What is the correct subnet mask for the network

Assignment Help Computer Networking
Reference no: EM13948011

Your company is assigned the network address 150.50.0.0. You need to create seven subnets on the network. A router on one of the subnets will connect the network to the Internet. All computers on the network will need access to the Internet. What is the correct subnet mask for the network?

a. 0.0.0.0

b. 255.255.0.0

c. 255.255.240.0

d. The subnet mask assigned by InterNIC

A company with the network ID 209.168.19.0 occupies four floors of a building. You create a subnet for each floor. You want to allow for the largest possible number of host IDs on each subnet. Which subnet mask should you choose?

a. 255.255.255.192

b. 255.255.255.240

c. 255.255.255.224

d. 255.255.255.248

Several users are complaining that they cannot access one of your Windows NT file servers, which has an IP address that is accessible from the Internet. When you get paged, you are not in the server room. Instead you are at another company in a friend's office that only has a UNIX workstation available, which also has Internet access. What can you do to see if the file server is still functioning on the network?

a. Use PING from the UNIX workstation.

b. Use ARP from the UNIX workstation.

c. Use WINS from the UNIX workstation.

d. Use DNS from the UNIX workstation.

At one of your company's remote locations, you have decided to segment your class B address down, since the location has three buildings and each building contains no more than 175 unique hosts. You want to make each building its own subnet, and you want to utilize your address space the best way possible. Which subnet mask meets your needs in this situation?

a. 255.0.0.0

b. 255.255.255.0

c. 255.255.0.0

d. 255.255.255.240

Reference no: EM13948011

Questions Cloud

Calculate the modulus of elasticity of the aluminum : 1. An aluminum bar 125 mm (5.0 in.) long and having a square cross section 16.5 mm (0.65 in.) on an edge is pulled in tension with a load of  66,700  N  (15,000  lbf), and  experiences  an elongation  of  0.43  mm  (1.7 X 10-2   in.). As- suming t..
Exists to demonstrate that southwest manages : Review the case of Southwest (noted at the end of the textbook, p. 574). What evidence exists to demonstrate that Southwest manages their employees fairly and legally?
Derive quantization formula based upon variance of sinewave : Derive the quantization formula based upon the variance of a sinewave and the variance of distortion due to quantization. SDR = 6(A/Δ)2
Previous session building a cumulative : The length of each session's submission typically runs 3 pages resulting in a 25-30 HRM/Career Development project by the end of the course. Each session is added onto the previous session building a cumulative HRM/Career Development project.
What is the correct subnet mask for the network : At one of your company's remote locations, you have decided to segment your class B address down, since the location has three buildings and each building contains no more than 175 unique hosts. You want to make each building its own subnet, and y..
Paper - gender differences in infancy and childhood : Choose one of the following topics and write a 1,050 -word paper summarizing the current professional literature on the topic. Resiliency in children, Gender differences in infancy and childhood, Effects of day care and Attachment styles
Borrowing from friends and family : Discuss the pros and cons of borrowing from friends and family for your business venture. Be sure to detail some of the complications of borrowing from "family" as opposed to traditional lending sources such as banks and credit unions.
Calculate the environmental cost per pound of fertilizer : Calculate the environmental cost per pound of fertilizer for each product. Based on the calculations in Requirement 1, which product appears to be the most environmentally harmful?
Distinguish between unpooled variance and pooled variance : Distinguish between unpooled variance and pooled variance. What are the assumptions of each? How do you determine which is appropriate?

Reviews

Write a Review

Computer Networking Questions & Answers

  Write about the security threats and vulnerabliities

The topic is Security Threats and Vulnerabliities write about the latest developments and issues.

  The framing methods in slides

The sender program accepts two user inputs: the first input represents the selection of which framing method and the second one is the original data to transmit.

  Security infrastructure and protocolsapki and pgp are two

security infrastructure and protocolsapki and pgp are two methods for generating and managing public keys for use in

  Network administrators

Do you think that most network administrators understand and use both distance-vector and link-state protocols? Why?

  Hes vlan and firewall combination assist you in

you are the senior network architect for a large corporation. the company has offices in l.a. new york and miami. the

  Integer a column that uses the cast function to return

The List Price column A column that uses the CAST function to return the List Price column with 1 digit to the right of the decimal point A column that uses the CONVERT function to return the List Price column as an integer A column that uses the ..

  Create a plan with the necessary steps

For each potential cause of network failure, create a plan with the necessary steps and required hardware to reduce the risk of failure. Include the cost and benefit comparison for each risk reduction plan to justify the plan.

  Brief details of the school chosen including its floor plan

Introduction that will include the brief details of the school chosen including its floor plan to cater for its ICT requirements, its ICT requirements emphasizing the networking and data communications, and the challenges for the solution(s).

  Evluate the challenges e-business and e-commerce

assess the challenges e-business and e-commerce technologies present to the field of information technology. describe

  How rdp file includes settings you configured in client

How can you tell from this experience that the RDP file includes the settings you configured in the client before you created the RDP file?

  What factors might an organization consider when selecting

what factors might an organization consider when choosing to implement an ad-integrated dns zone versus a traditional

  How do you know that the information is secure from phishing

Computer system provides protection using the Bell-La Padula policy. How would a virus spread and how do you know that the information you type in is secure from phishing?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd