As the network engineer, you are shown the following IP address and subnet mask: 10.100.48.27/19. What is the valid host range for this IP address?

A) 10.100.0.1 through 10.100.31.255
B) 10.100.32.1 through 10.100.63.254
C) 10.100.32.0 through 10.100.63.255
D) 10.100.32.1 through 10.100.95.255


B
Explanation: B) The correct answer is 10.100.32.1 through 10.100.63.254 because the given mask of /19 converts to 255.255.224.0, and subtracting the third value from 256 (256 - 224 ) equals 32 (magic number). The multiples of 32 include the values 32, 64, 96, and so on. Using the last two values of the IP address given, compare it to your list and take the lowest value; the subnet would be 10.100.32.0. The valid hosts range would be 10.100.32.1 through 10.100.63.254.

Computer Science & Information Technology

You might also like to view...

The sorting algorithm where the time complexity depends on both the range and the number of elements is:

A. quicksort B. insertion sort C. heapsort D. counting sort

Computer Science & Information Technology

Which of the following is NOT a default Quick Access Toolbar button?

A) New B) Undo C) Save D) Redo

Computer Science & Information Technology

The lightest notebook computers, which weigh less than 3 pounds, are equipped with a(n) ____-inch display.

A. 8 B. 12.1 C. 13.5 D. 14.9

Computer Science & Information Technology

____ is a threat-rating system developed by Microsoft and is used to assess risk with great granularity.

A. Qualitative assessment B. DREAD C. Quantitative assessment D. Risk-scaling

Computer Science & Information Technology