Network engineer, you are presented

Assignment Help Computer Network Security
Reference no: EM13161747

first with the correct answer with details will recieve 5+ ratings plus recieve extra points in another page! 

  1. As the network engineer, you are asks to design an IP subnet plan that calls for 5 subnets, with the largest subnet needing a minimum of 5000 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    152.77.0.0/21

      b.

    152.77.0.0/17

      c.

    152.77.0.0/18

      d.

    152.77.0.0/19

Question 2

  1. You are asked to design a plan for an IP subnet that calls for 25 subnets, with the largest subnet needing a minimum of 750 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following lists a private IP network and mask that would meet the requirements?

      a.

    172.16.0.0 / 255.255.252.0

      b.

    172.16.0.0 / 255.255.224.0

      c.

    172.16.0.0 / 255.255.248.0

      d.

    172.16.0.0 / 255.255.192.0  

Question 3

  1. As the network engineer, you are asks to design an IP subnet plan that calls for 3 subnets, with the largest subnet needing a minimum of 52 hosts. Management requires that a single mask must be used throughout the Class C network. Which of the following is a private IP network and mask that would meet the requirements?

      a.

    192.168.0.0 / 255.255.255.192

      b.

    192.168.0.0 / 255.255.255.224

      c.

    192.168.0.0 / 255.255.255.248

      d.

    192.168.0.0 / 255.255.255.240  

Question 4

  1. . A fellow network engineer has asks you check his IP subnet plan that calls for 8 subnets, with the largest subnet needing a minimum of 4500 hosts. Management requires that a single mask must be uses throughout the Class B network. He has chosen the IP address of 150.150.0.0 with a mask of 255.255.240.0. How many subnets and host will this combination support?

      a.

    4 subnets and 1022 hosts

      b.

    8 subnets and 2046 hosts

      c.

    16 subnets and 4096 hosts

      d.

    14 subnets and 4094 hosts 

Question 5

  1. As the network engineer, you are asks to design an IP subnet plan that calls for 100 subnets, with the largest subnet needing a minimum of 350 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    177.133.0.0 / 255.255.252.0

      b.

    177.133.0.0 / 255.255.254.0

      c.

    177.133.0.0 / 255.255.248.0

      d.

    177.133.0.0 / 255.255.240.0

1 points   

Question 6

  1. As the network engineer, you are asked to design an IP subnet plan that calls for 250 subnets, with the largest subnet needing a minimum of 100 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    191.254.0.0 / 255.255.252.0

      b.

    191.254.0.0 / 255.255.248.0

      c.

    191.254.0.0 / 255.255.254.0

      d.

    191.254.0.0 / 255.255.255.0  

Question 7

  1. As the network engineer, you are asked to design an IP subnet plan that calls for 12 subnets, with the largest subnet needing a minimum of 12 hosts. Management requires that a single mask must be used throughout the Class C network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    216.122.44.0 /27

      b.

    216.122.44.0 /25

      c.

    216.122.44.0 /26

      d.

    216.122.44.0 /28 

Question 8

  1. You have a Class C 192.168.10.0/28 network. How many usable subnets and hosts do you have?

      a.

    62 subnets, 2 hosts

      b.

    30 subnets, 6 hosts

      c.

    14 subnets, 14 hosts

      d.

    16 subnets, 16 hosts  

Question 9

  1. As the network engineer, you are asks to design an IP subnet plan that calls for 50 subnets, with the largest subnet needing a minimum of 600 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is public IP network and mask that would meet the requirements?

      a.

    134.119.0.0 /23

      b.

    134.119.0.0 /22

      c.

    134.119.0.0 /21

      d.

    134.119.0.0 /20 

Question 10

  1. As the network engineer, you are asked to design an IP subnet plain that calls for 5 subnets, with the largest subnet needing 25 host. Management requires that a single mask must be uses throughout the Class C network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    192.177.4.0 / 255.255.255.248

      b.

    192.177.4.0 / 255.255.255.224

      c.

    192.177.4.0 /255.255.255.192

      d.

    192.177.4.0 / 255.255.255.240   

Question 11

  1. As the network engineer, you are given the following IP addressing, 172.16.8.159 / 255.255.255.192 information and are asked to identify the broadcast address?

      a.

    172.16.8.255

      b.

    172.16.255.255

      c.

    172.16.8.127

      d.

    172.16.8.191 

Question 12

  1. As the network engineer, you're shown the following IP addressing, 192.168.10.33 / 255.255.255.248 information and are asked to identify the broadcast address?

      a.

    192.168.10.39

      b.

    192.168.10.40

      c.

    192.168.10.255

      d.

    192.168.255.255  

Question 13

  1. Which of the following is the resident subnet for the IP address 192.168.10.33/29?

      a.

    192.168.10.32

      b.

    192.168.10.48

      c.

    192.168.10.40

      d.

    192.168.10.24  

Question 14

  1. Which of the following is the subnet broadcast address for the subnet in which IP address 200.10.5.68/28 resides?

      a.

    200.10.5.112

      b.

    200.10.5.31

      c.

    200.10.5.111

      d.

    200.10.5.47   

Question 15

  1. You are given the IP address 200.1.1.130 and the mask of 255.255.255.224, and are asked to identify the subnet number. Select the correct answer.

      a.

    200.1.1.160

      b.

    200.1.1.128

      c.

    200.1.1.192

      d.

    200.1.1.96 

Question 16

  1. If a host on a network has the address of 172.16.45.25/30, what is the subnet ID to which this host belongs to?

      a.

    172.16.45.28

      b.

    172.16.45.20

      c.

    172.16.45.16

      d.

    172.16.45.24   

Question 17

  1. As the network engineer, you are given the following subnet ID's; 172.32.64.0, 172.32.168.0, and 172.32.192.0 and are asked which of the following masks which could be applied to this network?

      a.

    255.255.128.0

      b.

    225.255.248.0

      c.

    255.255.224.0

      d.

    255.255.192.0   

Question 18

  1. As the network engineer, you are presented with the following, 172.16.0.0. / 18 IP addressing information and are asked to identify all of the possible subnet ID from the list below, assuming that the /18 subnet is used throughout the network. (Choose two)

      a.

    172.16.127.255

      b.

    172.16.192.0

      c.

    172.16.64.0

      d.

    172.16.64.0 

Question 19

  1. You have a 255.255.255.240 mask. Which two of the following are valid hosts IDs? (Choose two)

      a.

    192.168.10.112

      b.

    192.168.10.32

      c.

    192.168.10.210

      d.

    192.168.10.127

      e.

    192.168.10.94

Question 20

  1. Which of the following are valid subnets IDs for network 192.168.0.0; assuming mask 255.255.252.0 is used throughout network 192.168.0.0? (Choose two)

      a.

    192.168.2.0

      b.

    192.168.110.0

      c.

    192.168.2.0

      d.

    192.168.42.0

      e.

    192.168.42.0

Reference no: EM13161747

Questions Cloud

Company a has about 100 employees : Company A has about 100 employees spread over three locations in the same city, all linked by fast network connections. The IT/IS administration is centralized and includes the helpdesk.
Federal tax rates : The information above are federal tax rates but I don't understand what it means so I'm not sure how to solve the problem. What I did was sort into 4 intervals
Picky publishing house publishes stories : Picky Publishing House publishes stories in three categories and has strict require- ments for page counts in each category. Create an abstract class named Story that includes a story title, an author name, a number of pages, and a String message. In..
Application that includes three arrays : Design an application that includes three arrays of type int. Allow the user to enter values into the first two. Write a method to store the product of the two arrays in the third array
Network engineer, you are presented : As the network engineer, you are presented with the following, 172.16.0.0. / 18 IP addressing information and are asked to identify all of the possible subnet ID from the list below, assuming that the /18 subnet is used throughout the network. (Choos..
Assembly language program that generates and displays : Write a assembly language program that generates and displays 20 random strings, each consisting of ten letter(A-Z, a-z)s or number(0-9)s.
Cleint software so that it does not display : Rewrite the cleint software so that it does not display an echo of a message sent by the users. Maybe it means that each time a user tries to send a private message that same message is also sent back to them? summary: stop that from happening?
Problems does an assembler have to overcome : What problems does an assembler have to overcome in order to produce complete binary code with only one pass over the source code? How would code written for a one-pass assembler be different from code written for a two-pass assembler?
The hr department has sensitive information : The HR department has sensitive information that can only be viewed by members of the HR department and executive offices. Each location has computers and printers for use within the individual departments but that not to be used by employees from an..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

  Importance of presentation and content in presentation

There has been a discussion for years on which is more important, content or presentation. This is very important when thinking about creating a PowerPoint slideshow.

  Illustrate three security services-confidentiality-integrity

Illustrate that three security services: Confidentiality, Integrity, and Availability are enough to deal with threats of: (a) Disclosure, (b) Disruption, (c) Deception (deceive = to cause to accept as true.

  Type of security problems computer services encounter

Students would enter the room, pick up their jobs, and leave. What kinds of security problems might computer services encounter with a system such as this?

  Targets of security breaches can be larger-smaller companies

Study three recent information security breaches. Do the key targets appear to be larger or smaller companies? Is there particular industry which appears predominately targeted?

  Increment value in one cell in excel

Discuss how to increment value in one cell in Excel if another cell is populated. or example, I have cell A that has values such as 1, 2, 3, 4 etc...

  Determine primary security risk that users must acknowledge

Based on the article by Lenning (2005), determine a primary security risk that users must acknowledge when using macros? Why is it significant to educate users of these risks once their dilemma is resolved?

  Estimating resources with the budget

Managing a project and I have an $850,000 budget. For the project, the resources include 4-developers and on project manager. A suppose that the average workweek per person is forty hours

  Technical versus soft skills

Suppose that there is some consensus with basic premise that most skills can be learnt, which would you expect to be the more productive task,

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Research and report recent information security incident

Do some research and report a recent information security incident. How could this incident have been avoided? What management challenges did this incident present?

  Concept of subletting in v6

small package routing is more efficient in IPV6 than in IPV4, increase the hacking factor, network security model (NSM), ACL, VLAN, war dialing

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd