Network engineer, you are presented

Assignment Help Computer Network Security
Reference no: EM13161747

first with the correct answer with details will recieve 5+ ratings plus recieve extra points in another page! 

  1. As the network engineer, you are asks to design an IP subnet plan that calls for 5 subnets, with the largest subnet needing a minimum of 5000 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    152.77.0.0/21

      b.

    152.77.0.0/17

      c.

    152.77.0.0/18

      d.

    152.77.0.0/19

Question 2

  1. You are asked to design a plan for an IP subnet that calls for 25 subnets, with the largest subnet needing a minimum of 750 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following lists a private IP network and mask that would meet the requirements?

      a.

    172.16.0.0 / 255.255.252.0

      b.

    172.16.0.0 / 255.255.224.0

      c.

    172.16.0.0 / 255.255.248.0

      d.

    172.16.0.0 / 255.255.192.0  

Question 3

  1. As the network engineer, you are asks to design an IP subnet plan that calls for 3 subnets, with the largest subnet needing a minimum of 52 hosts. Management requires that a single mask must be used throughout the Class C network. Which of the following is a private IP network and mask that would meet the requirements?

      a.

    192.168.0.0 / 255.255.255.192

      b.

    192.168.0.0 / 255.255.255.224

      c.

    192.168.0.0 / 255.255.255.248

      d.

    192.168.0.0 / 255.255.255.240  

Question 4

  1. . A fellow network engineer has asks you check his IP subnet plan that calls for 8 subnets, with the largest subnet needing a minimum of 4500 hosts. Management requires that a single mask must be uses throughout the Class B network. He has chosen the IP address of 150.150.0.0 with a mask of 255.255.240.0. How many subnets and host will this combination support?

      a.

    4 subnets and 1022 hosts

      b.

    8 subnets and 2046 hosts

      c.

    16 subnets and 4096 hosts

      d.

    14 subnets and 4094 hosts 

Question 5

  1. As the network engineer, you are asks to design an IP subnet plan that calls for 100 subnets, with the largest subnet needing a minimum of 350 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    177.133.0.0 / 255.255.252.0

      b.

    177.133.0.0 / 255.255.254.0

      c.

    177.133.0.0 / 255.255.248.0

      d.

    177.133.0.0 / 255.255.240.0

1 points   

Question 6

  1. As the network engineer, you are asked to design an IP subnet plan that calls for 250 subnets, with the largest subnet needing a minimum of 100 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    191.254.0.0 / 255.255.252.0

      b.

    191.254.0.0 / 255.255.248.0

      c.

    191.254.0.0 / 255.255.254.0

      d.

    191.254.0.0 / 255.255.255.0  

Question 7

  1. As the network engineer, you are asked to design an IP subnet plan that calls for 12 subnets, with the largest subnet needing a minimum of 12 hosts. Management requires that a single mask must be used throughout the Class C network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    216.122.44.0 /27

      b.

    216.122.44.0 /25

      c.

    216.122.44.0 /26

      d.

    216.122.44.0 /28 

Question 8

  1. You have a Class C 192.168.10.0/28 network. How many usable subnets and hosts do you have?

      a.

    62 subnets, 2 hosts

      b.

    30 subnets, 6 hosts

      c.

    14 subnets, 14 hosts

      d.

    16 subnets, 16 hosts  

Question 9

  1. As the network engineer, you are asks to design an IP subnet plan that calls for 50 subnets, with the largest subnet needing a minimum of 600 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is public IP network and mask that would meet the requirements?

      a.

    134.119.0.0 /23

      b.

    134.119.0.0 /22

      c.

    134.119.0.0 /21

      d.

    134.119.0.0 /20 

Question 10

  1. As the network engineer, you are asked to design an IP subnet plain that calls for 5 subnets, with the largest subnet needing 25 host. Management requires that a single mask must be uses throughout the Class C network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    192.177.4.0 / 255.255.255.248

      b.

    192.177.4.0 / 255.255.255.224

      c.

    192.177.4.0 /255.255.255.192

      d.

    192.177.4.0 / 255.255.255.240   

Question 11

  1. As the network engineer, you are given the following IP addressing, 172.16.8.159 / 255.255.255.192 information and are asked to identify the broadcast address?

      a.

    172.16.8.255

      b.

    172.16.255.255

      c.

    172.16.8.127

      d.

    172.16.8.191 

Question 12

  1. As the network engineer, you're shown the following IP addressing, 192.168.10.33 / 255.255.255.248 information and are asked to identify the broadcast address?

      a.

    192.168.10.39

      b.

    192.168.10.40

      c.

    192.168.10.255

      d.

    192.168.255.255  

Question 13

  1. Which of the following is the resident subnet for the IP address 192.168.10.33/29?

      a.

    192.168.10.32

      b.

    192.168.10.48

      c.

    192.168.10.40

      d.

    192.168.10.24  

Question 14

  1. Which of the following is the subnet broadcast address for the subnet in which IP address 200.10.5.68/28 resides?

      a.

    200.10.5.112

      b.

    200.10.5.31

      c.

    200.10.5.111

      d.

    200.10.5.47   

Question 15

  1. You are given the IP address 200.1.1.130 and the mask of 255.255.255.224, and are asked to identify the subnet number. Select the correct answer.

      a.

    200.1.1.160

      b.

    200.1.1.128

      c.

    200.1.1.192

      d.

    200.1.1.96 

Question 16

  1. If a host on a network has the address of 172.16.45.25/30, what is the subnet ID to which this host belongs to?

      a.

    172.16.45.28

      b.

    172.16.45.20

      c.

    172.16.45.16

      d.

    172.16.45.24   

Question 17

  1. As the network engineer, you are given the following subnet ID's; 172.32.64.0, 172.32.168.0, and 172.32.192.0 and are asked which of the following masks which could be applied to this network?

      a.

    255.255.128.0

      b.

    225.255.248.0

      c.

    255.255.224.0

      d.

    255.255.192.0   

Question 18

  1. As the network engineer, you are presented with the following, 172.16.0.0. / 18 IP addressing information and are asked to identify all of the possible subnet ID from the list below, assuming that the /18 subnet is used throughout the network. (Choose two)

      a.

    172.16.127.255

      b.

    172.16.192.0

      c.

    172.16.64.0

      d.

    172.16.64.0 

Question 19

  1. You have a 255.255.255.240 mask. Which two of the following are valid hosts IDs? (Choose two)

      a.

    192.168.10.112

      b.

    192.168.10.32

      c.

    192.168.10.210

      d.

    192.168.10.127

      e.

    192.168.10.94

Question 20

  1. Which of the following are valid subnets IDs for network 192.168.0.0; assuming mask 255.255.252.0 is used throughout network 192.168.0.0? (Choose two)

      a.

    192.168.2.0

      b.

    192.168.110.0

      c.

    192.168.2.0

      d.

    192.168.42.0

      e.

    192.168.42.0

Reference no: EM13161747

Questions Cloud

Company a has about 100 employees : Company A has about 100 employees spread over three locations in the same city, all linked by fast network connections. The IT/IS administration is centralized and includes the helpdesk.
Federal tax rates : The information above are federal tax rates but I don't understand what it means so I'm not sure how to solve the problem. What I did was sort into 4 intervals
Picky publishing house publishes stories : Picky Publishing House publishes stories in three categories and has strict require- ments for page counts in each category. Create an abstract class named Story that includes a story title, an author name, a number of pages, and a String message. In..
Application that includes three arrays : Design an application that includes three arrays of type int. Allow the user to enter values into the first two. Write a method to store the product of the two arrays in the third array
Network engineer, you are presented : As the network engineer, you are presented with the following, 172.16.0.0. / 18 IP addressing information and are asked to identify all of the possible subnet ID from the list below, assuming that the /18 subnet is used throughout the network. (Choos..
Assembly language program that generates and displays : Write a assembly language program that generates and displays 20 random strings, each consisting of ten letter(A-Z, a-z)s or number(0-9)s.
Cleint software so that it does not display : Rewrite the cleint software so that it does not display an echo of a message sent by the users. Maybe it means that each time a user tries to send a private message that same message is also sent back to them? summary: stop that from happening?
Problems does an assembler have to overcome : What problems does an assembler have to overcome in order to produce complete binary code with only one pass over the source code? How would code written for a one-pass assembler be different from code written for a two-pass assembler?
The hr department has sensitive information : The HR department has sensitive information that can only be viewed by members of the HR department and executive offices. Each location has computers and printers for use within the individual departments but that not to be used by employees from an..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Creating a switchboard design with control buttons

Construct a detail report that will display all courses in alphabetical order, with course name and instructor name in a group header; the Social Security number, name, and telephone number

  Question about program consistency

Please provide an example of a event where consistency has caused too many problems? Is there a program you have used in your own work environment where consistency has caused problems?

  Dos attackers use zombies to attack victims

Why do you think DoS attackers use zombies to attack victims instead of sending attack packets directly to victims? Come up with two reasons.

  The hr department has sensitive information

The HR department has sensitive information that can only be viewed by members of the HR department and executive offices. Each location has computers and printers for use within the individual departments but that not to be used by employees from an..

  Report of network security

Report of network security solutions around 3 to 4 pages . Example and reasons for evertything thats needed for the sercurity.

  Define physical secuirty and three types of threats

Define Physical secuirty and three types of threats related with physical security. Write down the steps in designing and choosing a secure site in detail.

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

  Describe network crimes related to dns entry alteration

Describe network crimes that are related to DNS entry alteration or bogus DNS servers. In a network investigation, some network administrators may be cooperative while others may not.

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  Academic method to project management

Sunnyville Corporation is in the business of selling home appliances. Sunnyville Corporation  has over 50 sales agents across the country. The management at Sunnyville Corporation has decided to implement an online sales program.

  An isp has received a block

An ISP has received a block of addresses in which the prefix length (n = 24). The ISP needs to make 8 sub-nets (sub-blocks) of equal sizes from this block. What is the prefix of each sub-block?

  What are the security issues of this

The majority of Australian SMEs are not taking advantage of cloud computing services, though uptake is strengthening among individuals, according to new research.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd