As the network engineer, you need to configure a server that is on the same subnet as a host that's assigned the IP address 192.168.19.24/28.28. The router has the first available host address. Which of the following IP addresses and masks could you assign to the server in this network?

A) 192.168.19.0 / 255.255.255.0
B) 192.168.19.27 / 255.255.255.240
C) 192.168.19.26 / 255.255.255.248
D) 192.168.19.31 / 255.255.255.248
E) 192.168.19.34 / 255.255.255.240


B
Explanation: B) The correct answer is 192.168.19.27 / 255.255.255.240 because the given mask of /28 converts to 255.255.255.240, and subtracting the fourth value from 256 (256 - 240 ) equals 16 (magic number). The multiples of 16 include the values 16, 32, 48, and so on. Using the last value of the IP address given, compare it to your list and take the lowest value; the subnet would be 192.168.19.16. The valid hosts range would be 192.168.19.17 through 192.168.19.31.

Computer Science & Information Technology

You might also like to view...

What is captioning? How does it differ from subtitles?

What will be an ideal response?

Computer Science & Information Technology

What are the data requirements for a C program that prompts the user to enter the radius of a circle and displays the circle's circumference?

What will be an ideal response?

Computer Science & Information Technology

The security ____________________ is an outline or structure of the organization's overall information security strategy that is used as a road map for planned changes to its information security environment.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What is a major advantage of DeviceNet, an open network intended to link low-level devices?

What will be an ideal response?

Computer Science & Information Technology