Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In


Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here


Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.


Have an account? Sign In Now

Sorry, you do not have permission to ask a question, You must login to ask a question.


Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

Search infos

Search infos Logo Search infos Logo

Search infos Navigation

  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Terms of Use
  • Privacy Policy
Home/ Questions/Q 1828
Next
In Process
Aurora
  • 0
AuroraTeacher
Asked: September 19, 20222022-09-19T09:27:21+00:00 2022-09-19T09:27:21+00:00In: Certifications

Which subnet mask would be used if exactly 5 host bits are available?

  • 0

Good Morning Mates,

I am wondering about this question, can you help me, please?

Which subnet mask would be used if exactly 5 host bits are available?

  • A. 255.255.255.240
  • B. 255.255.255.224
  • C. 255.255.255.248
  • D. 255.255.255.128
  • 5 5 Answers
  • 49 Views
  • 0 Followers
  • 0
Answer
Share
  • Facebook
  • Report

5 Answers

  • Voted
  • Oldest
  • Recent
  1. Eleanor Teacher
    2022-09-19T09:30:18+00:00Added an answer on September 19, 2022 at 9:30 am

    Good morning Aurora,

    Honestly, I am not sure about the right answer, but I can guarantee that A & C are wrong, as  The mask of 255.255.255.240 has 4 host bits and 255.255.255.248 represents 3 host bits.

     

    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  2. Rowan Teacher
    2022-09-19T09:32:43+00:00Added an answer on September 19, 2022 at 9:32 am

    Correct answer is B, However, the subnet mask of the 255.255.255.224 is used when the 5 hosts bits are available because  255.255.255.0 has 8 host bits while  255.255.255 .240 has 4 bits and 255.255.255.128 has 7 host bits.

    I hope this helps!

    Have a good day!

    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  3. Emma Pundit
    2022-09-19T09:35:02+00:00Added an answer on September 19, 2022 at 9:35 am

    Hi Aurora,

    Honestly, I am confused about A and C. But answer B is more convincing. I’ll go with B.

    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  4. Harper Professional
    2022-09-19T09:37:19+00:00Added an answer on September 19, 2022 at 9:37 am

    After rethinking, I believe B seems to be the most accurate one as it is the only one which makes sense.

    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report
  5. Gianna Pundit
    2022-09-19T09:39:43+00:00Added an answer on September 19, 2022 at 9:39 am

    Good morning,

    Definitely, the right answer is B, the first subnet mask (option A) is used if exactly 4 host bits are available not 5.

    • 0
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

You must login to add an answer.


Forgot Password?

Need An Account, Sign Up Here

Sidebar

Ask A Question

Questions Categories

Certifications
65Questions
, 0Followers
General
38Questions
, 0Followers
Programming languages
13Questions
, 0Followers
Communication
9Questions
, 0Followers
Gifts
4Questions
, 0Followers
University
2Questions
, 0Followers
Company
1Question
, 0Followers
Softwares
1Question
, 0Followers
SEO
1Question
, 0Followers
Language
0Questions
, 0Followers
Management
0Questions
, 0Followers
Design
0Questions
, 0Followers
Games
0Questions
, 0Followers
  • Popular
  • Answers
  • johndoe

    how many Shrek movies are there

    • 6 Answers
  • Harper

    One piece swimsuit for men

    • 6 Answers
  • Scarlett

    What are two of the required steps to configure PAT? ...

    • 6 Answers
  • Philippe
    Philippe added an answer Thank you guys a lot for your help, feedback, and… September 19, 2022 at 3:05 pm
  • Aurora
    Aurora added an answer Hi, For me, it is not that kind of difficult… September 19, 2022 at 3:03 pm
  • Stella
    Stella added an answer Hi Phillipe, As far as i know, and referring to… September 19, 2022 at 2:59 pm

Related Questions

  • What three blocks of addresses are defined by RFC 1918 ...

    • 5 Answers
  • what can cause a reduction in available bandwidth on a ...

    • 6 Answers
  • Which WAN technology establishes a dedicated constant point-to-point connection between ...

    • 5 Answers
  • Which task has to be performed on Router 1 for ...

    • 5 Answers
  • Which method is used by a PAT-enabled router to send ...

    • 5 Answers

Top Members

Gianna

Gianna

  • 5 Questions
  • 126 Points
Pundit
Emma

Emma

  • 8 Questions
  • 119 Points
Pundit
Philippe

Philippe

  • 5 Questions
  • 107 Points
Pundit

Trending Tags

altura bad bunny cameraman comfortable crocs easy french places public public toilet sanitation slippers slippers for women slippers unisex smiley face toilets towel traditional crocs trend crocs usa gear trueshot

Footer

Search infos

Searchinfos is an online space for exchanges on several topics between users.

About Us

  • About Us
  • Contact Us

Legal Stuff

  • Terms of Use
  • Privacy Policy

Articles

  • Blog

Follow

© Searchinfos. All Rights Reserved