Home

What is the default subnet mask for a class A network?

A. 255.0.0.0

B. 255.224.0.0

C. 255.255.0.0

D. 255.255.255.0

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. ADSL uses high-speed Internet service phone lines
  2. Which function is not supported by E-mail?
  3. Which of the following is the IEEE specification for wireless networks?
  4. TCP protocol is responsible for logical addressing and delivery of packets.
  5. Which cable type is immune to outside interference and crosstalk?
  6. Which of these is a feature of hubs?
  7. Which of the following pieces of equipment will receive a packet from one port and forward that packet…
  8. Which of the following can provide a backbone network of 600 meters in length without using repeaters?
  9. Which of the following IEEE specifications uses CSMA/CD?
  10. Which class of IP addressing was not brought in much use?
  11. AppleTalk protocol configures hosts in zones on the network.
  12. Which of the following filed represents the sender of the message in an electronic mail?
  13. Which of the following is currently a de facto standard, commonly used for point-to-point serial connections…
  14. Following are the advantages of tree topologyi) Point-to-point wiring for individual segments.ii) Supported…
  15. ARP is defined in RFC _____ and it is a current internet standard, ________
  16. FDDI operates on 100 Mbps.
  17. If user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key…
  18. Router B receives an update from router A that indicates Net1 is two hops away. The next update from…
  19. Which of the following address supports 254 hosts on each of 2 million networks?
  20. When collection of various computers seems a single coherent system to its client, then it is called…
  21. You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured…
  22. In the IP address 129.2.8.9, what does 129.2 specify?
  23. In ________ routing, the tunnel creates a bridge through areas that do not support multicast traffic.
  24. What is the distance limitation of Cat5 UTP?
  25. Which is the port used by HTTPS?
  26. In flags message attribute, which of the following flag indicates that message has been completed?
  27. You are browsing www.microsoft.com on a machine named host.contoso.org.. What is the order of domain…
  28. ________acts as source and destination for IP traffic.
  29. Which of the following is required to communicate between two computers?
  30. Which of the following can provide a backbone network of 600 meters in length without using repeaters?