An engineer is performing the IP subnet design for an organization and needs to find the best mask that should be used. The organization has been assigned the 192.69.24.128/25 network. The addresses must be split up so that they can be organized into at least 8 subnets of at least 6 addresses. Which mask would best fit this requirement?

A) 255.255.255.192
B) 255.255.255.248
C) 255.255.255.240
D) 255.255.255.224


B, C
Explanation: B) The 192.69.24.128/25 network provides up to 126 total host addresses. To split this into at least 8 different subnets of at least 6 addresses, the engineer can use the 255.255.255.240 (/28 ) or 255.255.255.248 (/29 ) mask. The options are to use 8 subnets of 14 or 16 subnets of 6.
C) The 192.69.24.128/25 network provides up to 126 total host addresses. To split this into at least 8 different subnets of at least 6 addresses, the engineer can use the 255.255.255.240 (/28 ) or 255.255.255.248 (/29 ) mask. The options are to use 8 subnets of 14 or 16 subnets of 6.

Computer Science & Information Technology

You might also like to view...

Which type of structure is used to execute a set of instructions in the order in which they appear?

a. Decision structure b. Sequence structure c. Nested structure d. Do together structure e. None of these

Computer Science & Information Technology

Ruby provides a number of different loop methods belonging to different classes. These methods simplify loop construction and help to eliminate the chance of errors that can happen when working with language looping constructs.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. An in-memory database (IMDB) is a database management system that stores an entire database in read-only memory (ROM). 2. In spreadsheets programs, Excel Solver can be used by the end users to perform “what if” analysis for the evaluation of various alternatives. 3. Online analytical processing (OLAP) enables users to identify issues and opportunities as well as perform trend analysis. 4. Online analytical processing (OLAP) involves the interactive examination of high-level summary data in increasing detail. 5. Case-based reasoning technique of data mining contains a specialized set of algorithms that sorts through data and forms statistical rules about relationships among the items.

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The optimal temperature for computer systems is between 10 and 32 degrees Fahrenheit. 2. High humidity does not pose a threat to electrical and electronic equipment as long as the computer’s temperature stays within the optimal range. 3. If a computer’s temperature gets too cold the system can undergo thermal shock when it is turned on. 4. A person that becomes statically charged can damage electronic equipment by an electric discharge. 5. The direct flame is the only threat from fire.

Computer Science & Information Technology