As the network engineer, you are presented with the following 172.16.0.0/18 IP addressing information. Identify all the possible subnet IDs from the list below, assuming that the /18 subnet is used throughout the network

A) 172.16.127.255
B) 172.16.192.0
C) 172.16.64.0
D) 172.16.191.255

B, C
Explanation: B) The /18, or 255.255.192.0, mask provides 16 network bits, 2 subnet bits, and 14 host bits; this allows for a total of four different subnet possibilities, including 172.16.0.0, 172.16.64.0, 172.16.128.0, and 172.16.192.0.
C) The /18, or 255.255.192.0, mask provides 16 network bits, 2 subnet bits, and 14 host bits; this allows for a total of four different subnet possibilities, including 172.16.0.0, 172.16.64.0, 172.16.128.0, and 172.16.192.0.

Computer Science & Information Technology

You might also like to view...

A Windows folder has been shared to Joe. Joe has been assigned the Full Control NTFS permission. Joe is part of a group called Staff, and the Staff users have been assigned the Modify NTFS permission to the same folder. What can Joe do to the files located in the shared folder?

A) Joe can do anything he wants. B) He can look at the files, read the files, and change the files, but he cannot delete any subfolders. C) Joe can look at the files in the shared folder. D) He can look at the files, but he cannot change or delete the files or create any new ones.

Computer Science & Information Technology

To encourage your audience's eyes to stop at the end of a line, you should avoid _________________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology