Which wild card mask will enable a network administrator to permit access to the Internet for only hosts that are assigned an address in the range 192.168.8.0 through 192.168.15.255?() A. 0.0.0.0B. 0.0.0.255C. 0.0.255.255D. 0.0.7.255E. 0.0.3.255F. None of the above

Which wild card mask will enable a network administrator to permit access to the Internet for only hosts that are assigned an address in the range 192.168.8.0 through 192.168.15.255?()

A. 0.0.0.0

B. 0.0.0.255

C. 0.0.255.255

D. 0.0.7.255

E. 0.0.3.255

F. None of the above


相关考题:

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode

标准IP访问控制列表的基本格式为access-list[1ist number][permit|deny][host/any][sourceaddress][wild-card-mask][log],请填写其参数描述。a、list number…………………………………… ______b、permit/deny………………………………… ______c、source address……………………………… ______d、host/any…………………………………… ______e、windcad-mask……………………………… ______

Given the IP address range 192.168.100.0 through 192.168.100.255, which network mask segments these addresses into 16 subnets?() A.255.255.255.224B.255.255.255.240C.255.255.255.248D.255.255.255.252

You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A.14B.16C.30D.32E.62F.64

What will happen if a private IP address is assigned to a public interface connected to an ISP?() A. Addresses in a private range will be not routed on the Internet backbone.B. Only the ISP router will have the capability to access the public network.C. The NAT process will be used to translate this address in a valid IP address.D. Several automated methods will be necessary on the private network.E. A conflict of IP addresses happens, because other public routers can use the same range.

A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A.access-list 10 permit ip 192.168.147.0 0.0.0.255.255B.access-list 10 permit ip 192.168.149.0 0.0.0.255.255C.access-list 10 permit ip 192.168.146.0 0.0.0.0.255D.access-list 10 permit ip 192.168.146.0 0.0.1.255E.access-list 10 permit ip 192.168.148.0 0.0.1.255F.access-list 10 permit ip 192.168.146.0 255.255.255.0

Which subnet mask would be appropriate for a network address range to be subnetted for up to eight LANs, with each LAN containing 5 to 26 hosts?() A.0.0.0.240B.255.255.255.252C.255.255.255.0D.255.255.255.224E.255.255.255.240

Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? () A.The subnet mask in use is 255.255.255.192.B.The subnet mask in use is 255.255.255.128.C.The IP address 172.16.1.25 can be assigned to hosts in VLAN1D.The IP address 172.16.1.205 can be assigned to hosts in VLAN1E.The LAN interface of the router is configured with one IP address.F.The LAN interface of the router is configured with multiple IP addresses.

You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A、14B、16C、30D、32E、62F、64

Which wild card mask will enable a network administrator to permit access to the Internet for only hosts that are assigned an address in the range 192.168.8.0 through 192.168.15.255?()A、0.0.0.0B、0.0.0.255C、0.0.255.255D、0.0.7.255E、0.0.3.255F、None of the above

The TestKing network is subnetted using 29 bits for the subnet mask. Which wild card mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?()A、255.255.255.224B、255.255.255.248C、0.0.0.224D、0.0.0.8E、0.0.0.7F、0.0.0.3

A network administrator is configuring ACLs on a cisco router, to allow affic from hosts on networks 192.168.146.0,192.168.147.0,192.168.148.0 and 192.168.149.0 only.Which two ACL statements when combined are the best for accomplishing the task?()A、access-list 10 permit ip 192.168.147.0 0.0.0.255.255B、access-list 10 permit ip 192.168.149.0 0.0.0.255.255C、access-list 10 permit ip 192.168.146.0 0.0.0.0.255D、access-list 10 permit ip 192.168.146.0 0.0.1.255E、access-list 10 permit ip 192.168.148.0 0.0.1.255F、access-list 10 permit ip 192.168.146.0 255.255.255.0

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

Which subnet mask would be appropriate for a network address range to be subnetted for up to eight LANs, with each LAN containing 5 to 26 hosts?()A、0.0.0.240B、255.255.255.252C、255.255.255.0D、255.255.255.224E、255.255.255.240

What will happen if a private IP address is assigned to a public interface connected to an ISP?()A、Addresses in a private range will be not routed on the Internet backbone.B、Only the ISP router will have the capability to access the public network.C、The NAT process will be used to translate this address in a valid IP address.D、Several automated methods will be necessary on the private network.E、A conflict of IP addresses happens, because other public routers can use the same range.

Workstation A has been assigned an IP address of 192.0.2.24/28. Workstation B has been assigned an IP address of 192.0.2.100/28. The two workstations are connected with a straight-through cable. Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()A、Replace the straight-through cable with a crossover cable.B、Change the subnet mask of the hosts to /25.C、Change the subnet mask of the hosts to /26.D、Change the address of Workstation A to 192.0.2.15.E、Change the address of Workstation B to 192.0.2.111.

Which two statements are true of a network mask?()A、A subnet mask specifies the portion of an IP address that is in a binary format.B、A subnet mask specifies the portion of an IP address that is in a decimal format.C、A subnet mask specifies the portion of an IP address that represents a network prefix.D、A subnet mask specifies the portion of an IP address that represents network hosts.

Which two statements are true of a network mask?()A、A subnet mask specifies the portion of an IP address that is in a binary formatB、A subnet mask specifies the portion of an IP address that is in a decimal formatC、A subnet mask specifies the portion of an IP address that represents a network prefixD、A subnet mask specifies the portion of an IP address that represetns network hosts

Given the IP address range 192.168.100.0 through 192.168.100.255, which network mask segments these addresses into 16 subnets?()A、255.255.255.224B、255.255.255.240C、255.255.255.248D、255.255.255.252

多选题Refer to the diagram. All hosts have connectivity with one another. Which statements describe the addressing scheme that is in use in the network? ()AThe subnet mask in use is 255.255.255.192.BThe subnet mask in use is 255.255.255.128.CThe IP address 172.16.1.25 can be assigned to hosts in VLAN1DThe IP address 172.16.1.205 can be assigned to hosts in VLAN1EThe LAN interface of the router is configured with one IP address.FThe LAN interface of the router is configured with multiple IP addresses.

单选题The TestKing network is subnetted using 29 bits for the subnet mask. Which wild card mask should be used to configure an extended access list to permit or deny access to an entire subnetwork?()A255.255.255.224B255.255.255.248C0.0.0.224D0.0.0.8E0.0.0.7F0.0.0.3

多选题Workstation A has been assigned an IP address of 192.0.2.24/28.Workstation B has been assigned an IP address of 192.0.2.100/28.The two workstations are connected with a straight-through cable.Attempts to ping between the hosts are unsuccessful. What two things can be done to allow communications between the hosts? ()AReplace the straight-through cable with a crossover cableBChange the subnet mask of the hosts to /25CChange the subnet mask of the hosts to /26DChange the address of Workstation A to 192.0.2.15EChange the address of Workstation B to 192.0.2.111

单选题You are the network administrator at TestKing. TestKing has been assigned the class C IP address 189.66.1.0 by its Internet Service Provider. If you divide the network range by using the 255.255.255.224 subnet mask, how many hosts can be supported on each network?()A14B16C30D32E62F64

单选题Which wild card mask will enable a network administrator to permit access to the Internet for only hosts that are assigned an address in the range 192.168.8.0 through 192.168.15.255?()A0.0.0.0B0.0.0.255C0.0.255.255D0.0.7.255E0.0.3.255FNone of the above

单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode

单选题Given the IP address range 192.168.100.0 through 192.168.100.255, which network mask segments these addresses into 16 subnets?()A255.255.255.224B255.255.255.240C255.255.255.248D255.255.255.252

单选题Which two statements are true of a network mask?()AA subnet mask specifies the portion of an IP address that is in a binary formatBA subnet mask specifies the portion of an IP address that is in a decimal formatCA subnet mask specifies the portion of an IP address that represents a network prefixDA subnet mask specifies the portion of an IP address that represetns network hosts