Which of the following are valid subnet IDs for network 172.16.0.0, assuming mask 255.255.224.0 is used throughout network 172.16.0.0?

A) 172.16.1.16
B) 172.16.0.0
C) 172.16.240.0
D) 172.16.160.0
E) 172.16.248.0


B, D
Explanation: B) The correct answers are 172.16.0.0 and 172.16.160.0 because, with the given mask of 255.255.224.0, subtracting the third value from 256 (256 - 224 ) equals 32 (magic number). The multiples of 32, starting with 0, include the values 32, 64, 128, 160, 192, and 224.
D) The correct answers are 172.16.0.0 and 172.16.160.0 because, with the given mask of 255.255.224.0, subtracting the third value from 256 (256 - 224 ) equals 32 (magic number). The multiples of 32, starting with 0, include the values 32, 64, 128, 160, 192, and 224.

Computer Science & Information Technology

You might also like to view...

The thesaurus is used to find misspelled words

Indicate whether the statement is true or false

Computer Science & Information Technology

_______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.

A. DDoS B. An AES service attack C. A Floodping attack D. All of the above

Computer Science & Information Technology

How is the Registry organized?

A. As a tree structure B. As a flat structure C. As a relational structure D. As a peer structure

Computer Science & Information Technology

If a cell containing =B$14 is copied and pasted three columns over and two rows down, what would the resultant cell reference become?

A. E$14 B. $E$14 C. B16 D. B$16

Computer Science & Information Technology