What are benefits of using subnets on LAN

Assignment Help Computer Networking
Reference no: EM133248698

1. What are the benefits of using subnets on a LAN.

a. They reduce the size of Layer 3 broadcast domains

b. They help in organizing and segmenting our networks

c. They increase intra-LAN security (via segmentation)

d. All of the above

2. DHCP provides the following benefits:

a. Mitigates human error

b. Reduction of TCP/IP traffic

c. Automates IPv4 address assignment

d. Centralizes IPv4 management

3. An IPv4 address is normally divided into these two portions.

a. Network

b. Manufacturer ID

c. Host

d. Unique ID

4. How do you write out CIDR /14 in dotted decimal (x.x.x.x)

a. 255.252.0.0

b. 255.192.0.0

c. 255.255.0.0

d. 255.248.0.0

5. When we create Classless Subnets, we add this third portion to our IPv4 Address.

a. Network

b. Secondary Host

c. Subnet

d. Host

6. How is CIDR /21 written in binary (format xxxxxxxx.xxxxxxxx.xxxxxxxxx.xxxxxxxx)

a. 11111111.00000000.00000000.00000000

b. 11111111.11111111.11000000.00000000

c. 11111111.11111111.11111000.00000000

d. 11111111.11111111.11111110.00000000

Reference no: EM133248698

Questions Cloud

Explain the importance of netiquette : Explain the importance of netiquette. Explain any situations you have encountered in which you or another person did not follow the rules of netiquette.
What is the primary concern with kasym cultural background : Cultural Background Influencing Individual Development Discussion - What is the primary concern with Kasym's cultural background and his clinical symptoms
Implementation of Wireless Campus Area Network : Implementation of a Wireless Campus Area Network covering an area of 160 acres.
Establish Python program : A provider needs a tool for allocating IP addresses to its customers. Provider has a pool of Class B network addresses. establish a Python program
What are benefits of using subnets on LAN : What are the benefits of using subnets on a LAN. DHCP provides the following benefits. An IPv4 address is normally divided into these two portions.
Different geographical areas : Which of the following connection methods can be used to connect a company's offices which are located in different geographical areas?
Differences between the rule of law and rule of cyberspace : What are some specific differences between the Rule of Law and the Rule of Cyberspace? Identify ways both codes developed and how the compliment each other
Discuss the two most interesting aspects of ethics training : Discuss the two most interesting aspects of ethics training. Using what you have learned from our ethical decision-making material this week
Was your company prepared for these challenges : Was your company prepared for these challenges? How was this decision communicated to the employees? What could have been improved within this process

Reviews

Write a Review

Computer Networking Questions & Answers

  Research the elements of a multilayered security plan

You need to research the elements of a multilayered security plan and to create a detailed outline. Your outline should indicate one or more general security solutions for each of the seven domains of a typical IT infrastructure.

  Upload a network diagram

If you prefer to create your own topology, upload a network diagram and explain to the class why you chose to design the network that way.

  Create a cost analysis and develop proposal for the company

This assignment contains two (2) Sections: Network Consultation Proposal and Network Consultation Presentation. You must submit both sections as separate files in order to complete this assignment. Create a cost analysis, and develop a proposal for..

  Describe how the protocols dns dhcp ftp and smtp work and

discuss how the protocols dns dhcp ftp and smtp work and discuss their function on a network. explain with examples if

  Identify types of network cables and connectors

Identify types of network cables and connectors. Categorize characteristics of connectors and cabling. Explain properties and characteristics of TCP/IP. Explain common TCP and UDP ports, protocols, and their purpose.

  Organization security plan

Identify threats and vulnerabilities.

  ICTNWK518 - Design an Enterprise Wireless Local Area Network

ICTNWK518 - Design an Enterprise Wireless Local Area Network Assignment Help and Solution - Abbey College Australia - Assessment Writing Service

  Modify the network in the given figure

Assume that T = 0.5 and Nodes 1 and 2 are initially on. Verify that if Node 2 is initially on and T = 0.5 that all nodes will eventually turn on.

  Determine interface addresses

ITNE2003 Install, configure, operate, and troubleshoot medium-size networks - Create an efficient VLSM design given requirements

  Data transmission protocol

A certain data transmission protocol the parity error detection concept is used. what does this mean?

  Applications of bitcoin

Cryptocurrency giants-Ethereum and Bitcoin - thereum need to be analysed in depth by discussing the overall contribution, scope and limitations of each research

  Evaluation of 5g network and the security

MN603 - Wireless Networks and Security - Compare standards-based technologies used in various networks and Test and evaluate various wireless networks

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd