Which of the following Cybersecurity concepts guarantees that information is accessible only to those authorized to access it?
A. Non-repudiation
B. Authentication
C. Accessibility
D. Confidentiality
💡 Networking Knowledge Check
Question:
Which IPv4 private address range belongs to Class B private networks?
Options:
A. 192.168.0.0/16
B. 172.16.0.0/12
C. 10.0.0.0/8
D. 169.254.0.0/16
NETWORKING KNOWLEDGE CHECKPOINT
A host has the IP address 192.168.100.70/25.
Which of the following is the broadcast address for this subnet?
A. 192.168.100.127
B. 192.168.100.128
C. 192.168.100.255
D. 192.168.100.64
A host has the IP address 192.168.1.50/26.
Which of the following is the broadcast address for this subnet?
A. 192.168.1.63
B. 192.168.1.64
C. 192.168.1.127
D. 192.168.1.255
💡 Networking Knowledge Check
Question:
What is the purpose of a trunk port on a switch?
Options:
A. Connect end-user devices to a VLAN
B. Carry traffic for multiple VLANs between switches
C. Prevent broadcast traffic
D. Provide network address translation
NETWORKING KNOWLEDGE CHECKPOINT
A company has the network 10.0.0.0/23.
How many usable host addresses are available in this subnet?
A. 254
B. 510
C. 512
D. 1022
(show calculation if possible)
A host has the IP address 172.16.45.10 with a subnet mask of /26. What is the broadcast address for this subnet?
A) 172.16.45.255
B) 172.16.45.63
C) 172.16.45.127
D) 172.16.45.31
💡 CCNA Knowledge Check
Question: What is the last usable IP address in the subnet 192.168.1.0/25?
a) 192.168.1.126
b) 192.168.1.127
c) 192.168.1.128
d) 192.168.1.254