Network engineer, you are presented

Assignment Help Computer Network Security
Reference no: EM13161747

first with the correct answer with details will recieve 5+ ratings plus recieve extra points in another page! 

  1. As the network engineer, you are asks to design an IP subnet plan that calls for 5 subnets, with the largest subnet needing a minimum of 5000 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    152.77.0.0/21

      b.

    152.77.0.0/17

      c.

    152.77.0.0/18

      d.

    152.77.0.0/19

Question 2

  1. You are asked to design a plan for an IP subnet that calls for 25 subnets, with the largest subnet needing a minimum of 750 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following lists a private IP network and mask that would meet the requirements?

      a.

    172.16.0.0 / 255.255.252.0

      b.

    172.16.0.0 / 255.255.224.0

      c.

    172.16.0.0 / 255.255.248.0

      d.

    172.16.0.0 / 255.255.192.0  

Question 3

  1. As the network engineer, you are asks to design an IP subnet plan that calls for 3 subnets, with the largest subnet needing a minimum of 52 hosts. Management requires that a single mask must be used throughout the Class C network. Which of the following is a private IP network and mask that would meet the requirements?

      a.

    192.168.0.0 / 255.255.255.192

      b.

    192.168.0.0 / 255.255.255.224

      c.

    192.168.0.0 / 255.255.255.248

      d.

    192.168.0.0 / 255.255.255.240  

Question 4

  1. . A fellow network engineer has asks you check his IP subnet plan that calls for 8 subnets, with the largest subnet needing a minimum of 4500 hosts. Management requires that a single mask must be uses throughout the Class B network. He has chosen the IP address of 150.150.0.0 with a mask of 255.255.240.0. How many subnets and host will this combination support?

      a.

    4 subnets and 1022 hosts

      b.

    8 subnets and 2046 hosts

      c.

    16 subnets and 4096 hosts

      d.

    14 subnets and 4094 hosts 

Question 5

  1. As the network engineer, you are asks to design an IP subnet plan that calls for 100 subnets, with the largest subnet needing a minimum of 350 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    177.133.0.0 / 255.255.252.0

      b.

    177.133.0.0 / 255.255.254.0

      c.

    177.133.0.0 / 255.255.248.0

      d.

    177.133.0.0 / 255.255.240.0

1 points   

Question 6

  1. As the network engineer, you are asked to design an IP subnet plan that calls for 250 subnets, with the largest subnet needing a minimum of 100 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    191.254.0.0 / 255.255.252.0

      b.

    191.254.0.0 / 255.255.248.0

      c.

    191.254.0.0 / 255.255.254.0

      d.

    191.254.0.0 / 255.255.255.0  

Question 7

  1. As the network engineer, you are asked to design an IP subnet plan that calls for 12 subnets, with the largest subnet needing a minimum of 12 hosts. Management requires that a single mask must be used throughout the Class C network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    216.122.44.0 /27

      b.

    216.122.44.0 /25

      c.

    216.122.44.0 /26

      d.

    216.122.44.0 /28 

Question 8

  1. You have a Class C 192.168.10.0/28 network. How many usable subnets and hosts do you have?

      a.

    62 subnets, 2 hosts

      b.

    30 subnets, 6 hosts

      c.

    14 subnets, 14 hosts

      d.

    16 subnets, 16 hosts  

Question 9

  1. As the network engineer, you are asks to design an IP subnet plan that calls for 50 subnets, with the largest subnet needing a minimum of 600 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is public IP network and mask that would meet the requirements?

      a.

    134.119.0.0 /23

      b.

    134.119.0.0 /22

      c.

    134.119.0.0 /21

      d.

    134.119.0.0 /20 

Question 10

  1. As the network engineer, you are asked to design an IP subnet plain that calls for 5 subnets, with the largest subnet needing 25 host. Management requires that a single mask must be uses throughout the Class C network. Which of the following is a public IP network and mask that would meet the requirements?

      a.

    192.177.4.0 / 255.255.255.248

      b.

    192.177.4.0 / 255.255.255.224

      c.

    192.177.4.0 /255.255.255.192

      d.

    192.177.4.0 / 255.255.255.240   

Question 11

  1. As the network engineer, you are given the following IP addressing, 172.16.8.159 / 255.255.255.192 information and are asked to identify the broadcast address?

      a.

    172.16.8.255

      b.

    172.16.255.255

      c.

    172.16.8.127

      d.

    172.16.8.191 

Question 12

  1. As the network engineer, you're shown the following IP addressing, 192.168.10.33 / 255.255.255.248 information and are asked to identify the broadcast address?

      a.

    192.168.10.39

      b.

    192.168.10.40

      c.

    192.168.10.255

      d.

    192.168.255.255  

Question 13

  1. Which of the following is the resident subnet for the IP address 192.168.10.33/29?

      a.

    192.168.10.32

      b.

    192.168.10.48

      c.

    192.168.10.40

      d.

    192.168.10.24  

Question 14

  1. Which of the following is the subnet broadcast address for the subnet in which IP address 200.10.5.68/28 resides?

      a.

    200.10.5.112

      b.

    200.10.5.31

      c.

    200.10.5.111

      d.

    200.10.5.47   

Question 15

  1. You are given the IP address 200.1.1.130 and the mask of 255.255.255.224, and are asked to identify the subnet number. Select the correct answer.

      a.

    200.1.1.160

      b.

    200.1.1.128

      c.

    200.1.1.192

      d.

    200.1.1.96 

Question 16

  1. If a host on a network has the address of 172.16.45.25/30, what is the subnet ID to which this host belongs to?

      a.

    172.16.45.28

      b.

    172.16.45.20

      c.

    172.16.45.16

      d.

    172.16.45.24   

Question 17

  1. As the network engineer, you are given the following subnet ID's; 172.32.64.0, 172.32.168.0, and 172.32.192.0 and are asked which of the following masks which could be applied to this network?

      a.

    255.255.128.0

      b.

    225.255.248.0

      c.

    255.255.224.0

      d.

    255.255.192.0   

Question 18

  1. As the network engineer, you are presented with the following, 172.16.0.0. / 18 IP addressing information and are asked to identify all of the possible subnet ID from the list below, assuming that the /18 subnet is used throughout the network. (Choose two)

      a.

    172.16.127.255

      b.

    172.16.192.0

      c.

    172.16.64.0

      d.

    172.16.64.0 

Question 19

  1. You have a 255.255.255.240 mask. Which two of the following are valid hosts IDs? (Choose two)

      a.

    192.168.10.112

      b.

    192.168.10.32

      c.

    192.168.10.210

      d.

    192.168.10.127

      e.

    192.168.10.94

Question 20

  1. Which of the following are valid subnets IDs for network 192.168.0.0; assuming mask 255.255.252.0 is used throughout network 192.168.0.0? (Choose two)

      a.

    192.168.2.0

      b.

    192.168.110.0

      c.

    192.168.2.0

      d.

    192.168.42.0

      e.

    192.168.42.0

Reference no: EM13161747

Questions Cloud

Company a has about 100 employees : Company A has about 100 employees spread over three locations in the same city, all linked by fast network connections. The IT/IS administration is centralized and includes the helpdesk.
Federal tax rates : The information above are federal tax rates but I don't understand what it means so I'm not sure how to solve the problem. What I did was sort into 4 intervals
Picky publishing house publishes stories : Picky Publishing House publishes stories in three categories and has strict require- ments for page counts in each category. Create an abstract class named Story that includes a story title, an author name, a number of pages, and a String message. In..
Application that includes three arrays : Design an application that includes three arrays of type int. Allow the user to enter values into the first two. Write a method to store the product of the two arrays in the third array
Network engineer, you are presented : As the network engineer, you are presented with the following, 172.16.0.0. / 18 IP addressing information and are asked to identify all of the possible subnet ID from the list below, assuming that the /18 subnet is used throughout the network. (Choos..
Assembly language program that generates and displays : Write a assembly language program that generates and displays 20 random strings, each consisting of ten letter(A-Z, a-z)s or number(0-9)s.
Cleint software so that it does not display : Rewrite the cleint software so that it does not display an echo of a message sent by the users. Maybe it means that each time a user tries to send a private message that same message is also sent back to them? summary: stop that from happening?
Problems does an assembler have to overcome : What problems does an assembler have to overcome in order to produce complete binary code with only one pass over the source code? How would code written for a one-pass assembler be different from code written for a two-pass assembler?
The hr department has sensitive information : The HR department has sensitive information that can only be viewed by members of the HR department and executive offices. Each location has computers and printers for use within the individual departments but that not to be used by employees from an..

Reviews

Write a Review

Computer Network Security Questions & Answers

  How to protect communications by eavesdropper

Assume that evil Charlie eavesdropped on Bob's message to server. How can he with the help of his equally evil buddy Don, extract key K that Alice and Bob are using to protect their communications?

  Find at least four sites that offer malware listings

Search a number of antivirus companies websites and find at least four sites that offer malware listings and compare their latest malware lists

  Write vulnerabilities and methods of securing rpc

TCO C states "Given a computer network for data transmission, identify and analyze possibilities for loss or modification of data. Write down the vulnerabilities of RPC? What are the present methods of securing RPC?

  Compute value of shared secret key

You have secretly picked value SA = 17. You begin session by sending Bob your computed value of TA. Bob responds by sending you value TB = 291. What is the value of your shared secret key?

  Describe options for improving the ftp environment

Write a 1-2 page document that describes the options for improving the FTP environment described. Make a recommendation for a single solution for the FTP environment.

  How rtsp vary from http in keeping client state information

How does RTSP differ from HTTP (a) in maintaining client state information; (b) in terms of in-band, out-of-band traffic?

  Prepare a graph of the storage requirements

Prepare a graph of the storage requirements for the project.

  Understanding project priorities and scheduling issues

hat general suggestions would you give for helping to promote common understanding of project priorities and critical scheduling issues,

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Expected time to find user passwords by dictionary attack

Suppose that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd