Primary Menu

MENUMENU
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
    • PCAP – Programming Essentials in Python
  • About
    • Contact Us
    • Privacy Policy

ICT Community

ICT Career Preparation

.

Menu

MENUMENU
  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
      • CCNA Security v2
    • CCNA CyberOps 1.1 (Level 3)
  • Security
  • CCNA PT Lab 2022

Passed 100% !!! We are expert in ICT training & examination. We have just updated question in March, 2022.

If a network device has a mask of /28, how many IP addresses are available for hosts on this network?

Posted on January 14, 2019 by Admin

Last Updated on January 14, 2019 by Admin

If a network device has a mask of /28, how many IP addresses are available for hosts on this network?

  • 256
  • 254
  • 62
  • 32
  • 16
  • 14
    Explanation:

    A /28 mask is the same as 255.255.255.240. This leaves 4 host bits. With 4 host bits, 16 IP addresses are possible, but one address represents the subnet number and one address represents the broadcast address. 14 addresses can then be used to assign to network devices.

For All Questions: CCNA1 ITN Chapter 8 Exam Answers 2019

Categories: Uncategorized

« Refer to the exhibit. The network administrator has assigned the LAN of LBMISS an address range of 192.168.10.0. This address range has been subnetted using a /29 prefix. In order to accommodate a new building, the technician has decided to use the fifth subnet for configuring the new network (subnet zero is the first subnet). By company policies, the router interface is always assigned the first usable host address and the workgroup server is given the last usable host address. Which configuration should be entered into the properties of the workgroup server to allow connectivity to the Internet?
Which subnet mask would be used if 5 host bits are available? »
  • CCNA1 v7
  • CCNA2 v7
  • CCNA3 v7

System Test Exam Answers

Modules 1 – 3 Exam Answers

Modules 4 – 7 Exam Answers

Modules 8 – 10 Exam Answers

Modules 11 – 13 Exam Answers

Modules 14 – 15 Exam Answers

Modules 16 – 17 Exam Answers

Practice Final – ITN Answers

Course Feedback

ITN Practice PT Skills Assessment (PTSA)

Final Exam Answers

Modules 1 – 4 Exam Answers

Modules 5 – 6 Exam Answers

Modules 7 – 9 Exam Answers

Modules 10 – 13 Exam Answers

Modules 14 – 16 Exam Answers

ITN Practice Skills Assessment – PT Answers

SRWE Practice Skills Assessment – PT Part 1 Answers

SRWE Practice Skills Assessment – PT Part 2 Answers

SRWE Hands On Skills Exam Answers

SRWE Practice Final Exam Answers

SRWE Final Exam Answers 

Modules 1 – 2 Exam Answers

Modules 3 – 5 Exam Answers

Modules 6 – 8 Exam Answers

Modules 9 – 12 Exam Answers

Modules 13 – 14 Exam Answers

ITN Practice PT Skills Assessment (PTSA) Answers

SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers

SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers

ENSA Practice PT Skills Assessment (PTSA) Answers

ENSA Hands On Skills Exam Answers

Practice Final – ENSA Answers

ENSA Final Exam Answers

CCNA Certification Practice Exam Answers

Recent Posts

  • Which of the following, using public key cryptography, ensures authentication, confidentiality and nonrepudiation of a message?
  • The PRIMARY reason for classifying assets is to:
  • The MAIN goal of an information security strategic plan is to:
  • Which of the following is a key area of the ISO 27001 framework?
  • Which of the following would be the BEST metric for the IT risk management process?
February 2023
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728  
« Dec    
  • Home
  • ITE
  • CCNA1
  • CCNA2
  • CCNA3
  • CCNA4
Copyright CCNA7 © 2023