skip to main
|
skip to sidebar
In network that support VLSM, which network mask should be used for point-to-point WAN links in order to reduce waste of IP addresses?
A. /24
B. /30
C. /27
D. /26
E. /32
Answer: B
Explanation:
A 30-bit mask is used to create subnet's with two valid host addresses. This is the exact
number needed for a point-to-point connection.
Newer Post
Older Post
Home
The following text will not be seen after you upload your website, please keep it in order to retain your counter functionality
Free Trackers
Help
A groan grasps the peanut near the offending anthology.
Blog Archive
►
2012
(4)
►
April
(4)
►
2011
(154)
►
August
(3)
►
July
(3)
►
June
(48)
►
May
(30)
►
April
(9)
►
March
(44)
►
January
(17)
►
2010
(19)
►
March
(7)
►
February
(12)
▼
2009
(88)
▼
December
(28)
NAT and Security Issues
Optimized Call Routing and PSTN Backup
Bandwidth Challenges
Which of the following access list statements woul...
Which one of the access control list statements be...
Which of the following are benefits provided with ...
Which command will configure a default route on a ...
You work as a network engineer at IGCT Groups.You ...
You are implementing a new frame relay network to ...
Which one of the following commands would you ente...
RIP version 2 is being used as the routing protoco...
Which of the following routing protocols do NOT su...
You are a network administrator and you need to im...
In network that support VLSM, which network mask s...
What is the maximum number of IP addresses that ca...
If an Ethernet port on router was assigned an IP a...
Which of the following IP addresses is a private I...
Which of the following are true regarding a networ...
Regarding DHCP (dynamic host configuration protoco...
Which protocol below uses TCP port 443?
Which protocol automates all of the following func...
Which three address ranges are used for internal p...
What statements are true regarding ICMP packets?
exhibit displays the partial contents of encapsula...
Catalyst switches utilize a special technology to ...
What are two characteristics of "store and forward...
Leading the way in IT testing and certification to...
What are some characteristics of the typical VLAN ...
►
November
(8)
►
June
(19)
►
May
(24)
►
February
(9)
Feedjit Live Blog Stats