CCNA 200-125 Exam: Subnetting Questions With Answers

  1. Refer to the exhibit. All of the routers in the network are configured with the ip subnet-zero command. Which network addresses should be used for Link A and Network A? (Choose two)

    • A. Network A –
    • B. Network A –*
    • C. Network A –
    • D. Link A –*
    • E. Link A –
    • F. Link A –

    Show (Hide) Explanation/Reference
    Network A needs 120 hosts < 128 = 27 -> Need a subnet mask of 7 bit 0s -> “/25″.

    Because the ip subnet-zero command is used, network can be used.

    Answer E “Link A –″ is not correct because this subnet belongs to MARKETING subnet (
    Answer F “Link A –″ is not correct because this subnet belongs to ADMIN subnet (

  2. What is the correct routing match to reach
    • A.*
    • B.
    • C.
    • D. the default route

    Show (Hide) Explanation/Reference
    Although all above answers are correct but is the best choice as it is the most specific prefix-match one.
  3. You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the maximum number of subnets. Which network address and subnet mask meet this requirement?
    • A.
    • B.*
    • C.
    • D.
    • E.
  4. Refer to the exhibit. What is the most appropriate summarization for these routes?

    • A.
    • B.*
    • C.
    • D.

    Show (Hide) Explanation/Reference
    We need to summarize 4 subnets so we have to move left 2 bits (22 = 4). In this question we can guess the initial subnet mask is /24 because,,, belong to different networks. So “/24″ moves left 2 bits -> /22.
  5. How many usable host are there per subnet if you have the address of with a subnet mask of
    • A. 4
    • B. 8
    • C. 16
    • D. 14*

    Show (Hide) Explanation/Reference
    From the subnet mask of (/28) we learn there are 24 – 2 = 14 hosts per subnet.
  6. Assuming a subnet mask of, three of the following addresses are valid host addresses. Which are these addresses? (Choose three)
    • A.*
    • B.
    • C.*
    • D.*

    Show (Hide) Explanation/Reference
    From the subnet mask of we learn that the increment is 8 therefore is a network address which cannot be assigned to a host. Other network addresses are,,… Notice that is a valid host address (which belongs to to subnet).
  7. Which IP configuration does the CIDR notation refer?
    • A.
    • B.
    • C.
    • D.
    • E.*

    Show (Hide) Explanation/Reference
    “/25” means 1111 1111.1111 1111.1000 0000 in binary or in decimal.
  8. CIDR notation ( ) in “/” notation
    • A. 30 *
    • B. 31
    • C. 32
    • D. 33
  9. Refer to the exhibit:

    Which three statements correctly describe Network Device A? (Choose three)

    • A. With a network wide mask of, each interface does not require an IP address.
    • B. With a network wide mask of, each interface does require an IP address on a unique IP subnet.*
    • C. With a network wide mask of, must be a Layer 2 device for the PCs to communicate with each other.
    • D. With a network wide mask of, must be a Layer 3 device for the PCs to communicate with each other.*
    • E. With a network wide mask of, each interface does not require an IP address.*

    Show (Hide) Explanation/Reference
    The principle here is if the subnet mask makes two IP addresses and in the same subnet then the Network device A does not need to have IP addresses on its interfaces (and we don’t need a Layer 3 device here).

    A quick way to find out the correct answers is notice that all 255.255.255.x subnet masks will separate these two IP addresses into two separate subnets so we need a Layer 3 device here and each interface must require an IP address on a unique IP subnet -> A, C are not correct while B, D are correct.

    With subnet mask, the increment here is 2 in the third octet -> the first subnet is from to, in which two above IP addresses belong to -> each interface of Network device A does not require an IP address -> E is correct.

  10. Refer to the exhibit, you determine that Computer A cannot ping Computer B. Which reason for the problem is most likely true?

    • A. The Subnet mask for Computer A is incorrect*
    • B. The default gateway address for Computer A is incorrect
    • C. The subnet mask for computer B is incorrect.
    • D. The default gateway address for computer B is incorrect
  11. For which two reasons was RFC 1918 address space define (Choose two)
    • A. to preserve public IPv4 address space*
    • B. to reduce the occurrence of overlapping IP addresses*
    • C. to preserve public IPv6 address space
    • D. reduce the size of ISP routing tables
    • E. to support the NAT protocol

    Show (Hide) Explanation/Reference
    The RFC 1518 is Classless Interdomain Routing (CIDR). CIDR is a mechanism developed to help alleviate the problem of exhaustion of IP addresses and growth of routing tables.

    The problems were:

    + With the classful routing system, individual networks were either limited to 254 hosts (/24) or 65,534 hosts (/16). For many network enterprises, 254 hosts were not enough and 65,534 were too large to be used efficiently.
    + Routing information overload. The size and rate of growth of the routing tables in Internet routers is beyond the ability of current software (and people) to effectively manage.
    + Eventual exhaustion of IP network numbers.

    To solve these problem, CIDR was selected as the solution in 1992.

    In contrast to classful routing, which categorizes addresses into one of three blocks, CIDR allows for blocks of IP addresses to be allocated to Internet service providers. The blocks are then split up and assigned to the provider’s customers.

    According to the CIDR standard, the first part of an IP address is a prefix, which identifies the network. The prefix is followed by the host identifier so that information packets can be sent to particular computers within the network. A CIDR address includes the standard 32-bit IP address and also the network prefix. For example, a CIDR address of, the “/26” indicates the first 26 bits are used to identify the unique network, leaving the remaining bits to identify the specific hosts.

    Therefore, instead of assigning the whole block of a class B or C address, now smaller blocks of a class can be assigned. For example, instead of assigning a whole block of, a smaller block, like or, can be assigned.



Related Articles

Leave a Reply