Full Transcript

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe? configuration environmental electrical maintenance Explanation: The four classes of threats are as follows: Hardware threats - physical damag...

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat does this situation describe? configuration environmental electrical maintenance Explanation: The four classes of threats are as follows: Hardware threats - physical damage to servers, routers, switches, cabling plant, and workstations Environmental threats - temperature extremes (too hot or too cold) or humidity extremes (too wet or too dry) Electrical threats - voltage spikes, insufficient supply voltage (brownouts), unconditioned power (noise), and total power loss Maintenance threats - poor handling of key electrical components (electrostatic discharge), lack of critical spare parts, poor cabling, and poor labeling Which type of network threat is intended to prevent authorized users from accessing resources? DoS attacks access attacks reconnaissance attacks trust exploitation Explanation: Network reconnaissance attacks involve the unauthorized discovery and mapping of the network and network systems. Access attacks and trust exploitation involve unauthorized manipulation of data and access to systems or user privileges. DoS, or Denial of Service attacks, are intended to prevent legitimate users and devices from accessing network resources. What service defines the protocols and technologies that implement the transmission of voice packets over an IP network? VoIP NAT DHCP QoS A network administrator checks the security log and notices there was unauthorized access to an internal file server over the weekend. Upon further investigation of the file system log, the administrator notices several important documents were copied to a host located outside of the company. What kind of threat is represented in this scenario? data loss identity theft information theft disruption of service Which protocol is used by a client to communicate securely with a web server? SMTP SMB IMAP HTTPS Explanation: HTTPS is a secure form of HTTP used to access web content hosted by a web server. Which two tasks are functions of the presentation layer? (Choose two.) compression addressing encryption session control authentication Which device should be used for enabling a host to communicate with another host on a different network? Switch Hub Router Host A host device needs to send a large video file across the network while providing data communication to other users. Which feature will allow different communication streams to occur at the same time, without having a single data stream using all available bandwidth? window size multiplexing port numbers acknowledgments Explanation: Multiplexing is useful for interleaving multiple communication streams. Window size is used to slow down the rate of data communication. Port numbers are used to pass data streams to their proper applications. Acknowledgments are used to notify a sending device that a stream of data packets has or has not been received What information is used by TCP to reassemble and reorder received segments? port numbers sequence numbers acknowledgment numbers fragment numbers Explanation: At the transport layer, TCP uses the sequence numbers in the header of each TCP segment to reassemble the segments into the correct order. Given the binary address of 11101100 00010001 00001100 00001010, which address does this represent in dotted decimal format? 234.17.10.9 234.16.12.10 236.17.12.6 236.17.12.10 Explanation: The binary number 11101100 00010001 00001100 00001010 translates to 236.17.12.10. How many host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0? 5100++- 512 1022 1024 2046 2048 Explanation: A mask of 255.255.252.0 is equal to a prefix of /22. A /22 prefix provides 22 bits for the network portion and leaves 10 bits for the host portion. The 10 bits in the host portion will provide 1022 usable IP addresses (210 – 2 = 1022). How many bits must be borrowed from the host portion of an address to accommodate a router with five connected networks? two three four five Explanation: Each network that is directly connected to an interface on a router requires its own subnet. The formula 2n, where n is the number of bits borrowed, is used to calculate the available number of subnets when borrowing a specific number of bits A newly hired network technician is given the task of ordering new hardware for a small business with a large growth forecast. Which primary factor should the technician be concerned with when choosing the new devices? devices with a fixed number and type of interfaces devices that have support for network monitoring redundant devices devices with support for modularity Explanation: In a small business with a large growth forecast, the primary influencing factor would be the ability of devices to support modularity. Devices with a fixed type/number of interfaces would not support growth. Redundancy is an important factor, but typically found in large enterprises. Network monitoring is also an important consideration, but not as important as modularity. What is the purpose of the network security authentication function? to require users to prove who they are to determine which resources a user can access to keep track of the actions of a user to provide challenge and response questions Explanation: Authentication, authorization, and accounting are network services collectively known as AAA. Authentication requires users to prove who they are. Authorization determines which resources the user can access. Accounting keeps track of the actions of the user. When should an administrator establish a network baseline? when the traffic is at peak in the network when there is a sudden drop in traffic at the lowest point of traffic in the network at regular intervals over a period of time Explanation: An effective network baseline can be established by monitoring the traffic at regular intervals. This allows the administrator to take note when any deviance from the established norm occurs in the network. A network administrator has determined that various computers on the network are infected with a worm. Which sequence of steps should be followed to mitigate the worm attack? inoculation, containment, quarantine, and treatment containment, quarantine, treatment, and inoculation treatment, quarantine, inoculation, and containment containment, inoculation, quarantine, and treatment What do WLANs that conform to IEEE 802.11 standards allow wireless users to do? use wireless mice and keyboards create a one-to-many local network using infrared technology use cell phones to access remote services over very large areas connect wireless hosts to hosts or services on a wired Ethernet network What is the purpose of the routing process? to encapsulate data that is used to communicate across a network to select the paths that are used to direct traffic to destination networks to convert a URL name into an IP address to provide secure Internet file transfer to forward traffic on the basis of MAC addresses Which statement is true about FTP? The client can choose if FTP is going to establish one or two connections with the server. The client can download data from or upload data to the server. FTP is a peer-to-peer application. FTP does not provide reliability during data transmission. Explanation: FTP is a client/server protocol. FTP requires two connections between the client and the server and uses TCP to provide reliable connections. With FTP, data transfer can happen in either direction. The client can download (pull) data from the server or upload (push) data to the server. What type of information is included in the transport header? destination and source logical addresses destination and source physical addresses destination and source port numbers encoded application data Explanation: In a segment, the transport layer header will include the source and destination process, or port numbers. Destination and source physical addressing is included in the frame header. Destination and source logical addressing is included in the network header. Application data is encoded in the upper layers of the protocol stack. What is a socket? the combination of the source and destination IP address and source and destination Ethernet address the combination of a source IP address and port number or a destination IP address and port number the combination of the source and destination sequence and acknowledgment numbers the combination of the source and destination sequence numbers and port numbers Explanation: A socket is a combination of the source IP address and source port or the destination IP address and the destination port number. Which factor determines TCP window size? the amount of data to be transmitted the number of services included in the TCP segment the amount of data the destination can process at one time the amount of data the source is capable of sending at one time Explanation: Window is the number of bytes that the sender will send prior to expecting an acknowledgement from the destination device. The initial window is agreed upon during the session startup via the three-way handshake between source and destination. It is determined by how much data the destination device of a TCP session is able to accept and process at one time. A host device is receiving live streaming video. How does the device account for video data that is lost during transmission? The device will immediately request a retransmission of the missing data. The device will use sequence numbers to pause the video stream until the correct data arrives. The device will delay the streaming video until the entire video stream is received. The device will continue receiving the streaming video, but there may be a momentary disruption. Explanation: When TCP is used as the transport protocol, data must be received in a specific sequence or all data must be fully received in order for it to be used. TCP will use sequence numbers, acknowledgments and retransmission to accomplish this. However, when UDP is used as the transport protocol, data that arrives out of order or with missing segments may cause a momentary disruption, but the destination device may still be able to use the data that it has received. This technology results in the least amount of network delay by providing minimal reliability. Since live streaming video applications use UDP as the transport protocol, the receiver will continue showing the video although there may be a slight delay or reduction in quality. A company has a network address of 192.168.1.64 with a subnet mask of 255.255.255.192. The company wants to create two subnetworks that would contain 10 hosts and 18 hosts respectively. Which two networks would achieve that? (Choose two.) 192.168.1.16/28 192.168.1.64/27 192.168.1.128/27 192.168.1.96/28 192.168.1.192/28 Explanation: Subnet 192.168.1.64 /27 has 5 bits that are allocated for host addresses and therefore will be able to support 32 addresses, but only 30 valid host IP addresses. Subnet 192.168.1.96/28 has 4 bits for host addresses and will be able to support 16 addresses, but only 14 valid host IP addresses What are two reasons a network administrator might want to create subnets? (Choose two.) simplifies network design improves network performance easier to implement security policies reduction in number of routers needed reduction in number of switches needed Explanation: Two reasons for creating subnets include reduction of overall network traffic and improvement of network performance. Subnets also allow an administrator to implement subnet-based security policies. The number of routers or switches is not affected. Subnets do not simplify network design. Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask? to identify the broadcast address of the destination network to identify the host address of the destination host to identify the host address of the destination host to identify faulty frames to identify the network address of the destination network What characteristic describes antispyware? applications that protect end devices from becoming infected with malicious software a network device that filters access and traffic coming into a network software on a router that filters traffic based on IP addresses or applications a tunneling protocol that provides remote users with secure access into the network of an organization What characteristic describes adware? a network device that filters access and traffic coming into a network software that is installed on a user device and collects information about the user the use of stolen credentials to access private data an attack that slows or crashes a device or network service What does the IP address 192.168.1.15/29 represent? multicast address broadcast address unicast address subnetwork address Explanation: A broadcast address is the last address of any given network. This address cannot be assigned to a host, and it is used to communicate with all hosts on that network. What characteristic describes identity theft? the use of stolen credentials to access private data software on a router that filters traffic based on IP addresses or applications software that identifies fast-spreading threats a tunneling protocol that provides remote users with secure access into the network of an organization The IP address of which device interface should be used as the default gateway setting of host H1 (See figure below)? R1: S0/0/0 R2: S0/0/1 R1: G0/0 R2: S0/0/0 Explanation: The default gateway for host H1 is the router interface that is attached to the LAN that H1 is a member of. In this case, that is the G0/0 interface of R1. H1 should be configured with the IP address of that interface in its addressing settings. R1 will provide routing services to packets from H1 that need to be forwarded to remote networks. A network administrator is issuing the login block-for 180 attempts 2 within 30 command on a router. Which threat is the network administrator trying to prevent? a user who is trying to guess a password to access the router a worm that is attempting to access another part of the network an unidentified individual who is trying to access the network equipment room a device that is trying to inspect the traffic on a link Explanation: The login block-for 180 attempts 2 within 30 command will cause the device to block authentication after 2 unsuccessful attempts within 30 seconds for a duration of 180 seconds. A device inspecting the traffic on a link has nothing to do with the router. The router configuration cannot prevent unauthorized access to the equipment room. A worm would not attempt to access the router to propagate to another part of the network. What are two ways to protect a computer from malware? (Choose two.) Empty the browser cache. Use antivirus software. Delete unused software. Keep software up to date. Defragment the hard disk. Explanation: At a minimum, a computer should use antivirus software and have all software up to date to defend against malware. Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network? virus worm phishing spam Explanation: A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization. A network administrator is adding a new LAN to a branch office. The new LAN must support 200 connected devices. What is the smallest network mask that the network administrator can use for the new network? 255.255.255.240 255.255.255.0 255.255.255.248 255.255.255.224 Which type of security threat would be responsible if a spreadsheet add-on disables the local software firewall? brute-force attack Trojan horse DoS buffer overflow Explanation: A Trojan horse is software that does something harmful, but is hidden in legitimate software code. A denial of service (DoS) attack results in interruption of network services to users, network devices, or applications. A bruteforce attack commonly involves trying to access a network device. A buffer overflow occurs when a program attempts to store more data in a memory location than it can hold. A disgruntled employee is using some free wireless networking tools to determine information about the enterprise wireless networks. This person is planning on using this information to hack the wireless network. What type of attack is this? DoS access reconnaissance Trojan horse Explanation: A reconnaissance attack is the unauthorized discovery and documentation of various computing networks, network systems, resources, applications, services, or vulnerabilities. What characteristic describes spyware? a network device that filters access and traffic coming into a network software that is installed on a user device and collects information about the user an attack that slows or crashes a device or network service the use of stolen credentials to access private data What characteristic describes a virus? a network device that filters access and traffic coming into a network the use of stolen credentials to access private data an attack that slows or crashes a device or network service malicious software or code running on an end device What service is provided by POP3? Retrieves email from the server by downloading the email to the local mail application of the client. An application that allows real-time chatting among remote users. Allows remote access to network devices and servers. Uses encryption to provide secure remote access to network devices and servers. Which IPv4 address can a host use to ping the loopback interface? 126.0.0.1 127.0.0.0 126.0.0.0 127.0.0.1 Explanation: A host can ping the loopback interface by sending a packet to a special IPv4 address within the network 127.0.0.0/8. What is a basic characteristic of the IP protocol? connectionless media dependent user data segmentation reliable end-to-end delivery Explanation: Internet Protocol (IP) is a network layer protocol that does not require initial exchange of control information to establish an end-to-end connection before packets are forwarded. Thus, IP is connectionless and does not provide reliable end-to-end delivery by itself. IP is media independent. User data segmentation is a service provided at the transport layer. A computer has to send a packet to a destination host in the same LAN. How will the packet be sent? The packet will be sent to the default gateway first, and then, depending on the response from the gateway, it may be sent to the destination host. The packet will be sent directly to the destination host. The packet will first be sent to the default gateway, and then from the default gateway it will be sent directly to the destination host. The packet will be sent only to the default gateway. Explanation: If the destination host is in the same LAN as the source host, there is no need for a default gateway. A default gateway is needed if a packet needs to be sent outside the LAN. Which statement describes a feature of the IP protocol? IP encapsulation is modified based on network media. IP relies on Layer 2 protocols for transmission error control. MAC addresses are used during the IP packet encapsulation. IP relies on upper layer services to handle situations of missing or out-of-order packets. Explanation: IP protocol is a connection-less protocol, considered unreliable in terms of end-to-end delivery. It does not provide error control in the cases where receiving packets are out-of-order or in cases of missing packets. It relies on upper layer services, such as TCP, to resolve these issues. Within a production network, what is the purpose of configuring a switch with a default gateway address? Hosts that are connected to the switch can use the switch default gateway address to forward packets to a remote destination. A switch must have a default gateway to be accessible by Telnet and SSH. The default gateway address is used to forward packets originating from the switch to remote networks. It provides a next-hop address for all traffic that flows through the switch. Explanation: A default gateway address allows a switch to forward packets that originate on the switch to remote networks. A default gateway address on a switch does not provide Layer 3 routing for PCs that are connected on that switch. A switch can still be accessible from Telnet as long as the source of the Telnet connection is on the local network. Why does HTTP use TCP as the transport layer protocol? to ensure the fastest possible download speed because HTTP is a best-effort protocol because transmission errors can be tolerated easily because HTTP requires reliable delivery Explanation: When a host requests a web page, transmission reliability and completeness must be guaranteed. Therefore, HTTP uses TCP as its transport layer protocol. Which two characteristics are associated with UDP sessions? (Choose two.) Destination devices receive traffic with minimal delay. Transmitted data segments are tracked. Destination devices reassemble messages and pass them to an application. Received data is unacknowledged. Unacknowledged data packets are retransmitted. Explanation: TCP: Provides tracking of transmitted data segments Destination devices will acknowledge received data. Source devices will retransmit unacknowledged data. UDP Destination devices will not acknowledge received data Headers use very little overhead and cause minimal delay. Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly? Time-to-Live Sequence Number Acknowledgment Number Differentiated Services Explanation: The value of the Time-to-Live (TTL) field in the IPv4 header is used to limit the lifetime of a packet. The sending host sets the initial TTL value; which is decreased by one each time the packet is processed by a router. If the TTL field decrements to zero, the router discards the packet and sends an Internet Control Message Protocol (ICMP) Time Exceeded message to the source IP address. The Differentiated Services (DS) field is used to determine the priority of each packet. Sequence Number and Acknowledgment Number are two fields in the TCP header. Which transport layer feature is used to guarantee session establishment? UDP ACK flag TCP 3-way handshake UDP sequence number TCP port number Explanation: TCP uses the 3-way handshake. UDP does not use this feature. The 3-way handshake ensures there is connectivity between the source and destination devices before transmission occurs. Which attack involves a compromise of data that occurs between two end points? denial-of-service man-in-the-middle attack extraction of security parameters username enumeration Explanation: Threat actors frequently attempt to access devices over the internet through communication protocols. Some of the most popular remote exploits are as follows: Man-In-the-middle attack (MITM) – The threat actor gets between devices in the system and intercepts all of the data being transmitted. This information could simply be collected or modified for a specific purpose and delivered to its original destination. Eavesdropping attack – When devices are being installed, the threat actor can intercept data such as security keys that are used by constrained devices to establish communications once they are up and running. SQL injection (SQLi) – Threat actors uses a flaw in the Structured Query Language (SQL) application that allows them to have access to modify the data or gain administrative privileges. Routing attack – A threat actor could either place a rogue routing device on the network or modify routing packets to manipulate routers to send all packets to the chosen destination of the threat actor. The threat actor could then drop specific packets, known as selective forwarding, or drop all packets, known as a sinkhole attack. A client creates a packet to send to a server. The client is requesting FTP service. What number will be used as the destination port number in the sending packet? 21 69 67 80 What do the client/server and peer-to-peer network models have in common? Both models have dedicated servers. Both models support devices in server and client roles. Both models require the use of TCP/IP-based protocols. Both models are used only in the wired network environment. Explanation: In both the client/server and peer-to-peer network models, clients and servers exist. In peer-to-peer networks, no dedicated server exists, but a device can assume the server role to provide information to a device serving in the client role. What is an example of network communication that uses the client-server model? A user uses eMule to download a file that is shared by a friend after the file location is determined. A workstation initiates an ARP to find the MAC address of a receiving host. A user prints a document by using a printer that is attached to a workstation of a coworker. A workstation initiates a DNS request when the user types www.cisco.com in the address bar of a web browser. Explanation: When a user types a domain name of a website into the address bar of a web browser, a workstation needs to send a DNS request to the DNS server for the name resolution process. This request is a client/server model application. The eMule application is P2P. Sharing a printer on a workstation is a peer-to-peer network. Using ARP is just a broadcast message sent by a host. Which application layer protocol uses message types such as GET, PUT, and POST? DNS DHCP SMTP HTTP POP3 Explanation: The GET command is a client request for data from a web server. A PUT command uploads resources and content, such as images, to a web server. A POST command uploads data files to a web server. Which scenario describes a function provided by the transport layer? A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network. A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window. A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site. Explanation: The source and destination port numbers are used to identify the correct application and window within that application. What is the difference between a virus and a worm? Viruses self-replicate but worms do not. Worms self-replicate but viruses do not. Worms require a host file but viruses do not. Viruses hide in legitimate programs but worms do not. Explanation: Worms are able to self-replicate and exploit vulnerabilities on computer networks without user participation. Which example of malicious code would be classified as a Trojan horse? malware that was written to look like a video game malware that requires manual user intervention to spread between systems malware that attaches itself to a legitimate program and spreads to other programs when launched malware that can automatically spread from one system to another by exploiting vulnerability in the target Explanation: A Trojan horse is malicious code that has been written specifically to look like a legitimate program. This is in contrast to a virus, which simply attaches itself to an actual legitimate program. Viruses require manual intervention from a user to spread from one system to another, while a worm is able to spread automatically between systems by exploiting vulnerabilities on those devices. What is the purpose of the network security accounting function? to require users to prove who they are to determine which resources a user can access to provide challenge and response questions to keep track of the actions of a user Explanation: Authentication, authorization, and accounting are network services collectively known as AAA. Authentication requires users to prove who they are. Authorization determines which resources the user can access. Accounting keeps track of the actions of the user. What is the role of an IPS? detecting and blocking of attacks in real time connecting global threat information to Cisco network security devices authenticating and validating traffic filtering of nefarious websites Explanation: An intrusion prevention system (IPS) provides real-time detection and blocking of attacks. A technician is to document the current configurations of all network devices in a college, including those in off-site buildings. Which protocol would be best to use to securely access the network devices? FTP HTTP SSH Telnet Suppose the available network address is 190.192.0.0/16, complete the required VLSM: Show your solution on the space provided below. Location No. of Host Network Address Prefix (/) First Usable Host Last Usable Host Broadcast Address Sales 3500 190.192.0.0 /20 190.192.0.1 190.192.15.254 190.192.15.255 Marketing 2000 190.192.16.0 /21 190.192.16.1 190.192.23.254 190.192.23.255 Accounting 1500 190.192.24.0 /21 190.192.24.1 190.192.31.254 190.192.31.255 Warehouse 512 190.192.32.0 /22 190.192.32.1 190.192.35.254 190.192.35.255 Headquarter 200 190.192.36.0 /24 190.192.36.1 190.192.36.254 190.192.36.255 WAN 1 128 190.192.37.0 /24 190.192.37.1 190.192.37.254 190.192.37.255 WAN 2 64 190.192.38.0 /25 190.192.38.1 190.192.38.126 190.192.38.127 Executive 8 190.192.38.128 /28 190.192.38.129 190.192.38.142 190.192.38.143 32768 16384 8192 4096 2048 1024 512 256 128 64 32 16 8 4 2 1 128 64 32 16 8 4 2 1 190. 192. 0 0 0 0 0 0 0 0. 0 0 0 0 0 0 0 0 Network Address 190. 192. 0 0 0 0 0 0 0 0. 0 0 0 0 0 0 0 1 First Usable Host 190. 192. 0 0 0 0 1 1 1 1. 1 1 1 1 1 1 1 0 Last Usable Host 190. 192. 0 0 0 0 1 1 1 1. 1 1 1 1 1 1 1 1 Broadcast Address 190. 192. 0 0 0 1 0 0 0 0. 0 0 0 0 0 0 0 0 Network Address 190. 192. 0 0 0 1 0 0 0 0. 0 0 0 0 0 0 0 1 First Usable Host 190. 192. 0 0 0 1 0 1 1 1. 1 1 1 1 1 1 1 0 Last Usable Host 190. 192. 0 0 0 1 0 1 1 1. 1 1 1 1 1 1 1 1 Broadcast Address 190. 192. 0 0 0 1 1 0 0 0. 0 0 0 0 0 0 0 0 Network Address 190. 192. 0 0 0 1 1 0 0 0. 0 0 0 0 0 0 0 1 First Usable Host 190. 192. 0 0 0 1 1 1 1 1. 1 1 1 1 1 1 1 0 Last Usable Host 190. 192. 0 0 0 1 1 1 1 1. 1 1 1 1 1 1 1 1 Broadcast Address 190. 192. 0 0 1 0 0 0 0 0. 0 0 0 0 0 0 0 0 Network Address 190. 192. 0 0 1 0 0 0 0 0. 0 0 0 0 0 0 0 1 First Usable Host 190. 192. 0 0 1 0 0 0 1 1. 1 1 1 1 1 1 1 0 Last Usable Host 190. 192. 0 0 1 0 0 0 1 1. 1 1 1 1 1 1 1 1 Broadcast Address 190. 192. 0 0 1 0 0 1 0 0. 0 0 0 0 0 0 0 0 Network Address 190. 192. 0 0 1 0 0 1 0 0. 0 0 0 0 0 0 0 1 First Usable Host 190. 192. 0 0 1 0 0 1 0 0. 1 1 1 1 1 1 1 0 Last Usable Host 190. 192. 0 0 1 0 0 1 0 0. 1 1 1 1 1 1 1 1 Broadcast Address 190. 192. 0 0 1 0 0 1 0 1. 0 0 0 0 0 0 0 0 Network Address 190. 192. 0 0 1 0 0 1 0 1. 0 0 0 0 0 0 0 1 First Usable Host 190. 192. 0 0 1 0 0 1 0 1. 1 1 1 1 1 1 1 0 Last Usable Host 190. 192. 0 0 1 0 0 1 0 1. 1 1 1 1 1 1 1 1 Broadcast Address 190. 192. 0 0 1 0 0 1 1 0. 0 0 0 0 0 0 0 0 Network Address 190. 192. 0 0 1 0 0 1 1 0. 0 0 0 0 0 0 0 1 First Usable Host 190. 192. 0 0 1 0 0 1 1 0. 0 1 1 1 1 1 1 0 Last Usable Host 190. 192. 0 0 1 0 0 1 1 0. 0 1 1 1 1 1 1 1 Broadcast Address 190. 192. 0 0 1 0 0 1 1 0. 1 0 0 0 0 0 0 0 Network Address 190. 192. 0 0 1 0 0 1 1 0. 1 0 0 0 0 0 0 1 First Usable Host 190. 192. 0 0 1 0 0 1 1 0. 1 0 0 0 1 1 1 0 Last Usable Host 190. 192. 0 0 1 0 0 1 1 0. 1 0 0 0 1 1 1 1 Broadcast Address

Use Quizgecko on...
Browser
Browser