Solved

cisco question

Posted on 2013-01-25
5
321 Views
Last Modified: 2013-01-25
Hello, I'm studying for the CCENT exam. I'm working on a bunch of practice questions, and I've come across the one that is attached and I can't figure out why answer B is the correct answer. Can someone please explain. Please see attached.
pic.jpg
0
Comment
Question by:MrMay
  • 2
  • 2
5 Comments
 
LVL 20

Expert Comment

by:agonza07
ID: 38819342
Looks like you are missing the configuration part of the exhibit.
0
 
LVL 24

Accepted Solution

by:
smckeown777 earned 500 total points
ID: 38819345
Because the 2 WAN interfaces are currently in different subnets...

A /30 subnet means you have 2 host IP's available, in this case the subnets are

192.168.10-80-83 (Branch side)
192.168.10.84-87 (HQ side)

So since they are not in the same subnet they can't talk...

Does that explain it?
0
 
LVL 20

Expert Comment

by:agonza07
ID: 38819375
I missed that.

smckeown777 is correct.
0
 

Author Comment

by:MrMay
ID: 38819658
thank you smckeown777.    
so since each subnet has 2 hosts... it should be
Usable IPs  --> 192.168.10.81 - 192.168.10.82   (BRANCH)
and                    192.168.10.85 - 192.168.10.86 (HQ)

Am I right?
0
 
LVL 24

Expert Comment

by:smckeown777
ID: 38819668
Yep, that's correct
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the hope of saving someone else's sanity... About a year ago we bought a Cisco 1921 router with two ADSL/VDSL EHWIC cards to load balance local network traffic over the two broadband lines we have, but we couldn't get the routing to work consi…
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question