Which of the following are valid subnet IDs for network 172.16.0.0, assuming mask 255.255.224.0 is used throughout network 172.16.0.0?
A) 172.16.1.16
B) 172.16.0.0
C) 172.16.240.0
D) 172.16.160.0
E) 172.16.248.0
B, D
Explanation: B) The correct answers are 172.16.0.0 and 172.16.160.0 because, with the given mask of 255.255.224.0, subtracting the third value from 256 (256 - 224 ) equals 32 (magic number). The multiples of 32, starting with 0, include the values 32, 64, 128, 160, 192, and 224.
D) The correct answers are 172.16.0.0 and 172.16.160.0 because, with the given mask of 255.255.224.0, subtracting the third value from 256 (256 - 224 ) equals 32 (magic number). The multiples of 32, starting with 0, include the values 32, 64, 128, 160, 192, and 224.
You might also like to view...
The thesaurus is used to find misspelled words
Indicate whether the statement is true or false
_______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.
A. DDoS B. An AES service attack C. A Floodping attack D. All of the above
How is the Registry organized?
A. As a tree structure B. As a flat structure C. As a relational structure D. As a peer structure
If a cell containing =B$14 is copied and pasted three columns over and two rows down, what would the resultant cell reference become?
A. E$14 B. $E$14 C. B16 D. B$16