answer: D) 255.255.254.0

Explanation:

Explanation: The requirement of having to allocate 500 hosts on each subnet can be achieved by the following: 2^9 = 512. So deducting the broadcast and network address we have 510 possible hosts on each subnet. We used 9 bits to allocate the hosts, this leaves us 7 bits for possible subnets. Those 7 bits in binary is 1111 1110 or 254 in decimal.

Report Error

View Answer Report Error Discuss

Filed Under: CCENT

Q:

Why is BGP a better choice for Internet routing than the IGPs?

Answer

RIP version 1 and IGRP are classful protocols and do not advertise subnet mask information. RIP version 2 has a limited network diameter of 15 hops. EIGRP, OSPF, and IS-IS use computational intensive algorithms for determining a shortest path. BGP relies on simple techniques for best path selection and loop detection, and can handle the number of network prefixes required for Internet routing.

Report Error

View answer Workspace Report Error Discuss

Subject: CCNP