Chatgpt 1
Chatgpt 1
📘
Section 1: Ethernet Basics (1–20)
1. What is Ethernet in networking?
Answer: Ethernet is a family of networking technologies used in LANs to transmit data using frames
over wired media.
Explanation: It’s the most common LAN technology, standardized by IEEE 802.3.
2. What is the maximum length for a standard Ethernet cable (Cat5e/Cat6)?
Answer: 100 meters.
Explanation: This includes 90 meters of solid cable and 10 meters of patch cables.
3. What is a MAC address?
Answer: A 48-bit hardware address assigned to network interfaces.
Explanation: Used for Layer 2 (Data Link) communication.
4. What is the function of an Ethernet frame?
Answer: It encapsulates data for transmission across Ethernet networks.
Explanation: Includes source MAC, destination MAC, and data.
5. What is the Ethernet Type field used for in a frame?
Answer: To indicate the upper-layer protocol, such as IPv4 or ARP.
Explanation: Helps identify the encapsulated payload.
6. What is the minimum size of an Ethernet frame?
Answer: 64 bytes.
Explanation: Frames smaller than this are considered runts and are discarded.
7. What is the maximum size of a standard Ethernet frame?
Answer: 1518 bytes (without VLAN tagging).
Explanation: Includes all header fields and data.
8. What happens when an Ethernet frame is too small?
Answer: It is dropped by the receiving device.
Explanation: Ensures valid frame structure.
9. What is the purpose of the preamble in an Ethernet frame?
Answer: It synchronizes the receiving device’s clock with the sender.
Explanation: It’s a pattern of bits (101010…) ending with a start frame delimiter.
10. What is the function of the FCS field?
Answer: It detects errors in the frame using a CRC.
Explanation: Frames with invalid FCS are discarded.
11. What does full-duplex mode mean?
Answer: Devices can send and receive data simultaneously.
Explanation: Increases efficiency and avoids collisions.
12. What does half-duplex mode mean?
Answer: Devices can either send or receive at a time, not both.
Explanation: Collisions can occur in this mode.
13. What is the primary difference between a hub and a switch?
Answer: A hub forwards all frames to all ports; a switch forwards only to the destination port.
Explanation: Switches are more efficient and secure.
14. What is CSMA/CD?
Answer: Carrier Sense Multiple Access with Collision Detection.
Explanation: Used in half-duplex Ethernet to handle collisions.
15. Why is CSMA/CD not used in full-duplex Ethernet?
Answer: Because collisions cannot occur in full-duplex mode.
Explanation: Each device has a dedicated transmit and receive channel.
16. What is the purpose of an Ethernet switch?
Answer: To forward Ethernet frames to the appropriate destination port based on MAC addresses.
Explanation: Increases LAN efficiency.
17. What is a broadcast in Ethernet?
Answer: A frame sent to all devices on a LAN segment.
Explanation: Uses the destination MAC address FF:FF:FF:FF:FF:FF.
18. What is a unicast Ethernet frame?
Answer: A frame sent from one device to a specific destination MAC address.
Explanation: Most common type of communication.
19. What is a multicast frame in Ethernet?
Answer: A frame sent to a group of devices using a multicast MAC address.
Explanation: Used by certain applications like streaming or routing protocols.
20. What standard defines Ethernet technologies?
Answer: IEEE 802.3
Explanation: Governs Ethernet frame structure and operation.
📘
Section 2: MAC Addressing & Switching (21–40)
21. How does a switch learn MAC addresses?
Answer: By examining the source MAC address of incoming frames.
Explanation: Builds a MAC address table to make forwarding decisions.
22. What is the MAC address table in a switch?
Answer: A table mapping MAC addresses to switch ports.
Explanation: Used to forward unicast traffic efficiently.
23. What happens when a switch receives a frame with a destination MAC not in its table?
Answer: It floods the frame to all ports except the source.
Explanation: Helps ensure the frame reaches its destination.
24. What is flooding in switching?
Answer: Sending a frame out all ports when the destination is unknown.
Explanation: Temporary until MAC learning occurs.
25. How does a switch handle a broadcast frame?
Answer: It forwards the frame out all ports except the one it came from.
Explanation: This is how broadcast communication works.
26. What is frame filtering in Ethernet switches?
Answer: The process of examining frames and forwarding them only to the appropriate port.
Explanation: Enhances security and performance.
27. What happens when two devices share the same MAC address?
Answer: It causes unpredictable behavior and network problems.
Explanation: MAC addresses must be unique.
28. What is aging time in a MAC address table?
Answer: The time a learned MAC address remains in the table without activity.
Explanation: Typically 300 seconds by default.
29. What does it mean when a switch port is in a forwarding state?
Answer: It actively receives and sends frames.
Explanation: The port is fully operational.
30. What is the difference between a dynamic and static MAC address entry?
Answer: Dynamic entries are learned; static ones are manually configured.
Explanation: Static entries don’t age out.
31. What is port security in Ethernet switches?
Answer: A feature that restricts MAC addresses on a port.
Explanation: Enhances security by preventing unauthorized access.
32. What happens when a switch port exceeds its MAC limit with port security enabled?
Answer: It may shut down, restrict, or protect the port depending on the mode.
Explanation: Modes include shutdown, restrict, and protect.
33. Why is MAC address learning important for Ethernet switches?
Answer: It allows efficient frame forwarding.
Explanation: Reduces unnecessary traffic.
34. What is meant by collision domain?
Answer: A network segment where data packets can collide.
Explanation: Switches reduce collision domains; hubs do not.
35. What is a broadcast domain?
Answer: A network segment where a broadcast is received by all devices.
Explanation: Routers separate broadcast domains.
36. How do switches impact broadcast domains?
Answer: They do not separate them unless VLANs are used.
Explanation: VLANs create logical broadcast domains.
37. What does it mean if a switch is operating in store-and-forward mode?
Answer: It reads the entire frame before forwarding it.
Explanation: Allows error checking with FCS.
38. What is cut-through switching?
Answer: A method where a switch forwards a frame as soon as the destination MAC is read.
Explanation: Lowers latency but no error checking.
39. What is fragment-free switching?
Answer: A compromise that checks the first 64 bytes before forwarding.
Explanation: Filters out most collisions while maintaining speed.
40. What happens if a switch has no entry for a destination MAC and the frame is unicast?
Answer: It floods the frame to all ports.
Explanation: Mimics broadcast behavior temporarily.
📘
Section 3: Ethernet Standards and Speeds (41–60)
41. What is the speed of standard Fast Ethernet?
Answer: 100 Mbps.
Explanation: Uses Cat5 or better cabling.
42. What is the speed of Gigabit Ethernet?
Answer: 1000 Mbps or 1 Gbps.
Explanation: Common in modern LANs.
43. What is the speed of 10BASE-T Ethernet?
Answer: 10 Mbps.
Explanation: Early Ethernet over twisted pair.
44. What is the meaning of 1000BASE-T?
Answer: Gigabit Ethernet over twisted-pair cables.
Explanation: Operates on Cat5e or higher.
45. What is 100BASE-FX used for?
Answer: Ethernet over fiber optic cables at 100 Mbps.
Explanation: Used for longer distances and EMI immunity.
46. What is the max distance of 1000BASE-T?
Answer: 100 meters.
Explanation: Same as other twisted-pair Ethernet standards.
47. What type of cable is required for 1000BASE-T?
Answer: Category 5e or higher UTP.
Explanation: Lower categories may cause performance issues.
48. What connector is used for most Ethernet cabling?
Answer: RJ-45.
Explanation: 8-pin modular connector for twisted-pair cables.
49. What does the “BASE” in 100BASE-T mean?
Answer: Baseband signaling.
Explanation: Only one signal/channel at a time.
50. What is the benefit of fiber over copper in Ethernet?
Answer: Longer distance and resistance to interference.
Explanation: Ideal for backbone connections.
📘
Section 4: Cabling, Duplex, and Common Issues (61–88)
61. What is auto-negotiation in Ethernet?
Answer: A process where two connected devices agree on speed and duplex mode.
Explanation: Ensures compatibility and optimal settings between devices.
79. What happens if two devices have the same IP but different MACs?
Answer: An IP conflict occurs, causing unpredictable behavior.
Explanation: IP conflicts can lead to communication issues.
80. What command on Cisco devices shows MAC address table entries?
Answer: show mac address-table
Explanation: Helps in troubleshooting and verifying MAC learning.
86. What is the benefit of using switches over hubs in Ethernet LANs?
Answer: Improved performance, fewer collisions, and intelligent forwarding.
Explanation: Switches create separate collision domains and reduce unnecessary traffic.
PART 2
42. What layer issues might you see with ‘line protocol down’?
Answer: Mismatched encapsulation or auto-negotiation failure.
Explanation: Prevents communication.
71. What does switchport trunk allowed vlan remove <id> do?
Answer: Removes VLAN from allowed list on a trunk.
Explanation: Controls VLAN access path.
74. How do you check whether an interface is operating at its configured speed?
Answer: show interfaces <interface> shows actual speed.
Explanation: Validates physical layer consistency.
75. Why might an interface stay down even when correctly configured?
Answer: Cable issue, hardware failure, or admin shutdown.
Explanation: Diagnose via show commands.
79. How can you verify whether EtherChannel is negotiated as LACP or PAgP?
Answer: show etherchannel summary displays protocol specifics.
Explanation: Helps confirm expected behavior.
88. Why mastering interface configuration and verification is crucial for CCNA?
Answer: Interfaces are fundamental for connectivity, requiring precision and insight to ensure stable, secure
networks.
Explanation: Solid interface management is at the core of effective network operations.
PART 3
PART 4
Perspectives on IPv4 Subnetting
1. What does the term “subnetting” mean in an IPv4 network?
Answer:
Subnetting is the process of dividing a larger IPv4 network into smaller logical segments (subnets) by
borrowing bits from the host portion of the address. It allows for better utilization of IP space, improved
performance, and isolation of network segments. Using subnet masks (or prefix lengths), you define which bits
identify the network/subnet and which bits identify hosts.
2. Why is it important to understand both the operational view and design view when working with existing
subnetting plans?
Answer:
The design view involves planning: gathering requirements (number of hosts, growth, number of subnets),
choosing a classful network or private/public ranges, selecting mask(s), planning implementation. The
operational view is dealing with what already is implemented: reading existing masks, identifying unused
address space, accommodating growth. CCNA requires you to interpret existing subnetting as well as design
new ones.
Answer:
You list all places where separate subnets are needed (LANs, VLANs, point-to-point WAN links, special
segments like servers). Count those. Also factor in growth (future expansion). Use that count in formula 2^S ≥
required_subnets, where S = number of subnet bits. Then choose a mask to supply that many subnets.
4. How do you determine how many hosts per subnet you need?
Answer:
For each subnet, determine the maximum number of devices that will need addresses: hosts, routers, switches
(if managed), IP phones, etc. Use the largest required among subnets to guide mask selection if using same
mask for all. Also leave headroom for growth. Use formula 2^H − 2 ≥ required_hosts, where H = number of
host bits.
Answer:
“One-size-fits-all” means using a single subnet mask for all subnets in a network. Tradeoffs: simplicity (easier
to manage, fewer mask types), but potentially wasteful IP address space when some subnets have far fewer
hosts. It reduces flexibility and may cause underutilization.
6. What is VLSM (Variable Length Subnet Mask), and how does it differ from one-size-fits-all?
Answer:
VLSM allows using different subnet masks (i.e. different numbers of host bits) in different subnets of the same
larger network. This lets you allocate more hosts where needed and conserve addresses in small subnets. Unlike
one-size-fits-all, VLSM designs are more complex but more efficient.
7. Given a Class C network 192.168.10.0, you need four subnets. What subnet mask would you choose and
what are the ranges?
Answer:
You need 4 subnets → need 2 bits for subnetting (since 2^2 = 4). Default for Class C is /24, so you borrow 2
bits → /26 mask. That gives subnets each with 2^{6} − 2 = 62 usable hosts. Subnets are:
192.168.10.0/26 (hosts .1-.62)
192.168.10.64/26 (hosts .65-.126)
192.168.10.128/26 (hosts .129-.190)
192.168.10.192/26 (hosts .193-.254)
8. Explain how to compute the subnet ID and broadcast address of a given IP/mask.
Answer:
Convert IP and mask to binary. AND the IP with the mask → result is subnet ID (network + subnet). For
broadcast, take subnet ID, add all ones in host bits → that is broadcast address. Usable host IPs are between
subnet ID + 1 and broadcast − 1.
9. What is the minimum number of host bits needed to support 50 hosts per subnet?
Answer:
Find H such that 2^H − 2 ≥ 50. Try H = 6 → 2^6 − 2 = 62, which is ≥ 50; H = 5 gives 30, too small. So need at
least 6 host bits. That corresponds to a mask with (32 − host_bits) = (32 − 6) = /26 (if starting from /24) or
accordingly depending on network class.
10. What is a private IPv4 network, and how is it used in subnetting design?
Answer:
Private IPv4 addresses are IP ranges reserved for internal networks (not routable on the public Internet) as
defined in RFC 1918 (e.g. 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16). In subnetting design, you often select a
private network block, then subdivide (subnet) it for your LANs, WANs, etc. They avoid use of public address
space inside.
11. When designing subnets, why is it wise to leave some unused address space?
Answer:
To allow for future growth (more hosts, new subnets), changes or replacing devices, or changes in site size. If
you use up every possible subnet or host address immediately, later expansion becomes painful (re-addressing,
renumbering). Also for redundancy or reallocation.
12. Given a network 172.16.0.0/16 and requirement for 200 subnets and 200 hosts per subnet, what mask
(single mask) would satisfy both?
Answer:
From Class B (/16):
Need ≥ 200 subnets → need S bits where 2^S ≥ 200; S = 8 gives 256 subnets.
Need ≥ 200 hosts/subnet → need H bits where 2^H − 2 ≥ 200; H = 8 → 254 hosts.
So mask uses 8 bits for subnet, 8 bits for host → /24 (i.e. 255.255.255.0). Subnet mask would be /24 for all.
13. How do you plan static vs dynamic IP ranges within each subnet?
Answer:
Often in subnet design, you reserve a portion of each subnet for statically assigned addresses (servers, routers,
printers, network devices) and the rest for dynamic leases (hosts). For example, perhaps low-end (addresses
with lower numerical value) reserved for statics, high-end for DHCP. Also ensure you plan enough addresses in
both ranges.
14. What are some rules for grouping hosts into subnets?
Answer:
Group hosts that have similar function, location, traffic patterns or security needs. E.g. same VLAN, same
building/office, same department. Avoid mixing hosts across WAN links or remote sites in same subnet. Also
include routers/interfaces as needed.
15. What is a valid subnet mask, and how many different masks are possible between /8 and /30 for IPv4?
Answer:
A valid subnet mask is one where the mask has a contiguous sequence of 1 bits followed by contiguous 0 bits
(no gaps), e.g. 255.255.255.128 is valid (/25), but 255.255.255.192 is valid too /26. Between /8 and /30, that’s
23 possible masks (from /8 to /30 inclusive, but /31 and /32 used for special cases).
16. How do you convert a mask in dotted decimal to slash (prefix) notation and binary?
Answer:
Convert each octet into binary, count number of 1s from left until first 0 appears and sum them = prefix length.
For example, mask 255.255.254.0 → binary: 11111111.11111111.11111110.00000000 → that’s 23 ones →
/23.
17. Given IP 10.1.15.67 with mask 255.255.248.0, compute the subnet ID, broadcast address, first and last
usable host.
Answer:
255.255.248.0 = /21; block size in third octet = 8 (256 − 248). So subnets: third octet range 0-7, 8-15, 16-23,
etc. 15 falls in 8-15 block → subnet ID = 10.1.8.0. Broadcast = 10.1.15.255. First usable = 10.1.8.1. Last usable
= 10.1.15.254.
18. Why are the first and last addresses in a subnet reserved (network ID and broadcast) and not usable by
hosts?
Answer:
Network ID (subnet ID) is used to identify the subnet (all host bits zero), broadcast address (all host bits one) is
used to send to all hosts in subnet. They cannot be assigned to hosts because they have special roles in routing
and host-to-all communications.
Answer:
Classful addressing was the original scheme dividing IPv4 into fixed classes A, B, C based on first octet. Each
class had fixed default masks (/8, /16, /24). Subnetting came later, allowing subdivisions of these default
networks. CCNA considers classful for historical understanding, but current use is classless (CIDR, VLSM).
20. What is CIDR and how did it change IPv4 addressing and subnetting?
Answer:
CIDR stands for Classless Inter-Domain Routing. It allowed use of arbitrary prefix lengths instead of fixed class
A/B/C. It introduced route aggregation (supernetting) and more efficient IP allocation. Subnetting under classful
was limited; CIDR allows more flexible subdivision.
21. How many usable host addresses are available in a /29 subnet?
Answer:
/29 gives 2^{(32−29)} = 2^3 = 8 total addresses. Subtract 2 (network & broadcast) → 6 usable host addresses.
22. How many subnets and host addresses does a /27 mask provide on a Class C network?
Answer:
On a Class C default /24, changing to /27 means borrowing 3 bits for subnet (since /24 → /27). Number of
subnets = 2^3 = 8 subnets. Each subnet has host bits = 5 → 2^5−2=30 usable hosts per subnet.
23. How do you plan implementing IPv4 subnetting in an existing network that already has subnets in use?
Answer:
First, inventory existing subnets: IP ranges, usage, growth. Map which devices are in which subnet. Identify
free address space. Decide whether you need VLSM to add subnets of different sizes. Plan migration if needed
(minimize downtime). Document mask choices. Possibly reserve blocks for future.
24. What considerations are used when selecting which bits to borrow from host portion to form subnets?
Answer:
You must ensure you have enough subnet bits for required number of subnets, and enough host bits for largest
host count. Also consider growth, ease of management, simplicity vs efficiency, alignment with VLANs or
geographical sites. Borrowing too many host bits reduces usable hosts.
25. Question:
Given the network 10.0.0.0/8, you need at least 1000 subnets, each with at least 200 hosts. What single mask
would you use if you wanted one-size-fits-all?
Answer:
From /8:
Need ≥1000 subnets → S bits: 2^S ≥ 1000; 2^10 = 1024, so S = 10 bits → so mask becomes / (8 +10) = /18 →
so candidate mask /18 gives 14 host bits. Hosts per subnet = 2^{14} − 2 = 16382, which is more than 200. So
/18 works (though wasteful).
26. Question:
Answer:
/20 has 32 − 20 =12 host bits → total addresses = 2^{12} = 4096; usable hosts = 4096 − 2 = 4094.
27. Question:
What is the formula for calculating number of usable host addresses for any given mask?
Answer:
If the mask has H host bits, usable hosts = 2^H − 2. The ‘−2’ accounts for the network (all zeros) and broadcast
(all ones) addresses.
28. Question:
Answer:
Point-to-point links need only two addresses (one on each end). Using a large host-capacity subnet wastes
address space. Designers often use smallest possible subnet (e.g. /30 or /31 in modern cases) for WAN links for
efficiency. These count in number of needed subnets.
29. Question:
Answer:
A /30 subnet has 32 − 30 = 2 host bits → 2^2 = 4 total addresses; minus 2 → 2 usable hosts. Commonly used
for point-to-point links.
30. Question:
How do you choose which classful network (Class A, B, C) to use if you have a private address allocation?
Answer:
Pick the smallest classful network that contains enough address space for all planned subnets and hosts. Also
consider future growth. For example, if you need more than 65,534 hosts, a Class B (or /16) is needed; for
fewer, Class C or private block like 10.x.x.x may suffice. Classful view helps to start planning even though final
implementation uses classless masks.
31. Question:
What is the importance of documenting the subnet plan (which subnets assigned to what location or VLAN)?
Answer:
Documentation avoids address conflicts, overlapping subnets, misconfigurations. Helps operations: when
troubleshooting, when adding new subnets, when expanding. It also ensures consistency and makes it easier for
others to understand the design.
32. Question:
In classful network 192.168.0.0/16 using one mask /24, how many subnets and how many hosts per subnet do
you get?
Answer:
If using /24 in a /16 network: borrowed bits = 8 (24-16). Number of subnets = 2^8 = 256. Host bits = 8. Hosts
per subnet usable = 2^8 − 2 = 254.
33. Question:
Given 192.168.5.100/28, what is the subnet address, broadcast address, first usable and last usable addresses?
Answer:
/28 → block size in last octet = 16 (256-240 =16). Subnets start: .0, .16, .32, .48, .64, .80, .96, .112, etc. 100
falls in the subnet 192.168.5. 96/28. So subnet ID = 192.168.5.96. Broadcast = 192.168.5.111. First usable =
192.168.5.97. Last usable = 192.168.5.110.
34. Question:
What is subnet mask 255.255.254.0 in slash notation and how many hosts does it support?
Answer:
255.255.254.0 = /23 (since 255.255 = 16 bits, 254 gives 7 more bits = 23). Host bits = 9 → usable hosts = 2^9 −
2 = 510.
35. Question:
Answer:
Compare number of hosts currently in use vs capacity of subnet. If subnet mask gives far more addresses than
required and no growth expected, many addresses are wasted. Also if host counts vary across sites, having same
large subnet everywhere may waste space. Using VLSM or one-mask only when variability is small helps.
36. Question:
Answer:
Class A = /8 (255.0.0.0), Class B = /16 (255.255.0.0), Class C = /24 (255.255.255.0).
37. Question:
How many bits are in the “host portion” vs “subnet portion” when using mask /26 on a Class C network?
Answer:
Class C default network bits = 24. Mask /26 => 26 network bits = 24 original network + 2 subnet bits. Host bits
= 32 − 26 = 6.
38. Question:
Answer:
“Borrowing bits” refers to taking bits from the host portion of the default mask to use as additional
network/subnet bits. Those borrowed bits allow creation of smaller subnets. The number of bits borrowed
equals (required_mask_length minus default_mask_length).
39. Question:
If you need 8 subnets from a Class B network using one mask, how many bits do you borrow and what’s the
new mask?
Answer:
Class B default is /16. Need 8 subnets → 2^3 = 8, so borrow 3 bits. New mask = / (16 + 3) = /19.
40. Question:
What is the smallest subnet mask you can use on IPv4 to get at least 30 usable hosts?
Answer:
We look for H such that 2^H − 2 ≥ 30. H = 5 → 2^5 − 2 = 30 exactly. Host bits 5 → mask = /27 (since 32 −5
=27).
41. Question:
Why is /31 normally not used for subnets with hosts, and what special case allows /31?
Answer:
/31 gives only 2 addresses (host bits =1 → 2 addresses). Normally subtracting 2 leaves 0 usable addresses
(network + broadcast). However, in modern Cisco IOS, /31 is allowed for point-to-point links because network
and broadcast concept is not needed; two hosts can use both addresses.
42. Question:
How do you decide whether to use classful ranges vs private address block for new network design?
Answer:
Since classful public blocks are scarce and likely need public allocation, many designs use private blocks
(RFC-1918). If public addresses are required, ensure you have them. If inside only, private works. Also
consider whether future internet connectivity or NAT required.
43. Question:
What steps do you follow when designing subnets for a new internetwork (from scratch)?
Answer:
1. Analyze subnetting and addressing needs: number of hosts per site, number of subnets needed, growth.
2. Choose a classful network or private block.
3. Choose mask(s): decide if single mask or VLSM.
4. Build list of subnets: assign subnets to locations or VLANs.
5. Plan static vs dynamic address ranges.
6. Document everything.
44. Question:
Answer:
A supernet (or aggregation) is joining contiguous networks into a larger network to reduce routing table size. Its
perspective is useful when summarizing routes or working with CIDR. Subnetting is about dividing;
supernetting is about combining.
45. Question:
Given a requirement: 20 subnets, each with at least 100 hosts. From 192.168.0.0/16, what mask do you choose
with VLSM to avoid waste?
Answer:
You might carve out subnets with the smallest mask that fits 100 hosts: /25 gives 126 hosts. Use /25 for those
subnets that need ~100 hosts. For other small subnets (e.g. WAN links) use /30. Then you assign accordingly,
using VLSM. If using one mask for all, /25 would suffice but would be wasteful for tiny subnets.
46. Question:
Answer:
Calculate the subnet ID for that subnet. Then compare IP’s network bits (via mask) to subnet ID. If equal, the IP
is in that subnet. Otherwise not. Conversion to binary helps; or use block size math in decimal.
47. Question:
Answer:
Network address (subnet ID) and the broadcast address of each subnet are reserved (not usable by host devices).
Also, some addresses are reserved for special purposes (e.g. 127.0.0.0/8 loopback, 255.255.255.255 local
broadcast).
48. Question:
What is the formula for calculating the block size of a subnet given a mask (in decimal or slash)?
Answer:
Block size = 256 − value in the octet where the mask transitions from 1s to 0s. For example, mask /24 → block
in 4th octet = 256 − 0 = 256; mask /25 → 256 − 128 =128; mask /26 → 256 − 192 =64, etc.
49. Question:
Given a subnet mask of 255.255.252.0 (/22), how many subnets of /22 can you have inside a /16 network? How
many hosts per /22?
Answer:
Inside /16, /22 is 6 bits borrowed (22 −16 = 6). So number of /22 subnets = 2^6 = 64. Hosts per /22 = host bits =
(32 −22) =10 → usable hosts = 2^{10} −2 = 1022.
50. Question:
How do classful and classless addressing affect how you read subnetting requirements in exam questions?
Answer:
In classful, default network mask is implied by class (A/B/C), so if no mask given, you assume /8, /16, /24. In
classless (CIDR), the mask or prefix must be given or implied via context. Exam questions might omit mask to
test classful knowledge, or specify mask in slash or dotted form. You must be ready to interpret both.
51. Question:
52. Question:
What is a “supernet” wildcard mask or “summarization mask” for summarizing multiple /24 subnets (say
192.168.0.0/24 through 192.168.3.0/24)?
Answer:
Those four /24 subnets can be summarized into one /22 covering 192.168.0.0/22. The mask is 255.255.252.0.
Wildcard mask for that summary is 0.0.3.255.
53. Question:
Why does IPv4 subnetting need both the number of subnets and the number of hosts when selecting mask/bits?
Answer:
Because subnet bits and host bits are in trade-off: more subnet bits → fewer host bits and vice versa. If you
choose a mask that meets subnet count but not host count, you will not have enough host addresses. The mask
must satisfy both constraints.
54. Question:
What is the effect of having too many host bits vs. too few?
Answer:
Too many host bits (i.e. mask is too small) → fewer subnets than needed, possibly exceeds address range. Too
few host bits (mask too large) → insufficient host addresses in some subnets; hosts will not fit; could require
readdressing or redesign.
55. Question:
What are “classful network numbers” and how do they affect mask defaults?
Answer:
Classful network numbers refer to IP addresses whose first octet falls into class A (1-126), B (128-191), or C
(192-223). Default masks: /8, /16, /24 respectively. In design, one may start with classful block, then subnet it.
In operational view, sometimes labeling or documentation still refers to classful network numbers even though
underlying routing is classless.
56. Question:
Given a requirements document that says “each of 10 branch offices needs at least 30 hosts”, what mask would
you choose for each branch if using one mask across all, and using private network 10.0.0.0/16?
Answer:
Need ≥30 hosts → 2^H −2 ≥30; H=5 yields 30 (2^5 −2=30). So need host bits =5; subnet mask = / (16 + (bits
borrowed) ) → need 5 host bits leaves 11 bits for subnets (since total host bits =5, so borrowed from 16
network+subnet bits to get mask of /27). So mask = /27 (255.255.255.224). Each branch office subnet would
be /27 (usable hosts per subnet = 30).
57. Question:
Answer:
Typically, reserve a block of IP addresses at the low end of each subnet for static assignments (network devices,
servers, switches, routers). Reserve the rest for dynamic (DHCP) leases. For example, in 192.168.1.0/24, static
might be .1-.50, DHCP from .100-.200. Ensure DHCP pool does not overlap statics.
58. Question:
What command or calculation do you use to find the broadcast address of a subnet given an IP and mask?
Answer:
Calculate subnet ID by ANDing IP with mask. Then in host bits, set all bits to 1 → that gives broadcast address.
In binary helps, but you can use decimal block size (for mask) to find range.
59. Question:
Answer:
Each VLAN typically corresponds to a separate Layer-3 broadcast domain, so needs its own subnet. Planning
subnets by VLAN ensures isolation, simplifies routing, security, and management. Also makes design
consistent, predictable.
60. Question:
What is the maximum number of subnets you can create with mask /29 inside a /24 network?
Answer:
/24 → host bits =8; /29 → borrowed bits = (29 −24)=5; so number of /29 subnets = 2^5 = 32.
61. Question:
Answer:
/25 → block size 128 in the last octet. Subnet IDs are 0,128. 10.0.1.128 is subnet ID. Smallest usable =
10.0.1.129. Broadcast = 10.0.1.255.
62. Question:
Answer:
Summarization (supernetting) combines multiple contiguous networks into a single larger prefix. Routers
advertise fewer, broader routes, reducing routing table entries and improving efficiency. Helps in ISP or WAN
aggregation.
63. Question:
Answer:
These are four /24s from .2 to .5 inclusive; they are contiguous. Summarization masks: you need combine
into /22 starting at 192.168.2.0/22 (covers .2, .3, .4, .5).
64. Question:
What is the default gateway address you would assign in a subnet 192.168.10.0/28, and why?
Answer:
Typically choose the first usable host address in the subnet for gateway. In 192.168.10.0/28, usable range
is .1-.14 (since .0 is ID, .15 broadcast). So .1 is commonly gateway.
65. Question:
What happens if you miscalculate the mask and assign overlapping subnets?
Answer:
Overlapping subnets lead to address conflicts, routing ambiguity, devices might think two hosts are on the same
subnet when they’re not, or vice versa. Network traffic may be misrouted or dropped.
66. Question:
How to check whether a given IP and mask are valid for network boundary (i.e. whether the IP is a valid host
address)?
Answer:
Compute subnet ID and broadcast; ensure IP is neither of those. Also ensure IP when masked doesn’t yield an
address outside the intended network.
67. Question:
In classful addressing, what is the significance of the first octet in deciding class?
Answer:
First octet binary pattern indicates class:
0xxxxxxx → Class A (1-126),
10xxxxxx → Class B (128-191),
110xxxxx → Class C (192-223). Default masks accordingly /8, /16, /24.
68. Question:
69. Question:
Given requirement: 5 WAN point-to-point links, 4 branch LANs needing 200 hosts each, and 1 HQ LAN
needing 500 hosts, design a subnet plan with appropriate sizes using VLSM or single mask.
Answer:
Using VLSM:
HQ LAN: needs ≥500 hosts → 2^9 −2=510 so /23 (hosts bits =9)
Branch LANs with 200 hosts → /25 gives only 126 (too small), need /24 gives 254 usable, or /25 +
more? Actually /24 works (hosts 254)
WAN links: each needs 2 hosts → use /30 for each
Then assign from a private block (e.g. 10.0.0.0/16), allocate largest first, then smaller ones.
70. Question:
Answer:
“Network address” is sometimes used to refer to the entire classful or super-network (e.g. a Class B network
172.16.0.0). “Subnet address” is one of the subdivisions of that network after subnetting. But often they are
used interchangeably. Best practice is to say “subnet address” when referring to each smaller piece.
71. Question:
Answer:
Because when you borrow bits for subnetting, the number of subnets is always a power of two (2^S). If you try
to get non-power of two, you waste bits or have overlapping or gaps.
72. Question:
How do you plan address allocation so that subnets close to each other or in similar geography have contiguous
numeric ranges?
Answer:
When designing, align subnets such that similar sites or VLANs are packed in numeric order; leave blank
blocks in between for expansion; use contiguous ranges to simplify summarization; document accordingly.
73. Question:
What is the smallest subnet size possible (usable for hosts) if you cannot use /31 or /32?
Answer:
Smallest common usable subnet is /30 (which gives 4 total addresses, 2 usable hosts). /32 is a single address,
/31 sometimes used for point-to-point links in modern IOS but often excluded in classical subnetting.
74. Question:
How do you handle broadcast domain size when doing subnetting design?
Answer:
Subnetting reduces broadcast domain size (fewer hosts per subnet). You aim for manageable size so broadcast
traffic does not overwhelm network. Also align VLAN design with subnets to keep broadcast traffic localized.
75. Question:
What command(s) or steps might you use in a Cisco router to verify interface IP address and mask after
implementing subnet design?
Answer:
show ip interface brief
show running-config interface GigabitEthernet0/0
These will display which IP addresses/masks are assigned and whether interfaces are up.
76. Question:
Answer:
Classless routing protocols (like EIGRP, OSPF, RIPv2) carry both network/prefix and mask information. They
allow VLSM, support non-default masks. They send subnet mask with network advertisement, allowing routers
to understand variable masks.
77. Question:
What is the operational command to verify the routing table for networks that have been subnetted?
Answer:
show ip route
This shows all known networks, including those subnets, their prefix lengths, and how they are reachable
(static, connected, dynamic).
78. Question:
What is the effect of using /30 subnets for WAN links on address usage?
Answer:
/30 uses 2 host bits → gives 4 total addresses, 2 usable. It minimizes waste on point-to-point links. Many WAN
links are point-to-point so /30 is efficient.
79. Question:
Answer:
“2^H − 2” gives the number of usable host addresses in a subnet, where H = number of host bits. Subtract 2
because one address is needed for the subnet ID (all host bits zero), and one for the broadcast address (all host
bits one).
80. Question:
What is a possible drawback of using very large subnets (many host bits)?
Answer:
Large subnets mean more hosts per broadcast domain → more broadcast traffic → possible performance
degradation. Also more difficult to manage, potential for IP address waste, security/performance issues, and less
granular control.
81. Question:
How do you plan for size growth in a subnet (e.g., anticipating more hosts in a branch office)?
Answer:
Choose a mask that has extra host capacity beyond current needs. Leave unused subnets or reserved blocks for
that location so future growth can be accommodated without major renumbering. Document these reserves.
82. Question:
Given the existing subnet 10.10.0.0/24 in use, and you need to add another subnet for 50 hosts, how would you
allocate from a larger /16 if possible?
Answer:
If the organization owns 10.0.0.0/16, you could allocate a new /26 or /25 for the 50 hosts: /26 gives 62 usable
hosts; /25 gives 126. Choose /26 to conserve space. Example: existing 10.10.0.0/24; new could be 10.10.1.0/26
for 62 hosts.
83. Question:
Answer:
Host bits = (32 −29)=3 → total addresses =8 → usable hosts = 8 −2 = 6.
84. Question:
Why must you avoid subnet masks with non-contiguous mask bits (i.e. gaps in the mask)?
Answer:
Non-contiguous masks are invalid; IPv4 masks must have contiguous 1s from MSB onward then contiguous 0s.
Non-contiguous cause undefined behavior; many routers/OS will reject or misinterpret them.
85. Question:
How do you compute block size and next subnet boundaries when you borrow bits in the third octet vs fourth
octet?
Answer:
If mask extension is in third octet (e.g. /17-/23), block size refers to value of that octet. If in fourth octet (e.g.
/25-/30), block size in fourth octet. Block size = 256 − (value of mask’s octet). Use that to compute boundaries.
86. Question:
What is the network address and broadcast for subnet 200.100.50.200 /29?
Answer:
/29 gives block size =8 in last octet. Subnets in that /24 are 200-207, 208-215, etc. 200 lies in 200-207 block.
Subnet ID = 200.100.50.200 & mask = 200.100.50.200 → when masked = 200.100.50.200 − (200 mod 8) =
200.100.50.200 − (200 mod 8=200− (8×25)=200−200=0) hmm correction: 200 ÷8 =25 exactly, so block starts:
200. So subnet ID = 200.100.50.200 & 255.255.255.248 = 200.100.50.200 & 248 = 200.100.50.200 (since 200
is multiple of 8). So network = 200.100.50.200. Broadcast = last in block = 200.100.50.207. First usable = .201;
last usable = .206.
87. Question:
What are some real-world constraints you might need to consider when designing subnets besides pure host
count?
Answer:
Constraints include: geographic distribution, VLAN segmentation, routing device limits, security zones,
broadcast traffic control, device capacity, administrative overhead, future growth, address management policies,
compatibility with existing infrastructure. Design must balance technical and operational concerns.
88. Question:
What is a useful process for interpreting somebody else’s subnetting plan (operational view)?
Answer:
1. Gather documentation and diagrams. 2. List all subnets, masks, IP ranges. 3. For each subnet, determine
host capacity vs usage. 4. Identify unused or underused address spaces. 5. Look for consistency (are
mask sizes logical across similar functions). 6. Check for overlaps or gaps. 7. Suggest optimizations
(VLSM, summarization) if needed.
Here are 88 original CCNA-style questions & detailed Answers focused on the “Analyzing Classful IPv4
Networks” section. Each is plaintext; Explanations are detailed; CLI or OS commands are in bold on separate
lines embedded in the text. You can copy-paste directly into your study notes or documentation.
1. Question:
Answer:
A classful IPv4 network is one that adheres to the original classification into Class A, B, or C, using fixed
default masks (/8, /16, /24) without regard to custom masks. The network, host portions are determined by its
class. Even though modern networks use classless masks (CIDR), classful addressing is still taught to help
analyze and understand network behavior.
2. Question:
What are the leading bits (most significant bits) patterns for Class A, B, and C networks?
Answer:
Class A addresses start with 0 in their first bit (binary: 0xxx xxxx)
Class B addresses start with 10 (binary: 10xx xxxx)
Class C addresses start with 110 (binary: 110x xxxx)
These patterns let you identify an IP’s class by looking at the first octet in binary.
3. Question:
What are the default subnet masks for Class A, B, and C networks in dotted decimal and prefix notation?
Answer:
Class A: default mask is 255.0.0.0 → /8
Class B: default mask is 255.255.0.0 → /16
Class C: default mask is 255.255.255.0 → /24
These masks define the network portion bits and the host bits under classful addressing.
4. Question:
Given an IP address 23.45.67.89, what class is it, what is its network ID (classful), default mask, number of
hosts possible?
Answer:
IP 23.45.67.89 is a Class A address (first octet 23 is between 1-126). Default mask: /8 (255.0.0.0). Network ID
(classful) is 23.0.0.0. Hosts per classful network = with host bits = 24 (since /8 means 8 network bits, 24 host
bits) → usable hosts = 2^{24} − 2 = 16,777,214.
5. Question:
Which classful networks are reserved or have special meaning (e.g. loopback, zero network)?
Answer:
0.0.0.0/8 is reserved (used for “this network” or default routes)
127.0.0.0/8 is reserved for loopback (127.0.0.1 etc.)
Addresses starting with those are not usable for standard Class A host networks.
6. Question:
What is the broadcast address for the classful network for IP 150.20.30.40?
Answer:
150.20.30.40 is Class B (first octet between 128-191). Default mask /16. Network ID = 150.20.0.0. Broadcast
address = 150.20.255.255 (all host bits set to 1 in last two octets).
7. Question:
What is the first usable host and last usable host for classful network 192.168.10.50?
Answer:
192.168.10.50 is Class C (first octet between 192-223). Default mask /24. Network ID = 192.168.10.0.
Broadcast = 192.168.10.255. First usable = 192.168.10.1. Last usable = 192.168.10.254.
8. Question:
How many total classful networks exist in Class A (not counting reserved ones)?
Answer:
There are 128 possible values for first octet in Class A (0-127), but 0.0.0.0/8 is reserved, and 127.0.0.0/8 is for
loopback, so only 126 usable Class A networks.
9. Question:
Answer:
Default class B mask is /16. Host bits = 16. Usable hosts = 2^{16} − 2 = 65,534.
10. Question:
If you are given an IP 200.100.5.25, what class is this and what default mask applies?
Answer:
200.100.5.25 → first octet 200 falls in range 192-223 → Class C. Default mask: 255.255.255.0 (/24).
11. Question:
How many host bits are there in a class A, B, and C network by default?
Answer:
Class A: host bits = 24 (since /8 network bits)
Class B: host bits = 16 (since /16)
Class C: host bits = 8 (since /24)
12. Question:
Answer:
130.45.100.200 is Class B (first octet 130). Default mask /16: network ID = 130.45.0.0.
13. Question:
Explain why the classful architecture is inefficient for many modern networks.
Answer:
Because it forces fixed sizes: Class A very large (over 16 million hosts), Class B moderate (~65K), Class C
small (254). Many organizations need host-counts in between say a few thousand, making Class B too big
(wastes addresses), Class C too small. Also many small networks have far fewer hosts than 254 but are forced
to consume whole Class C. Leads to wastage. Classless (CIDR, VLSM) addresses this inefficiency.
14. Question:
What are the numeric ranges (first octet) for Class A, B, and C networks?
Answer:
Class A: 1 to 126 (0 and 127 are special/reserved)
Class B: 128 to 191
Class C: 192 to 223
15. Question:
Given IP address 126.255.255.254, what class is it? Is it valid as a host, and what is its broadcast?
Answer:
126.255.255.254 → Class A (first octet 126). It is a valid host address in classful network 126.0.0.0/8.
Broadcast address (classful) = 126.255.255.255. First usable host = 126.0.0.1. Last = 126.255.255.254.
16. Question:
Given classful network 172.16.5.100, default mask, what is the first and last usable host?
Answer:
172.16.5.100 → Class B (first octet 172). Mask /16. Network ID = 172.16.0.0. Broadcast = 172.16.255.255.
First usable = 172.16.0.1. Last usable = 172.16.255.254.
17. Question:
Answer:
Class D, which is 224.0.0.0 to 239.255.255.255, is reserved for multicast addresses. (Not part of unicast Class
A/B/C).
18. Question:
Answer:
Class E, from 240.0.0.0 to 255.255.255.255 is reserved (not for general use).
19. Question:
What is the total number of addressable hosts in Class A and Class C networks by default (usable)?
Answer:
Class A: usable hosts = 2^{24} −2 = 16,777,214
Class C: usable hosts = 2^8 −2 = 254
20. Question:
Given IP 223.10.20.30, what class is it, and what is its network and broadcast?
Answer:
223.10.20.30 → first octet 223 → Class C. Default mask /24. Network = 223.10.20.0. Broadcast =
223.10.20.255. First usable = .1, last usable = .254.
21. Question:
Given IP 128.0.0.1, is that a valid host in Class B? What are first & last usable?
Answer:
128.0.0.1 is in Class B (first octet 128). Default mask /16. Network = 128.0.0.0. Broadcast = 128.0.255.255.
First usable = 128.0.0.1. Last usable = 128.0.255.254.
22. Question:
How would you verify the address and mask configuration on a Cisco router after assigning a classful network
to an interface?
Answer:
Use:
and
These commands show the assigned IP, mask, and interface status, which helps verify correct classful
configuration.
23. Question:
Why is the address 127.50.100.1 not usable for assignment to a host, even though it seems like Class A?
Answer:
127.0.0.0/8 is reserved for loopback/testing; any address in that range (127.x.x.x) is loopback. So 127.50.100.1,
though Class A in numeric range, cannot be used as a regular host.
24. Question:
Answer:
0.0.0.0/8 was originally reserved or used to refer to “this network” or default routes. It is not usable like a
normal Class A network. Addresses with first octet 0 are special.
25. Question:
If given an IP 100.200.50.25, what class is it, and how many hosts does its classful network support?
Answer:
100.200.50.25 → first octet 100 (between 1-126) → Class A. Default mask /8. Hosts supported by classful
network = 2^{24} −2 = 16,777,214 usable hosts.
26. Question:
Describe how to derive the network ID and broadcast address from any classful IP address without knowing the
mask (assuming default mask).
Answer:
1. Identify IP’s class by first octet (A, B, or C).
2. Use default mask for that class.
3. Compute network ID: set host part bits to zero.
4. Broadcast address: set host part bits to one.
5. First usable = network ID + 1, last usable = broadcast −1.
27. Question:
Answer:
End of Class A: 127.255.255.255 (but Class A usable ends at 126.255.255.255 because 127.x.x.x is
loopback)
Start of Class B: 128.0.0.0
End of Class B: 191.255.255.255
Start of Class C: 192.0.0.0
End of Class C: 223.255.255.255
28. Question:
What is the difference between network ID and host ID in classful address terms?
Answer:
Network ID (also called network portion) is the fixed part of an address determined by class (default mask). All
addresses in that network share that portion. The host ID is the remainder bits that vary for hosts within that
network. The host ID uniquely identifies the device in that network.
29. Question:
Answer:
10.10.5.6 is Class A. Default mask /8. Network = 10.0.0.0. Broadcast = 10.255.255.255.
30. Question:
An IP address 191.255.100.10 is given. What is the class, mask, number of host bits, and number of possible
hosts?
Answer:
191.255.100.10 → first octet 191 → Class B. Default mask /16. Host bits = 16. Possible usable hosts = 2^{16}
−2 = 65,534.
31. Question:
Why were classes D and E created, and are they part of classful unicast addressing?
Answer:
Class D (224.0.0.0 to 239.255.255.255) is for multicast addresses. Class E (240.0.0.0 to 255.255.255.255) is
reserved for future or experimental use. They are not part of classful unicast addressing (i.e. not used for host
assignment).
32. Question:
Given IP 172.16.100.50, what is its network ID and how many networks exist in Class B total?
Answer:
172.16.100.50 → Class B. Network ID = 172.16.0.0. Total Class B networks = values from 128.0.0.0 to
191.255.0.0, i.e. 16,384 networks.
33. Question:
What is the structure of an IPv4 classful address (number of network octets, host octets) for each class?
Answer:
Class A: network octet count = 1 (first octet), host octet count = 3 (last three octets)
Class B: network octet count = 2, host octet count = 2
Class C: network octet count = 3, host octet count = 1
34. Question:
What is a common CLI or OS command to verify address, mask, and network IDs on a host or router?
Answer:
On Cisco router:
show ip interface brief
On a host (Linux):
ip addr show
These show the assigned IP, mask (or prefix), from which one can derive classful network ID.
35. Question:
Given IP 123.45.67.89, what is the first usable host, last usable, network, broadcast under classful default?
Answer:
123.45.67.89 → Class A, default /8. Network = 123.0.0.0; Broadcast = 123.255.255.255. First usable =
123.0.0.1; Last usable = 123.255.255.254.
36. Question:
Why might someone ask classful network questions in CCNA, even though classless (CIDR) is more used in
practice?
Answer:
Because classful is foundation: helps with understanding masks, default behavior, historical context. It also
helps in troubleshooting when you see default masks in old configs or devices. CCNA includes classful analysis
so you can quickly infer network ID, broadcast, etc, from just IP and its class.
37. Question:
Answer:
Default class C = /24 → host bits = 8 → usable hosts = 2^8 −2 = 254.
38. Question:
Given IP 129.100.200.50, how many hosts are there in its classful network, and what is its mask?
Answer:
129.100.200.50 is Class B (first octet between 128-191). Default mask /16 (255.255.0.0). Host bits = 16. Usable
hosts = 65,534.
39. Question:
What is the network ID for 192.0.2.123 in classful context, and is that network private or public?
Answer:
192.0.2.123 is Class C. Default /24 → network ID = 192.0.2.0. That address block (192.0.2.0/24) is part of a
reserved block for documentation/examples; not strictly private under RFC 1918. It is a public reserved “TEST‐
NET-1” block. So it’s public (reserved).
40. Question:
How many host addresses are possible in all Class C networks total (i.e. per network, not sum of all networks)?
Answer:
Per Class C network: 254 usable hosts (256 − 2).
41. Question:
Which classful network provides the largest number of addresses per network?
Answer:
Class A, with /8 default, has 24 host bits → gives 2^{24} −2 usable addresses = 16,777,214, which is far larger
than Class B or C.
42. Question:
Answer:
200.200.200.200 is Class C. Default mask /24. Network ID = 200.200.200.0. Broadcast = 200.200.200.255.
43. Question:
Given an IP 100.0.0.0, is that a valid host? What class and what is broadcast & first usable?
Answer:
100.0.0.0 is Class A. The address 100.0.0.0 is the network ID for that classful network (100.0.0.0/8), not a
usable host address. First usable = 100.0.0.1; broadcast = 100.255.255.255.
44. Question:
Answer:
224.5.6.7 is in Class D (224-239). Class D is for multicast; not usable for standard host addressing. So you
cannot assign it to a host.
45. Question:
What is the total number of networks in each class (A, B, C), using classful definitions (excluding those
reserved)?
Answer:
Class A: 126 networks (1.0.0.0 to 126.0.0.0)
Class B: 16,384 (128.0.0.0 to 191.255.0.0 by default)
Class C: 2,097,152 (192.0.0.0 to 223.255.255.0)
46. Question:
If you have IP 58.123.45.6, what class is it, what is its network and broadcast (classful), and usable host range?
Answer:
58.123.45.6 → first octet 58 → Class A. Default mask /8. Network = 58.0.0.0. Broadcast = 58.255.255.255.
First usable = 58.0.0.1. Last usable = 58.255.255.254.
47. Question:
Why is the classful concept still relevant to exams/troubleshooting even though classless addressing is standard?
Answer:
Because many study questions, old devices or default configurations still use default masks; troubleshooting
sometimes involves recognizing misconfigurations where someone assumed default mask; understanding class
helps when IP mask omitted or when diagnosing errors involving old classful routing protocols. Helps to
rapidly derive network ID, broadcast, etc.
48. Question:
Given IP 191.0.0.1, what is its class, network ID, and how many host addresses are in that classful network?
Answer:
191.0.0.1 → Class B. Default mask /16. Network ID = 191.0.0.0. Host addresses usable = 2^{16} −2 = 65,534.
49. Question:
Given IP 192.168.0.1, is that a classful private address, and what is its default mask and broadcast?
Answer:
192.168.0.1 → Class C, private (RFC 1918). Default mask /24. Broadcast = 192.168.0.255. First usable =
192.168.0.1 (though often gateway is .1), last usable = .254.
50. Question:
What is the effect of giving a host an IP address with a non-default mask while still considering classful
behavior?
Answer:
If non-default mask is given, classful assumptions no longer apply—it becomes classless (CIDR). But analyzing
classful means ignoring custom mask: class defines default mask. In operation though, actual mask used by
host/router matters more. Exams often distinguish classful vs classless.
51. Question:
What CLI command on a Cisco device shows whether the interface is using the default mask or a custom mask?
Answer:
show running-config interface [interface name]
Look at the IP address line; if mask is /8, /16, or /24 matching default for its class, it is default; otherwise
custom. Also,
Shows IP/mask.
52. Question:
Given address 11000000.10101000.00000001.00001010 in binary, what is its class, decimal form, network ID
and default broadcast?
Answer:
Binary first octet “11000000” = 192 decimal → Class C. The rest octets are 168.1.10. So IP = 192.168.1.10.
Default mask /24. Network ID = 192.168.1.0, broadcast = 192.168.1.255.
53. Question:
If you see an IP 129.0.0.0 with mask 255.255.255.0 on interface, is that default classful, and what problems
might that cause?
Answer:
129.0.0.0 is Class B, default mask /16. Mask 255.255.255.0 is /24, which is more specific. That’s classless
behavior. Problems: hosts in the same “classful” network may assume /16 but actual mask /24;
miscommunication; routing or access issues if someone assumes default.
54. Question:
Answer:
Class A default network has 24 host bits: usable hosts = 2^{24} −2 = 16,777,214.
55. Question:
What classful class would IP 225.1.2.3 belong to and what is its use?
Answer:
225.1.2.3 → falls in Class D (224-239). Class D is used for multicast; not for unicast host addressing.
56. Question:
Answer:
150.0.0.0 is Class B → default /16 mask. Broadcast = 150.0.255.255.
57. Question:
Given IP 200.0.0.0, is that the first usable host of its classful network?
Answer:
200.0.0.0 is Class C (first octet in 192-223) but 200.0.0.0 is the network ID for the classful network
200.0.0.0/24. The first usable host would be 200.0.0.1.
58. Question:
What is the difference between an IP’s class and its mask when mask is not default?
Answer:
Class refers to default network size (A/B/C) based on the IP’s first octet. Mask determines how many network
bits are actually in use. If mask is not default, then classful range gives initial idea, but mask overrides default
for actual network size. Class helps in analysis/troubleshooting.
59. Question:
Given that classful networks assume default mask, what is the usable host range for the Class B network whose
first octet is 150?
Answer:
Network = 150.0.0.0/16. Usable hosts: first usable 150.0.0.1; last usable 150.255.255.254.
60. Question:
How many total addresses (including network and broadcast) are in a default class C network?
Answer:
/24 → 2^8 = 256 total addresses; usable = 256 − 2 = 254 (excluding network & broadcast).
61. Question:
Given IP 140.20.5.200, what is its class, network address, and how many networks like this exist in Class B?
Answer:
140.20.5.200 → Class B. Network address = 140.20.0.0. Total number of Class B networks = 16,384.
62. Question:
What is the “host ID all zeroes” and “host ID all ones” for classful networks, and why are they reserved?
Answer:
Host ID all zeroes → network ID (identifies network itself)
Host ID all ones → broadcast address (used to send to all hosts in the network)
63. Question:
Given first octet value 127, what class is assumed and why is it special?
Answer:
127 is in the Class A range (1-126), but 127.0.0.0/8 is reserved for loopback. So addresses starting with 127 are
not used for standard host networks.
64. Question:
Given IP 192.255.100.5, what is default mask, network, broadcast, first & last usable?
Answer:
192.255.100.5 → Class C. Default mask /24. Network = 192.255.100.0. Broadcast = 192.255.100.255. First
usable = 192.255.100.1. Last usable = 192.255.100.254.
65. Question:
Given IP 172.31.255.254, what class is it, network, broadcast, and is host valid?
Answer:
172.31.255.254 → Class B (172 is between 128-191). Default /16. Network ID = 172.31.0.0. Broadcast =
172.31.255.255. Last usable = 172.31.255.254; yes valid. First usable = 172.31.0.1.
66. Question:
Given IP 223.255.255.255, what class and what is special about that address?
Answer:
223.255.255.255 → Class C. Broadcast for network 223.255.255.0 (classful /24). It is the broadcast address of
that network. Not usable by a host.
67. Question:
How many hosts are possible in a classful Class A network if one uses private address space like 10.0.0.0/8?
Answer:
10.0.0.0/8 is Class A private network. Usable hosts = 2^{24} −2 = 16,777,214.
68. Question:
What is the network address for 224.0.0.5, and can it be used as a classful network?
Answer:
224.0.0.5 is in Class D → multicast. There is no classful network in the sense of A/B/C. It cannot be thought of
as host-assignable classful network.
69. Question:
Given address 1.2.3.4, what class is it, how many networks exist like it in that class, and how many hosts per
network?
Answer:
1.2.3.4 → first octet 1 → Class A. Number of Class A networks usable = 126. Hosts per network = 2^{24} −2 =
16,777,214.
70. Question:
Given address 130.10.20.30, what is classful network’s total address space and address type (public or private)?
Answer:
130.10.20.30 → Class B. Total address space for that classful network = ~65,536 addresses (including network
& broadcast), usable hosts = 65,534. It is a public address (not in private RFC 1918 range, since private class B
is 172.16.0.0-172.31.255.255).
71. Question:
Which of the following IPs is Class B: 127.0.0.1, 128.0.0.1, 191.255.0.1, 192.0.0.1? What is special about 127?
Answer:
128.0.0.1 → Class B
191.255.0.1 → Class B
192.0.0.1 → Class C
127.0.0.1 is in the loopback reserved Class A block (special, not usable as host on network).
72. Question:
Given IP 100.200.255.254, what is network, broadcast, first and last usable for its classful network?
Answer:
100.200.255.254 → Class A (100). Default /8. Network = 100.0.0.0. Broadcast = 100.255.255.255. First usable
= 100.0.0.1. Last usable = 100.255.255.254.
73. Question:
How would you derive the number of bits in network portion vs host portion of a classful address?
Answer:
Based on class:
Class A: network bits = 8; host bits = 24
Class B: network bits = 16; host bits = 16
Class C: network bits = 24; host bits = 8
74. Question:
Given IP 170.16.20.30, what is its class, and how many Class B networks exist in total (usable)?
Answer:
170.16.20.30 → Class B. Total class B networks = 16,384.
75. Question:
What is first usable host, last usable, network, broadcast of 172.200.100.0 (classful)?
Answer:
172.200.100.0 → Class B, default /16. Network = 172.200.0.0. Broadcast = 172.200.255.255. First usable =
172.200.0.1. Last usable = 172.200.255.254.
76. Question:
Given an IP in Class C, what is the decimal value of broadcast address given default mask?
Answer:
For any Class C network x.y.z.w, with default /24, broadcast = x.y.z.255. Example: if IP 203.68.10.15 →
broadcast = 203.68.10.255.
77. Question:
How many total Class C networks are there in the IPv4 space?
Answer:
There are 2,097,152 Class C networks (from 192.0.0.0 through 223.255.255.0 stepping by /24).
78. Question:
Answer:
11.253.99.100 → Class A. Network = 11.0.0.0. First usable = 11.0.0.1. Broadcast = 11.255.255.255. Last usable
= 11.255.255.254.
79. Question:
What is the default mask for a “private” Class B network, and what ranges are private in classful addressing?
Answer:
Default mask for Class B = 255.255.0.0 (/16). Private Class B range per RFC 1918 is 172.16.0.0 through
172.31.255.255.
80. Question:
Given IP 172.31.5.100, what classful broadcast is used, first and last usable?
Answer:
172.31.5.100 → Class B. Network = 172.31.0.0. Broadcast = 172.31.255.255. First usable = 172.31.0.1. Last
usable = 172.31.255.254.
81. Question:
Given that classful Class A gives many hosts, why is default Class A mask not usually used in modern network
segments?
Answer:
Because most networks don’t have millions of hosts; using Class A default wastes huge address space, increases
broadcast domain size, reduces efficiency, security, manageability. Modern practice uses classless masks
(CIDR/VLSM) to allocate more appropriately sized networks.
82. Question:
What command on a router helps verify if IP forwarding is happening for classful networks?
Answer:
show ip route
If connected networks (classful) appear, and routing table entries for remote classful networks are known or
reachable, then forwarding is working. Also check interfaces up.
83. Question:
Given IP 64.100.200.50, what class is it and what is its network and host portion by default?
Answer:
64.100.200.50 → Class A (1-126). Default mask /8. Network portion = first octet “64”. Host portion = last three
octets “100.200.50”.
84. Question:
Given IP 192.168.255.100, what class, network, first and last usable, broadcast?
Answer:
192.168.255.100 → Class C. Network = 192.168.255.0. Broadcast = 192.168.255.255. First usable = .1, last
usable = .254.
85. Question:
Answer:
Because it’s inefficient: fixed network sizes lead to address waste; cannot match varied host counts. It was
replaced by classless addressing—CIDR (Classless Inter-Domain Routing)—which allows arbitrary mask sizes,
route aggregation, and more efficient allocation.
86. Question:
Given an address 203.0.113.7, which class is it, default mask, and how many hosts total?
Answer:
203.0.113.7 → first octet 203 → Class C. Default mask /24. Total usable hosts = 254.
87. Question:
Answer:
255.255.255.255 is the IPv4 limited broadcast address. It is not part of any classful network as a usable host. It
is used to broadcast to all hosts on the local network.
88. Question:
Given IP 0.0.0.0, what classful range does it fall in, and what special meaning does it have?
Answer:
0.0.0.0’s first octet is 0, which in classful would be “Class A” range, but 0.0.0.0/8 is reserved (the “this
network” address or default route specifier). So 0.0.0.0 is not usable as a normal host network ID.
Here are 88 CCNA-style questions & Answers focused on the “Analyzing Subnet Masks” section. Each follows
the same plaintext format. CLI or OS commands are bold and embedded within Answers where relevant. You
can copy-paste directly into your study notes or documentation.
1. Question:
2. Question:
How do you convert a dotted-decimal subnet mask (e.g. 255.255.255.192) to prefix (CIDR) notation?
Answer:
Convert each octet into binary, count all the ‘1’ bits from leftmost to right until you’ve accounted for all octets.
For 255.255.255.192: binary is 11111111.11111111.11111111.11000000 → that’s 26 ones → so prefix is /26.
3. Question:
How do you convert a prefix length (e.g. /22) to dotted decimal subnet mask?
Answer:
Think of /22 as 22 bits of 1s followed by 10 bits of 0s. That means first three octets are full 1s (24 bits) except
that /22 is two bits fewer than 24, so the third octet will have 6 bits of 1 then 2 bits of 0. The first octet = 255,
second = 255, third = (11111100) = 252, fourth = 0. So mask = 255.255.252.0.
4. Question:
What is the rule about validity of subnet masks in IPv4 in terms of bits?
Answer:
A valid IPv4 subnet mask must have all the 1s contiguous starting from the most significant bit, then all 0s to
the right. You cannot have a mask that is something like: 11111111.11111111.11111111.10100000 (because
there’s a ‘0’ between 1s). That violates the contiguous 1s then 0s rule.
5. Question:
Given IP 192.168.1.73 with mask 255.255.255.224, what is the network (subnet) address?
Answer:
Mask 255.255.255.224 is /27 (binary: 11111111.11111111.11111111.11100000), block size in last octet = 32.
The interesting octet is the fourth. We find which multiple of 32 the IP’s last octet fits in: 73 ÷ 32 = 2 remainder
9 → the second block (block 2 *32 =64). So subnet ID = 192.168.1.64.
6. Question:
Given the same IP 192.168.1.73/27, what is the broadcast address and usable host range?
Answer:
Subnet ID = 192.168.1.64 (from previous). Broadcast is the last address in that block: with block size 32 → 64
+ 31 = 95 → broadcast = 192.168.1.95. Usable hosts are 192.168.1.65 through 192.168.1.94.
7. Question:
How many usable hosts are in a /29 subnet?
Answer:
A /29 mask means 32−29 = 3 host bits → total addresses = 2^3 = 8. Subtract 2 for network & broadcast →
usable hosts = 6.
8. Question:
How many subnets and how many usable hosts per subnet are there if you subnet a /24 into /26 subnets?
Answer:
/24 → host bits 8. If you use /26, you borrow 2 bits for subnet (26−24 =2), so number of subnets = 2^2 =4. Host
bits per /26 = 6 (32−26), usable hosts per /26 = 2^6 −2 =62.
9. Question:
What is the “interesting octet” when analyzing a subnet mask like 255.255.240.0?
Answer:
That mask is /20 (first two octets full 1s => 16 bits, then 4 bits of 1 in third octet gives 20). The interesting octet
is the one where bits change from 1s to 0s — here it is the third octet (240 decimal, binary 11110000). That
octet determines the block size for subnet increments and boundary addresses.
10. Question:
Using mask 255.255.240.0 on network 172.16.0.0, what are the subnets, subnet ID for the 5th subnet, and how
many usable hosts per subnet?
Answer:
255.255.240.0 is /20; block size in third octet = 16 (256 −240 =16). Subnets in 172.16.0.0/20 are:
172.16.0.0/20
172.16.16.0/20
172.16.32.0/20
172.16.48.0/20
172.16.64.0/20 → that’s the 5th subtree (if counting starting at 0th as first).
11. Question:
If you see a mask of 255.255.255.255 what does that mean in terms of host and network?
Answer:
That mask is /32 (all 32 bits are 1s). It means a single host route — every bit of address is network portion. So
there’s no host portion; that IP refers to exactly one host. It’s used for loopbacks, specific host-routes, etc.
12. Question:
13. Question:
Given mask /17, what is dotted decimal equivalent, how many host bits are there, and how many usable hosts?
Answer:
/17 → first 17 bits are 1s, so mask dotted decimal: 255.255.128.0. Host bits = 32 −17 =15. Usable hosts = 2^15
−2 = 32,766.
14. Question:
What does a mask of 255.255.255.128 (/25) tell you about the size of the subnet and possible host count?
Answer:
/25 gives 7 host bits (32–25). Total addresses = 2^7 =128, usable hosts = 128 −2 =126. It splits a /24 network
into two equal sized subnets of 126 usable hosts each.
15. Question:
Given an arbitrary IP address and subnet mask, how do you find the network (ID) address using bitwise AND?
Answer:
Convert both the IP and mask into binary. Perform bitwise AND (1 AND 1 =1, 1 AND 0 =0, 0 AND anything
=0) between IP and mask. The result is the network ID in binary. Convert back to dotted decimal. Usable in
exam/troubleshooting to find where the subnet starts.
16. Question:
Why is the formula “2^H − 2” used when calculating usable hosts, and where do the “-2” come from?
Answer:
H = number of host bits (bits that are 0 in the mask). The total addresses in the subnet are 2^H. But two
addresses are reserved: one for the network ID (all host bits =0) and one for the broadcast address (all host bits
=1). Thus usable hosts = 2^H − 2.
17. Question:
How many hosts can you have in a /28 subnet, and what are the subnet size and broadcast address increments in
the last octet?
Answer:
/28 → host bits = 4. Total addresses =16; usable =14. The increment (block size) in the last octet = 16
(256−240). So subnets at boundaries: 0,16,32,48,… etc. Broadcast is subnet start +15.
18. Question:
What is the mask 255.255.255.240 in binary, prefix form, and host count?
Answer:
Binary: 11111111.11111111.11111111.11110000. Prefix = /28. Host bits = 4. Usable hosts = 2^4 −2 =14.
19. Question:
Given 10.1.1.129 with mask /25, what is network ID and what is broadcast address?
Answer:
/25 → mask 255.255.255.128. Block size in last octet = 128. Since 129 is >128, it’s in the second half of the
/24. Network ID = 10.1.1.128. Broadcast = 10.1.1.255.
20. Question:
Given IP 172.16.5.10 with mask 255.255.248.0, what is the / prefix, network ID, and first usable host?
Answer:
255.255.248.0 is /21 (since 255.255 =16 bits, 248 = 11111000 adds 5 bits = 21). Block size in third octet = 8. 5
in third octet falls into block starting at 0,8,16,… so 5 is between 0-7 → network ID = 172.16.0.0/21. First
usable = 172.16.0.1.
21. Question:
Given mask 255.255.252.0, how many subnets of this size fit in a /16 classful network, and how many usable
hosts per subnet?
Answer:
255.255.252.0 is /22. A /16 network divided into /22 means you borrow 6 bits (22−16). So number of /22
subnets = 2^6 =64. Host bits for /22 =10 (32−22); usable hosts per /22 = 2^10 −2 =1022.
22. Question:
What is the mask 255.255.255.224 in prefix form; what is the block size; what are possible subnets in the last
octet?
Answer:
Dotted decimal 255.255.255.224 is /27 (8 bits *3 +3 bits in last octet =27). Block size in last octet = 32
(256−224). Possible subnets in last octet: 0, 32, 64, 96, 128, 160, 192, 224.
23. Question:
If you need to support 500 hosts in a subnet, what is the smallest prefix (largest mask) you could use, and what
mask is that?
Answer:
Find H such that 2^H −2 ≥500. 2^9 −2 =510 satisfies. So host bits =9 → mask = / (32−9) = /23. Mask in dotted
decimal = 255.255.254.0.
24. Question:
Is 255.255.255.255 a valid subnet mask for a network segment with hosts? Why or why not?
Answer:
No. 255.255.255.255 is /32 which leaves zero host bits; that is a single host address. Not valid for network
segments with hosts (except for loopback or special host-route). There’s no room for network ID vs usable
hosts.
25. Question:
What is the “magic number” trick when working with subnet masks, and how is it used?
Answer:
The magic number is the value of the least significant bit of the mask’s octet where the mask changes from 1s to
0s (the “interesting octet”). That value equals 256 minus that octet’s mask value. It tells you the block size and
helps find subnet boundaries (subnet IDs, broadcast addresses). Example: mask /27 → last octet mask =224 →
magic number = 32 (256−224).
26. Question:
Answer:
In classful addressing, each class (A/B/C) has a default mask. If you use any mask other than the default, you
enter classless territory. Classless masks are used with CIDR and VLSM; classful masks are default but less
flexible. Understanding masks helps you see whether a network is using default (classful) or custom (classless)
mask.
27. Question:
What is the minimum valid mask for a Class C network, and why can’t you use a mask with fewer bits than that
if remaining in classful view?
Answer:
Default mask for Class C is /24. In classful view, mask must be at least /24 for class C. Using fewer bits (e.g.
/23) means you’re borrowing outside classful mask (i.e. going classless). Under strict classful schema, /24 is
minimal network bit count for Class C.
28. Question:
Given mask /30 (255.255.255.252), what is the usable host range if network ID is 192.168.1.4/30?
Answer:
/30 has block size of 4 in last octet. So subnet 192.168.1.4/30 covers addresses 192.168.1.4-192.168.1.7.
Network - 192.168.1.4, broadcast - 192.168.1.7, usable hosts: .5 and .6.
29. Question:
What is the mask conversion of 255.0.0.0, and what class default mask is that?
Answer:
255.0.0.0 is /8. That is the default mask of Class A networks.
30. Question:
Given an IP 100.64.0.0 with mask 255.192.0.0, what is the prefix, and is this mask valid in classful subnetting?
Answer:
255.192.0.0 is /10 (255.255.192.0 would be /10 but here 255.192.0.0 seems like mask for class A but odd –
assuming the network is class A, you can use /10 in a classless configuration). In strict classful view, a Class A
has default /8; using /10 is classless (allowed in modern networks though). The prefix is /10, usable host bits
=22 (32−10), hosts = 2^22 −2.
31. Question:
What is the usable host count and number of possible subnets when you change from /24 to /28 on a Class C
network?
Answer:
Default /24 has 1 subnet, 254 usable hosts. If you use /28 instead, you are borrowing 4 bits (28 −24). Number of
subnets = 2^4 =16. Each /28 subnet has host bits =4 (32−28), usable hosts per =14.
32. Question:
Given mask /14, what is dotted decimal mask and how large are subnets in terms of address range?
Answer:
/14 means first 14 bits are 1s. That corresponds to mask 255.252.0.0 (because 8 bits first octet, then next octet
has 6 bits of 1 → 252, remaining host bits). Each /14 subnet is size of 2^(32−14) addresses = 2^18 = 262,144
total addresses; usable hosts = 262,142.
33. Question:
What mask is needed to support at least 1000 hosts in a subnet, and what are the usable host count?
Answer:
Need H such that 2^H −2 ≥1000. 2^{10} =1024 → 1024 −2 =1022 ≥1000. So host bits =10 → mask = /
(32−10) = /22. Usable hosts =1022.
34. Question:
Given mask 255.255.255.252, what is block size in last octet and how many usable hosts?
Answer:
Mask /30 → block size in last octet = 4 (256−252). Usable hosts per /30 = 2.
35. Question:
How do you determine quickly whether a mask is valid by looking at its octets?
Answer:
Valid octet values (for mask) are ones that correspond to a contiguous set of 1s starting from MSB in that octet.
Common valid values: 255, 254, 252, 248, 240, 224, 192, 128, 0. If an octet has a value not from this set or has
1s followed by 0 then 1s, the mask is invalid.
36. Question:
If a mask is /21 (255.255.248.0), what is binary representation of third octet, and what is the mask’s “interesting
octet”?
Answer:
Third octet in binary: 11111000 (248). That is 5 bits of 1, followed by 3 bits of 0. The interesting octet is the
third octet, because that is where the boundary between network+subnet bits and host bits lies (i.e. where 1s
stop and 0s begin).
37. Question:
Given IP 203.0.113.45 with mask /21, what is the subnet ID and broadcast?
Answer:
/21 → block size in third octet = 8; octet ranges: 0,8,16,24,… etc. The third octet of IP is 0-7 → 0; fourth octet
free. So subnet ID = 203.0.112.0; broadcast = 203.0.119.255.
38. Question:
What is the mask 255.255.255.252 used for, and why is it often used for point-to-point links?
Answer:
That mask is /30, giving only 2 usable host addresses. Ideal for point-to-point links because you need only two
ends. Minimal waste of addresses.
39. Question:
Given mask /16, how many usable hosts per subnet? What is dotted decimal for /16?
Answer:
/16 mask = 255.255.0.0. Usable host bits =16 (32−16). Total addresses = 2^16 =65,536; usable hosts =65,534.
40. Question:
If a mask is /31, what is total usable hosts, and when is /31 mask considered valid?
Answer:
/31 has 1 host bit (32−31 =1) so total addresses =2^1 =2. Normally usable hosts =2−2 =0 in classic scheme.
However, in modern Cisco IOS, /31 is valid for point-to-point links (no broadcast needed) and both addresses
can be used.
41. Question:
What happens to the number of hosts per subnet as you increase the prefix length by one (i.e. borrow one more
bit)?
Answer:
Each time you increase prefix (i.e. borrow one more subnet/host bit from host portion), host bits drop by 1 →
usable hosts roughly halve (minus two). For example going from /24 to /25: hosts from 254 to 126.
42. Question:
What is the maximum number of usable hosts in a single IPv4 subnet on a /8 network if mask is default /8?
Answer:
Default /8 → host bits =24. Usable hosts = 2^24 −2 = 16,777,214.
43. Question:
Given mask /18, what is block size in third octet, how many subnets in a /16 network if using /18?
Answer:
/18 means mask bits into third octet: /16 → first two octets, then 2 more bits in third → mask in 3rd octet =
11000000 =192, so block size =64 (256−192). In a /16 network, number of /18 subnets =2^(18−16)=2^2=4.
44. Question:
How many bits do you have for hosts in a /19 mask, and what is the usable host count?
Answer:
/19 → host bits = 32−19 =13. Usable hosts = 2^13 −2 =8190.
45. Question:
Answer:
If all host bits (bits where mask =0) are zero → that address is the network ID.
If all host bits are 1 → broadcast address.
If host bits are any mixture of zeros and ones (but not all zeros or all ones) → it’s a host address.
46. Question:
Given IP 10.10.10.255 with mask 255.255.255.0, what is its role (network, host, or broadcast)?
Answer:
Mask /24 → last octet host bits. 10.10.10.255 has all host bits =1 → that makes it the broadcast address of
network 10.10.10.0/24.
47. Question:
If mask is /20, how many subnets of that size are there in a class A /8 network?
Answer:
Class A /8 to /20 → difference =12 bits. Number of /20 subnets =2^12 =4096.
48. Question:
What is the smallest mask you can use to support 14 hosts per subnet?
Answer:
Need at least 14 usable hosts → 2^H −2 ≥14 → H =4 gives 14 (2^4 −2 =14). So host bits =4 → mask = / (32−4)
= /28.
49. Question:
Given mask 255.255.255.240 (/28), what are possible subnets starting in a /24 network?
Answer:
Block size in last octet =16. Subnets:
x.x.x.0/28
x.x.x.16/28
x.x.x.32/28
x.x.x.48/28
x.x.x.64/28
… up to x.x.x.240/28.
50. Question:
How do you compute the total number of addresses (including network & broadcast) in a subnet, given a mask?
Answer:
Total = 2^(number of host bits). Host bits =32 − prefix length. For example /25 → host bits =7 → total
addresses = 128.
51. Question:
Why is mask /25 quicker to compute in many exam questions compared to computing binary fully?
Answer:
Because /25 is common, and the block sizes in the last octet are familiar: with /25 the block size is 128; you
know that network halfway through a /24. Also, bits values in the last octet are simple (128, then hosts). Many
students memorize the octet values associated with common masks (128,192,224,240,248,252,254,255) to
speed up conversion.
52. Question:
Given IP 172.16.18.200 with mask /20, what is broadcast address and host range?
Answer:
/20 → block size in third octet =16; third octet of IP =18 → falls into block starting at 16 (since 16-31). So
subnet ID = 172.16.16.0. Broadcast = 172.16.31.255. Usable hosts: 172.16.16.1 through 172.16.31.254.
53. Question:
What is the mask value in last octet if you borrow 5 bits in the fourth octet? What mask is that?
Answer:
Borrowing 5 bits in the fourth octet means the mask in the fourth octet = 11111000 in binary = 248 decimal. So
full mask might be something like x.x.x.248 (/29 if first three octets are full network bits).
54. Question:
Given mask /13, what is the decimal mask, how many bits in host portion, and usable hosts?
Answer:
/13 → mask = 255.248.0.0 (first octet 255, second octet 248). Host bits = 32 −13 =19. Usable hosts = 2^19 −2
=524,286.
55. Question:
If you see a mask of 255.255.127.0, is that valid? What prefix is it and why or why not valid?
Answer:
255.255.127.0 in binary is 11111111.11111111.01111111.00000000. Notice in the third octet there is a ‘0’
followed by ‘1s’ which violates contiguous 1s then 0s rule. Therefore mask is invalid.
56. Question:
What is mask /11 in dotted decimal, what is block size in third octet, and how many hosts per subnet?
Answer:
/11 → mask = 255.224.0.0 (11111111.11100000.00000000.00000000). The interesting octet is second, block
size in second octet =32 (256−224). Host bits =21 (32−11). Usable hosts per /11 =2^21 −2 =2,097,150.
57. Question:
What is a commonly used mask for large organisations that need thousands of hosts, e.g. needing ~2000 hosts
per subnet?
Answer:
You’d choose enough host bits to cover at least 2000 usable addresses: 2^11 −2 =2046 works. So host bits =11
→ prefix length =32 −11 =21. So mask /21 (255.255.248.0) is common.
58. Question:
What mask is needed to create exactly 32 subnets from a /24 network, and how many hosts in each?
Answer:
/24 to 32 subnets → need S bits so 2^S ≥32 → S=5 (2^5=32). Mask = / (24 +5) = /29. Hosts per /29
=2^(32−29)=2^3=8 total, usable =6.
59. Question:
Given mask /19 and a Class B network, how many subnets are created and what is the increment in the
interesting octet?
Answer:
Class B /16 to /19 → 3 bits borrowed → number of /19 subnets in that Class B network =2^3 =8 subnets. The
interesting octet is the third. Block size in third octet =256 − (mask value in third octet). Mask value in third
octet = (for /19, third octet mask bits = 3 bits of 1, 5 bits of 0) = 11100000 =224 decimal. So block size =32
(256−224). Subnets increment by 32 in third octet.
60. Question:
Why is mask /24 often called a “natural mask” for Class C networks?
Answer:
Because it matches the default mask for Class C (which is /24). In classful terms, /24 divides off exactly
canonical Class C networks without borrowing bits. So it’s “natural” in that context.
61. Question:
What mask value in the fourth octet corresponds to /26 and how many hosts does that give?
Answer:
/26 → mask in fourth octet = 192 (binary 11000000). Host bits = 6 in that octet → usable hosts =2^6 −2 =62.
62. Question:
Given IP 10.10.10.200 with mask /26, what are the subnet ID and broadcast addresses?
Answer:
/26 → block size =64 in last octet. 10.10.10.200 → last octet 200. 200 ÷64 =3 remainder 8 => block 3 *64
=192. So subnet ID = 10.10.10.192. Broadcast = subnet ID + block size −1 =10.10.10.255 (192 +63 =255).
63. Question:
How do you determine which octet is “interesting” just by looking at a mask like 255.255.255.224?
Answer:
Look from left to right at octets: 255 (all ones), 255, 255, then 224 (non-255 and non-0) → the third octet of
“interest” ends at the 3rd octet (since 224 is in the 4th octet here). Actually the interesting octet is the one where
mask changes from full 1s to something else (224) — here the fourth octet.
64. Question:
Answer:
/27 → block size =32. Subnet 192.168.100.0/27 covers .0–.31. Network = .0, broadcast = .31. Usable = .1
to .30.
65. Question:
If given a mask /15, what is the decimal mask, how many hosts, and how many subnets in a /8 network using
/15?
Answer:
/15 → decimal mask = 255.254.0.0. Host bits =17. Usable hosts =2^17 −2 =131,070. Subnets in a /8 (Class A)
if using /15 =2^(15−8) =2^7 =128 subnets.
66. Question:
Explain what “host bits” and “network (or subnet) bits” mean in context of a mask.
Answer:
Network (or subnet) bits are the bits set to 1 in the mask; they represent the fixed portion that all addresses in
that subnet share. Host bits are bits set to 0; they vary among hosts. The more host bits, the more possible hosts;
the more subnet bits, the more possible subnets but fewer hosts.
67. Question:
Given an IP and mask — 150.100.200.130 /25 — what is the network, broadcast, usable range and how many
hosts?
Answer:
/25 → mask 255.255.255.128. Block size =128 in last octet. 130 is >128 → subnet ID =150.100.200.128.
Broadcast =150.100.200.255. Usable =150.100.200.129 to 150.100.200.254. Usable hosts =126.
68. Question:
What mask corresponds to the decimal mask 255.255.240.0, and how many host bits does it give?
Answer:
255.255.240.0 is /20. That gives host bits =32 −20 =12.
69. Question:
If a mask is shown as 11111111.11111111.11100000.00000000, what is that in dotted decimal and prefix form?
Answer:
Binary third octet = 11100000 =224 decimal. So mask =255.255.224.0. Prefix = /19.
70. Question:
When analyzing mask effects for routing, why is knowing the subnet mask important beyond just host count?
Answer:
Because mask determines which addresses are considered local/on-link (for ARP, for routing), network
boundaries (broadcast domains), size of routing table entries, possible summarization, efficiency of address
utilization, predictable network behavior. Mis-masking can lead to overlapping subnets, unreachable hosts,
routing confusion.
71. Question:
Answer:
A wildcard mask is the inverse of the subnet mask: bits where subnet mask is 0 become 1 and vice versa. Used
in Cisco ACLs and routing protocols (EIGRP, OSPF) to specify ranges. For example, subnet mask
255.255.255.0 → wildcard mask 0.0.0.255. It helps specify network matching.
72. Question:
Answer:
255.255.248.0 wildcard = 0.0.7.255 (since 248 in binary is 11111000 → inverse 00000111 =7).
73. Question:
In a router’s configuration, how would you verify the IP address and mask assigned to an interface to check
correctness?
Answer:
show ip interface brief
This shows IP addresses and masks (or prefixes) per interface. You can also use:
show running-config interface [interface_name]
To see full details including mask, status, etc.
74. Question:
What is the largest subnet you can have in a Class C network, and what mask corresponds to that?
Answer:
Largest (in class C when using masks) is the default /24 (mask 255.255.255.0). If you tried mask shorter than
/24, that becomes classless (borrowing into class boundary). But for a pure class C with host bits, /24 is largest.
75. Question:
Given mask /18, what is the number of addresses in each subnet and number of usable hosts?
Answer:
/18 → host bits =14 (32−18). Total addresses =2^14 =16,384; usable =16,382.
76. Question:
What mask would you use if you need at least 30 hosts per subnet?
Answer:
Need usable hosts ≥30 → 2^H −2 ≥30. H=5 gives 30 exactly (2^5 −2 =30). So host bits =5 → mask = / (32−5)
= /27.
77. Question:
How many subnets and hosts if you split a /16 with a /20 mask?
Answer:
/20 splits: Borrowed bits =20 −16 =4. Number of /20 subnets in /16 =2^4 =16. Host bits per /20 =12; usable
hosts per subnet =2^12 −2 =4094.
78. Question:
Given mask /23 in a Class B network, what are the subnet increments and sizes?
Answer:
/23 → mask 255.255.254.0. The interesting octet is the third; block size in third octet =2 (256−254). So subnets
increments by 2 in the third octet: e.g. x.y.0.0/23, x.y.2.0/23, x.y.4.0/23 etc. Each has usable hosts =2^(9) −2
=510.
79. Question:
What is the effect on network address and broadcast address boundaries when borrowing bits in third octet vs
fourth octet?
Answer:
If you borrow bits in third octet, the block size and subnet boundaries move at larger increments (in third octet);
broadcast / network IDs change accordingly in third octet. If in fourth, the increments are smaller (in last octet).
The position of the borrowed bits determines “interesting octet” and how boundaries fall.
80. Question:
What is a “slash mask table” and why is it useful for CCNA when analyzing subnet masks?
Answer:
A slash mask table is a lookup chart listing prefixes /8 through /32, their dotted decimal mask equivalents, host
bits, usable hosts, and maybe block sizes. It’s useful because you can quickly convert between forms, estimate
host counts and subnet sizes without doing binary each time. Speeds up exam/troubleshooting work.
81. Question:
If an IP address is 192.168.50.130 and mask is /25, what is the role of the address (host, network, broadcast)?
Answer:
/25 splits the last octet into two blocks: 0-127 and 128-255. IP .130 is in second block (128-255). Since it’s
neither .128 (network of that block) nor .255 (broadcast), it’s a host address. Network ID =192.168.50.128;
broadcast =192.168.50.255; usable hosts .129 through .254.
82. Question:
What is mask /31’s behavior in modern Cisco IOS, and when is it permitted?
Answer:
Modern Cisco IOS allows /31 masks on point-to-point links. In that case there is no need for a broadcast
address, so both addresses in that /31 can be assigned to the two endpoints. This is an exception to the normal
“usable hosts =2^H −2” rule.
83. Question:
Given mask values, how do you quickly identify the number of host bits (without counting manually)?
Answer:
Subtract the prefix length from 32. If mask is known as /X, host bits =32−X. If given dotted decimal, convert or
use known mapping of octets: e.g. mask 255.255.255.192 = /26 → host bits =6. Mask 255.255.254.0 = /23 →
host bits =9.
84. Question:
What is the maximum number of subnets possible if you use mask /28 in a /24 network? How many usable
hosts per subnet then?
Answer:
/24 → borrowed bits =28−24 =4 → number of subnets =2^4 =16. Hosts per /28 = 2^(32−28)=2^4 =16 total,
usable =14.
85. Question:
Answer:
/28 → block size 16 in last octet. Subnet 10.10.10.0 covers .0-.15. Broadcast =10.10.10.15.
86. Question:
Given mask 255.255.255.128 and classful Class B network, is that mask allowed and what does it imply?
Answer:
Yes, mask 255.255.255.128 (i.e. /25) is allowed in classless (CIDR) addressing. It means using more subnet bits
than the default /16 for Class B. It allows you to divide the Class B into many smaller subnets with fewer hosts
in each. It’s valid in modern networks; not default but permitted.
87. Question:
What mask would you use to divide a /16 network into 256 equal subnets? How many hosts per subnet?
Answer:
Dividing /16 into 256 subnets → need S bits such that 2^S =256 → S =8 bits. So new mask = / (16 +8) = /24.
Usable hosts per /24 =254.
88. Question:
What final checks should be made when analyzing a given subnet mask and IP pair to ensure you have correctly
determined network, broadcast, and host range?
Answer:
Check mask is valid (contiguous 1s then 0s)
Compute host bits and usable hosts =2^H −2 (unless /31 or /32)
Find the interesting octet (where mask changes from 1 to 0)
Use block size to calculate subnet ID (by seeing which block the IP fits in)
Compute broadcast = subnet ID + (block size −1) in that octet, with lower octets all 255
Determine first usable = network ID +1, last usable = broadcast −1
Verify that address is neither network ID nor broadcast in that subnet.
Here are 88 original CCNA-style questions & Answers focused on the “Analyzing Existing Subnets” section.
Each entry is plaintext; Explanations are in-depth; where relevant, CLI/OS commands are in bold on separate
lines embedded in the text. You can copy/paste directly into your study notes or documentation.
1. Question:
Answer:
It means when you are given an IP address and its subnet mask, you must compute three key facts: the Subnet
ID, the Subnet Broadcast Address, and the Range of usable host addresses. These allow you to understand
which subnet the IP belongs to, what addresses are usable, and what addresses are reserved.
2. Question:
Answer:
Mask 255.255.192.0 is /18 (since 192 decimal = 11000000, adding 2 network bits). Block size in the third octet
= 64 (256 −192). IP’s third octet is 150. 150 ÷ 64 = 2 remainder 22 → second block = 2×64 = 128. So subnet ID
= 172.16.128.0.
3. Question:
From the same IP and mask (172.16.150.41 /18), what is the broadcast address of that subnet?
Answer:
Subnet ID is 172.16.128.0, /18 means the subnet covers third octet from 128 to 191. Last usable broadcast = set
all host bits = 172.16.191.255. So broadcast = 172.16.191.255.
4. Question:
What is the range of usable host addresses for the subnet in questions 2 & 3?
Answer:
First usable is one above the subnet ID: 172.16.128.1. Last usable is one below broadcast: 172.16.191.254.
These are the usable unicast addresses.
5. Question:
Answer:
The interesting octet is the octet in the mask where it changes from 255 to something else (i.e. where network
bits stop and host bits begin). It determines block size, subnet increments, and helps you calculate subnet ID
without doing full binary conversions. For example, in mask 255.255.192.0 the interesting octet is the third.
6. Question:
Given the IP 130.4.102.1 with mask 255.255.240.0, what is the subnet ID?
Answer:
Mask 255.255.240.0 = /20 (third octet mask 240 = 11110000). Block size in third octet = 16 (256−240). Third
octet of IP = 102. 102 ÷16 =6 remainder 6 → 6×16 =96. So subnet ID = 130.4.96.0.
7. Question:
Using the IP and mask from #6, what is the broadcast address?
Answer:
Subnet ID 130.4.96.0, /20 covers third octet from 96 to 111 (because 96 + (16‐1)=111), the fourth octet all 255.
So broadcast = 130.4.111.255.
8. Question:
Answer:
First usable host: 130.4.96.1. Last usable: 130.4.111.254.
9. Question:
How many total host addresses (including network & broadcast) are in a /20 subnet?
Answer:
Host bits in /20 = 12 (32−20). Total addresses = 2^12 = 4096. Usable host addresses = 4096 −2 = 4094.
10. Question:
What is an “easy mask” in subnet analysis, and how does it simplify calculations?
Answer:
An “easy mask” is a mask that in dotted decimal is made up of only 255s and 0s (no partial octet in mask).
Examples: 255.0.0.0, 255.255.0.0, 255.255.255.0. With those, subnet ID and broadcast computations become
very simple: copy IP octets where mask =255; zero where mask =0 for subnet ID; 255 where mask=0 for
broadcast.
11. Question:
Answer:
/27 mask last octet mask: 224 → block size =32. Fourth octet of IP =100. 100 ÷32 =3 remainder 4 → 3×32 =96.
So subnet ID = 199.1.1.96.
12. Question:
Answer:
Subnet ID 199.1.1.96, block size =32 → broadcast = 199.1.1.96 +31 = 199.1.1.127.
13. Question:
Answer:
First usable: 199.1.1.97, last usable: 199.1.1.126.
14. Question:
Answer:
Convert both the IP and the mask into binary. For each bit: if mask bit =1, keep the IP’s bit; if mask bit =0,
result bit =0. That result in binary is subnet ID; convert back to decimal. This method always works but can be
slower if many conversions.
15. Question:
How can you speed up existing subnet analysis without full binary conversions?
Answer:
Use decimal shortcuts: find interesting octet, compute block size (256 minus mask octet), then find which block
the IP fits in (divide), derive subnet ID and broadcast; then compute usable range. Practice helps speed.
16. Question:
Given IP 8.1.4.5 mask 255.255.0.0 /16, what are the Subnet ID and Broadcast Address?
Answer:
Mask /16 is an “easy mask” (255.255.0.0). Subnet ID: copy first two octets, zero last two → 8.1.0.0. Broadcast:
copy first two octets, set last two octets to 255 → 8.1.255.255.
17. Question:
If you are troubleshooting a host that cannot communicate with others in its subnet, which existing subnet
details are essential to check?
Answer:
You must verify that the host’s IP and mask match the intended subnet (including correct mask), know the
subnet ID and broadcast address (to confirm host is not using either), ensure its default gateway is in the same
subnet, and check whether usable host range includes the IP. Also check for overlapping subnets.
18. Question:
Given IP 172.16.200.15 mask 255.255.192.0, what subnet number (ID) does this host reside in?
Answer:
Mask 255.255.192.0 = /18, block size in third octet =64. Third octet of IP =200. 200 ÷64 =3 remainder 8 →
block =3 ×64 =192. Subnet ID = 172.16.192.0.
19. Question:
Answer:
Subnet ID 172.16.192.0; that /18 covers third octet 192-255, so broadcast = 172.16.255.255.
20. Question:
Answer:
First usable: 172.16.192.1, last usable: 172.16.255.254.
21. Question:
Given IP 192.168.100.130 mask 255.255.255.128 (/25), what subnet does this IP belong to?
Answer:
/25 gives block size 128 in last octet. Last octet 130 is >128 → block start 128. Subnet ID = 192.168.100.128.
22. Question:
Answer:
Subnet ID 192.168.100.128, block size 128 → broadcast = 192.168.100.255.
23. Question:
Answer:
First usable: 192.168.100.129, last usable: 192.168.100.254.
24. Question:
Why is the first address (subnet ID) and last address (broadcast) in a subnet not usable as host addresses?
Answer:
Because subnet ID is used to identify the whole subnet (all host bits zero), and the broadcast address (all host
bits one) is used to send to all hosts in the subnet. Assigning them to hosts would conflict with these special
functions.
25. Question:
Given IP 10.10.50.200 mask 255.255.255.248 (/29), determine the subnet ID, broadcast, and usable range.
Answer:
/29 has block size in last octet =8. Last octet 200 ÷8 =25 remainder 0 (since 25×8=200) → subnet ID =
10.10.50.200. Broadcast = 200 +7 =10.10.50.207. Usable: 10.10.50.201 to 10.10.50.206.
26. Question:
Given a host with IP 192.168.5.63 and mask 255.255.255.192 (/26), what subnet is it in?
Answer:
/26 mask → block size last octet =64 (256−192). Last octet 63 is <64 → block 0. Hence subnet ID =
192.168.5.0.
27. Question:
Answer:
Subnet ID 192.168.5.0, block size 64 → broadcast = 192.168.5.63.
28. Question:
Answer:
First usable: 192.168.5.1, last usable: 192.168.5.62.
29. Question:
Answer:
/22 means block size in third octet =4 (256−252). Third octet of IP =5. 5 ÷4 =1 remainder 1 → block =1×4 =4.
So subnet ID = 10.0.4.0.
30. Question:
Answer:
Subnet ID 10.0.4.0, /22 covers third octet 4-7, fourth octet all 255. Broadcast = 10.0.7.255.
31. Question:
Answer:
First usable: 10.0.4.1, last usable: 10.0.7.254.
32. Question:
What command on a Cisco router lets you verify the IP and mask assigned on an interface, which helps
analyzing existing subnets?
Answer:
show ip interface brief
This shows IP address and mask/prefix and whether interface is up. Helps confirm that the configured mask
matches expected subnet size.
33. Question:
If a host is misconfigured with the wrong mask, how would subnet analysis help identify the problem?
Answer:
By analyzing existing subnet (computing correct subnet ID, broadcast, usable range) for the given IP and mask,
you will see whether the host’s IP is outside the usable range or whether two hosts think they are in different
subnets. This discrepancy points to wrong mask or wrong IP.
34. Question:
Given IP 192.168.10.10 mask 255.255.255.240 (/28), what is the next subnet after the one this IP is in?
Answer:
/28 block size =16. Subnet ID for this IP: 192.168.10.0 to .15 (since .10 falls there). Next subnet starts at
192.168.10.16/28.
35. Question:
Answer:
Host bits =4 → total addresses =16; usable =16 −2 =14.
36. Question:
Given IP 172.20.33.129 mask 255.255.255.128 (/25), find network ID, broadcast, first usable, last usable.
Answer:
Block size last octet =128. 129 ÷128 =1 rem 1 → block= 1×128 =128. Subnet ID = 172.20.33.128. Broadcast =
172.20.33.255. Usable: 172.20.33.129 to 172.20.33.254.
37. Question:
Answer:
If someone uses /24 instead of /25, they will compute subnet incorrectly: subnet ID would be 172.20.33.0,
broadcast 172.20.33.255. But actual /25 network splits at .128 block. The host at .128 might think it belongs in
the wrong subnet, possibly overlapping with another, and communication or routing will be incorrect.
38. Question:
Given IP 192.168.1.200 mask 255.255.255.224 (/27), what is the size (number of addresses) of the subnet?
Answer:
/27 has host bits =5 (32−27). Total addresses =2^5 =32. Usable hosts =32 −2 =30.
39. Question:
Answer:
Block size last octet =32. 200 ÷32 =6 rem 8 → block=6×32 =192. Subnet ID = 192.168.1.192. Broadcast =
192.168.1.223.
40. Question:
Answer:
First usable: 192.168.1.193; last usable: 192.168.1.222.
41. Question:
When asked “what is the resident subnet” in a problem, what is being requested?
Answer:
It means the subnet in which the given IP (and mask) resides — the same as asking for the subnet ID plus its
broadcast and usable range. “Resident subnet” is the one that “houses” that IP.
42. Question:
Given IP 10.5.5.17 mask 255.255.255.224 (/27), what is the resident subnet ID?
Answer:
Block size =32. 17 ÷32 =0 remainder 17 → block start at 0. Subnet ID = 10.5.5.0.
43. Question:
Answer:
Subnet ID 10.5.5.0, broadcast = 10.5.5.31.
44. Question:
Answer:
First usable: 10.5.5.1, last usable: 10.5.5.30.
45. Question:
Given IP 203.0.113.129 mask 255.255.255.192 (/26), what is subnet ID?
Answer:
Block size =64. 129 ÷64 =2 rem 1 → block=2×64 =128. Subnet ID = 203.0.113.128.
46. Question:
Answer:
Subnet ID + block size −1 = 203.0.113.191.
47. Question:
Answer:
First usable: 203.0.113.129, last usable: 203.0.113.190.
48. Question:
Given IP 10.0.100.35 mask 255.255.255.248 (/29), what is the resident subnet and broadcast?
Answer:
Block size =8. 35 ÷8 =4 rem 3 → block=4×8 =32. Subnet ID = 10.0.100.32. Broadcast =32+7 = 10.0.100.39.
49. Question:
Answer:
First usable: 10.0.100.33, last usable: 10.0.100.38.
50. Question:
Given IP 10.0.100.32 mask mis-typed as /28 (255.255.255.240) but actual network uses /29, what errors might
occur?
Answer:
If mask used is /28, the computed subnet ID, broadcast, and usable range will be larger (block size 16) and
overlap two /29 subnets. Host may believe it’s in wrong subnet; broadcast domains misalign; overlapping IP
space; confusion in routing or ACLs.
51. Question:
What command on Linux shows the IP address and prefix so you can analyze the existing subnet on a host?
Answer:
ip addr show
This shows the IPv4 address and prefix/mask on the interface. From that, you can compute subnet ID,
broadcast, usable range.
52. Question:
Given IP 192.168.2.130 mask /25 on Linux host, how do you check whether this address is the network or a
usable host?
Answer:
First use ip addr show to confirm address/mask. Then compute subnet ID (192.168.2.128/25), broadcast
(192.168.2.255), then see that 192.168.2.130 is neither the subnet ID nor the broadcast, so it’s a usable host.
53. Question:
Answer:
No. Subnet ID =10.1.1.0/24, broadcast =10.1.1.255. Since 255 is broadcast, 10.1.1.255 is reserved as broadcast,
not usable by a host.
54. Question:
Answer:
No. 172.16.0.0 is the subnet ID (for /16), so cannot be assigned to a host.
55. Question:
Given IP 192.168.100.1 mask /32, what does that imply about the subnet?
Answer:
/32 mask means host bits =0 so only single address; this is a single-host route or loopback. It is not a subnet
with multiple hosts; no broadcast; no usable range beyond that one address.
56. Question:
Why is it sometimes useful to analyze in binary when dealing with “difficult masks” (masks with partial
octets)?
Answer:
Because decimal math becomes trickier when mask octets are not 0 or 255. Binary makes it clearer exactly
which bits are network vs host, helps find subnet IDs precisely especially in boundary cases. It avoids mistakes
in block size or boundary calculations.
57. Question:
Given IP 203.0.113.78 mask 255.255.255.248 (/29), what is the binary representation of the interesting octet
and how is that used?
Answer:
Mask last octet 248 in binary = 11111000. That gives 5 network bits, 3 host bits in that octet. Interesting octet is
the fourth. Use block size 8, see which block the IP’s last octet (78) falls into: 78 ÷8 =9 rem 6 → block =9×8
=72. So subnet ID = x.x.x.72; broadcast = x.x.x.79.
58. Question:
Given existing network 172.16.128.0 /18, how many subnets were created if the classful was /16?
Answer:
Classful for 172.16.0.0 is /16. Using /18 means you borrowed 2 bits (18−16) to make subnets. Number of
subnets =2^2 =4. So there are 4 equal /18 subnets under that /16 network.
59. Question:
If a mask is /18 for Class B, what is the number of usable hosts per subnet?
Answer:
Host bits =32 −18 =14. Usable hosts =2^14 −2 =16382.
60. Question:
Given IP 172.16.128.0 /18, what are the 4 subnet IDs for those /18 subnets?
Answer:
/16 divided into /18 yields increments of block size =2^(16-18 host bits) → in third octet block size =64 (256
−192). So subnets:
172.16.0.0/18
172.16.64.0/18
172.16.128.0/18
172.16.192.0/18
61. Question:
Answer:
That subnet covers third octet 64-127, so broadcast = 172.16.127.255.
62. Question:
Answer:
First usable = 172.16.192.1 (one above subnet ID).
63. Question:
Answer:
Broadcast =172.16.255.255 → last usable = 172.16.255.254.
64. Question:
Answer:
Block size in last octet =64. 75 ÷64 =1 rem 11 → block =1×64 =64. Subnet ID = 10.0.0.64.
65. Question:
Answer:
Subnet 10.0.0.64 /26 → broadcast =64+63 = 10.0.0.127.
66. Question:
Answer:
First usable: 10.0.0.65, last usable: 10.0.0.126.
67. Question:
Given an IP on a point-to-point link using /30 mask, e.g. 192.168.20.1 /30, what are the subnet ID, broadcast,
usable?
Answer:
/30 gives block size 4. Last octet values:
Subnet IDs: 0,4,8,… etc.
192.168.20.1 lies in the first block (0-3). Subnet ID = 192.168.20.0, broadcast = 192.168.20.3, usable hosts:
192.168.20.1 & 192.168.20.2.
68. Question:
Why is /30 commonly used for point-to-point networks, and how does analyzing existing subnet identify that?
Answer:
Because /30 gives exactly 2 usable host addresses (one on each end), minimal waste. When you analyze a
subnet and see a /30 mask, you know it’s likely a point-to-point link or similar small link. This helps in mapping
network topology.
69. Question:
Given IP 192.0.2.15 mask 255.255.255.240 (/28), what is the resident subnet and how many other hosts are in
that subnet?
Answer:
/28 block size =16. 15 ÷16 =0 rem 15 → block=0. Subnet ID = 192.0.2.0, broadcast = 192.0.2.15. Usable hosts
=14 (.1 through .14).
70. Question:
Answer:
/28 usable hosts =14. /29 usable =6. So /28 has 8 more usable hosts than /29.
71. Question:
Given existing network 192.168.200.128 /25, what is its size in hosts and what are the useful ranges?
Answer:
/25 usable hosts =126. Subnet covers addresses 192.168.200.128 through .255. Usable host range:
192.168.200.129 to 192.168.200.254. Broadcast = .255. Subnet ID = .128.
72. Question:
If the existing subnet mask is misaligned (non-contiguous bits), what errors or analysis issues occur?
Answer:
Mask must be contiguous 1s followed by 0s. If non-contiguous bits appear, subnet ID, broadcast, usable range
are ambiguous or routers may reject mask. Analysis will be incorrect. This is usually invalid configuration.
73. Question:
Answer:
Block size last octet =16. 14 ÷16 =0 rem 14 → block=0. Subnet ID = 10.100.100.0, broadcast = 10.100.100.15.
74. Question:
Answer:
First usable = 10.100.100.1, last usable = 10.100.100.14.
75. Question:
Answer:
Block size 16. 16 ÷16 =1 rem 0 → block start 16. Subnet ID = 10.100.100.16, broadcast = 10.100.100.31,
usable = 10.100.100.17-10.100.100.30.
76. Question:
What is the total network size (addresses including broadcast & network) of a /28 subnet?
Answer:
Total addresses =2^(32−28) =2^4 =16.
77. Question:
Given IP 172.31.100.200 mask 255.255.255.192 (/26), what is the resident subnet, broadcast, and usable range?
Answer:
Block size last octet =64. 200 ÷64 =3 rem 8 → block =3×64 =192. Subnet ID = 172.31.100.192, broadcast =
172.31.100.255. Usable hosts: 172.31.100.193 to 172.31.100.254.
78. Question:
Given IP 192.0.2.128 mask 255.255.255.224 (/27), which network boundary is that on?
Answer:
Block size last octet =32. 128 ÷32 =4 rem 0 → in block starting at 128. Subnet ID = 192.0.2.128, broadcast =
192.0.2.159, usable = 192.0.2.129-192.0.2.158.
79. Question:
How many subnets exist inside the classful network 192.0.2.0/24 if using /27 mask?
Answer:
/27 is 3 bits borrowed from /24 (since 27−24 =3). Number of subnets =2^3 =8. Each subnet has 32 total
addresses, 30 usable.
80. Question:
Given multiple hosts in same subnet, how can you verify they are indeed in the same subnet via CLI?
Answer:
Use commands on each:
81. Question:
If a host has IP of 192.168.50.1 /28, and another host 192.168.50.16 /28, are they in same subnet?
Answer:
No. First host is in subnet 192.168.50.0-.15, second is in 192.168.50.16-.31. Subnet ID for first = 192.168.50.0,
second = 192.168.50.16. So different subnets.
82. Question:
How do you choose between using binary vs decimal method to analyze existing subnets under timed
conditions?
Answer:
Binary method is precise and helpful but slower; decimal method using interesting octet and block size is faster
for typical masks used. For difficult mask or when very precise edge cases, binary helps verify. Best to practice
both so you can decide in exam or real-world.
83. Question:
What is the command on Windows to show IP address and mask so you can analyze the subnet on a
workstation?
Answer:
ipconfig /all
This shows IPv4 address and subnet mask. From those, you can compute subnet ID, broadcast address, and
usable range.
84. Question:
Given Windows host with IP 192.168.1.10 mask 255.255.255.248, how can you use ping to test reachability
inside the subnet?
Answer:
Ping another host address within the usable range. Example:
ping 192.168.1.9
If that address is in the same usable range and the device replies, subnet is probably correct. If unreachable,
check mask or gateway.
85. Question:
If a network diagram shows an existing IP 10.10.5.65 mask /26, how many hosts are possible, and is 10.10.5.65
valid?
Answer:
/26 gives usable hosts =62. Subnet ID block size =64. For 10.10.5.65: block = first block is .0-.63, second block
.64-.127. So 65 is in 10.10.5.64/26. Subnet ID =10.10.5.64, broadcast =10.10.5.127. First usable .65. So yes, 65
is valid as first usable in that subnet.
86. Question:
Given an existing subnet mask 255.255.255.224 but host IP is 192.168.10.33, what mistake could be happening
if someone assumes /24?
Answer:
They might assume subnet ID .0 and broadcast .255, but actual /27 splits every 32. 33 falls into 32-63 block, so
subnet ID .32, broadcast .63. If wrongly using /24, communication may fail or think hosts are on same subnet
incorrectly.
87. Question:
Why is it important to know both subnet ID and broadcast when analyzing existing subnets?
Answer:
Subnet ID identifies where the subnet starts; broadcast indicates where it ends. Knowing both lets you know
exact range of usable addresses, avoid assigning network or broadcast addresses; ensure hosts are correctly
placed; help in designing route summarization.
88. Question:
Summarize the step-by-step process for analyzing an existing subnet given IP & mask.
Answer:
1. Identify mask and convert to prefix / determine block size (esp in interesting octet).
2. Determine classful network if needed (for classful contexts).
3. Find the interesting octet — the one where mask is neither 255 nor 0.
4. Compute subnet ID: divide the value of that octet of IP by block size → get the block start; copy octets
where mask=255; use block start for interesting octet; zero remaining octets.
5. Compute broadcast: subnet ID plus block size minus one in interesting octet; remaining octets all 255.
6. First usable = subnet ID +1; last usable = broadcast −1.
7. Double check IP isn’t network or broadcast; check host counts if needed.
Here are 88 original CCNA-style questions & detailed Answers focused on the “Subnet Design” section. Each
entry is plaintext, detailed, and where relevant includes CLI commands in bold on separate lines (embedded).
You can copy/paste directly into your study notes or documentation.
1. Question:
What are the primary goals you must consider when designing IPv4 subnets for a business network?
Answer:
When designing IPv4 subnets you need to consider: number of hosts per subnet now and in future (growth),
number of required subnets, minimizing wasted address space, separating broadcast domains for
performance/security, ease of management (group by department, location, function), hierarchical design, and
potential summarization for routing. Also consider constraints like router interface counts, DHCP pools, special
use (servers, printers, WAN links).
2. Question:
What is FLSM (Fixed Length Subnet Mask) design and when is it appropriate?
Answer:
FLSM means using the same mask for all subnets in a network. All subnets are equal size in number of hosts.
This simplifies design, routing summarization, and management. It is appropriate when host count per subnet is
similar, growth is predictable, and uniformity makes operations easier. But it may waste address space if host
needs vary.
3. Question:
What is VLSM (Variable Length Subnet Mask) design and how does it improve upon FLSM?
Answer:
VLSM allows subnets of different sizes within the same larger network, with different masks depending on
host-requirement of each subnet. It reduces waste of IP space by allocating smaller subnet masks where fewer
hosts are needed and larger where more hosts are needed. It is more complex but more efficient. It also supports
hierarchical network design.
4. Question:
Given 10.0.0.0/24, design subnets to support three departments needing 50, 25, and 10 hosts respectively using
VLSM. What subnets (IDs, masks, ranges) would you assign?
Answer:
Step 1: Sort by largest host requirement → 50, 25, 10.
Step 2: Largest needs 50 → smallest power of 2 host-space: 64 addresses → usable 62 → mask /26. Next 25 →
need 32 addresses → /27 (30 usable). Next 10 → need 16 addresses → /28 (14 usable).
Step 3: Assign subnets in order, from start of block:
5. Question:
If you have a class B network 172.16.0.0/16 and need 500 subnets with at least 200 hosts each, what single
mask (i.e. FLSM) would satisfy this?
Answer:
Need ≥500 subnets → S bits: 2^S ≥500 → S=9 (512 subnets). Need ≥200 hosts per subnet → host bits H where
2^H −2 ≥200 → H=8 gives 254 usable hosts. Since class B has 16 network bits, we need S+network bits + host
bits =32 → here network bits =16, subnet bits S=9, host bits H=32−16−9=7 bits (but that gives only 126 hosts,
too small). So need H≥8 → so subnet bits ≤ (32−16−8)=8 bits student? Wait: to get 8 host bits, subnet bits
=32−16−8=8. But 2^8=256 subnets <512 needed. So trade-off: since must have both ≥500 subnets and ≥200
hosts, we see that with host bits=8 (mask /24), you get subnet bits=8 → 256 subnets only (not enough). If we
give up some host count requirement, or else we need mask that balances: S=9 bits → / (16+9)= /25, host
bits=7, usable hosts=2^7−2=126 hosts (too low). So no single FLSM mask satisfies both perfectly. Must either
accept fewer hosts per subnet or use VLSM. If accept ≤200 hosts, maybe choose /24 gives 256 subnets with 254
hosts each (OK hosts but fewer subnets). If accept fewer subnets, choose /25 gives 512 subnets but only 126
hosts each.
6. Question:
Answer:
Include buffer: assume a percentage increase in hosts (say 20-30%) when selecting mask so current largest host
count + growth still fits. Reserve unassigned subnets or address blocks for future departments or expansion. Use
hierarchical numbering (so subnets for future are contiguous). Avoid exhausting address space in top level.
7. Question:
What trade-offs exist between having many small subnets vs fewer large subnets?
Answer:
Many small subnets: finer control, smaller broadcast domains (less broadcast traffic), better security
segmentation; but more routing entries, possibly more configuration overhead, more complexity. Fewer large
subnets: simpler routing, less configuration, but wasted addresses if many hosts are not used, larger broadcast
domain which can impact performance and fault domain.
8. Question:
Given the requirement: 6 branch offices needing 120 hosts each, plus 4 WAN links (2 hosts each), design a
subnet plan using VLSM within private block 10.1.0.0/16. What are the subnets?
Answer:
Step 1: largest: 120 hosts → need ≥126 usable → /25 (hosts bits=7 → 126 usable). WAN links: need 2 hosts
→ /30.
Step 2: assign subnets:
Then WAN links: 4 /30 subnets from next addresses: e.g. 10.1.3.0/30, 10.1.3.4/30, 10.1.3.8/30, 10.1.3.12/30
9. Question:
What is a “zero subnet” and how does it factor into subnet design decisions?
Answer:
Zero subnet refers to the subnet with all subnet bits = 0 (e.g. first subnet). Historically some older devices did
not allow use of the zero subnet (“subnet-zero rule”). Modern CCNA and Cisco allow using zero subnet by
default. In design, you may still consider whether you need to avoid zero subnet for compatibility.
10. Question:
What is the algorithmic process (step-by-step) for choosing a subnet mask when designing subnets given
requirements?
Answer:
1. Gather requirements: number of subnets needed, hosts per subnet needed, growth estimates.
2. Decide whether FLSM (single mask) or VLSM (multiple sizes).
3. Pick the largest host requirement (if using FLSM, that defines host bits; if VLSM, sort by size).
4. Compute needed host bits for that largest host requirement (2^H −2 ≥ #hosts).
5. Compute needed subnet bits (if FLSM, ensure enough subnets; if VLSM, assign per subnet in
descending order).
6. Derive the mask: prefix = network bits + subnet bits.
7. Allocate subnets: compute subnet IDs, assign blocks in logical order.
8. Reserve addresses/subnets for future growth.
9. Document plan.
11. Question:
Why is it important to sort subnets by size (descending host need) when using VLSM?
Answer:
Because when allocating address blocks you want to give the largest subnet first (with biggest mask) to ensure
enough contiguous address space. If you allocate small ones first, you might fragment the address space and run
out of contiguous space for large subnets, forcing non-ideal allocations.
12. Question:
What is summarization and how does good subnet design enable route summarization?
Answer:
Summarization (or route aggregation) is combining multiple contiguous subnets into a larger prefix
advertisement in routing protocols, to reduce number of routes. Good subnet design aligns subnets so they are
contiguous and on boundaries that allow summarization (for example subnets that differ only in lower bits).
Design with consistent masks and logical numbering helps summarization.
13. Question:
Given that you design many subnets under 10.0.0.0/8 and assign different departments blocks of /16, /18 etc.,
how would you make address plan logical to ease management?
Answer:
Assign based on geography or function: e.g. first /16 for HQ, next /16 for region1, etc. Within each, sub-divide
into /18, /19 etc for departments. Use consistent numbering (e.g. first octet/regional identifier, next department
bits). Document naming. Reserve blocks for future use. Using a hierarchical plan ensures clarity, prevents
overlap, and allows summarization.
14. Question:
What CLI or IOS commands help you verify whether your subnet design has been applied correctly?
Answer:
After configuring interfaces with designed subnets, check:
show ip route
15. Question:
What is the effect of using /30 for WAN links on address space when designing a large network with many
point-to-point links?
Answer:
Using /30 for WAN links uses only 2 usable addresses per link, minimizing wasted space. But when you have
many WAN links, even /30s add up. You must ensure address plan has enough /30 subnets reserved. VLSM
helps by assigning /30 only to WAN links, larger subnets only where needed.
16. Question:
Given a business with 10 departments: 5 of them need ~200 hosts each, 2 need ~50 hosts each, and 3 need ~12
hosts each, what mask design using VLSM from a /16 block would you propose?
Answer:
Start with largest: 200 host → need 256 addresses → /24 gives 254 usable. 50 hosts → need 64 addresses → /26
gives 62 or /26 is 62 usable, but 50 fits. 12 hosts → need 16 addresses → /28 gives 14 usable (so maybe allow
16 addresses, /28 yields 14 usable which is slightly under; so use /28 for 12 hosts plus growth).
Allocate:
17. Question:
A design requirement says “use one subnet mask per classful network; do not use VLSM.” What are the
implications?
Answer:
You must choose a mask that works for all subnets (i.e. FLSM). That mask must satisfy the largest host
requirement and enough subnets for all departments. Often results in some waste: subnets needing few hosts get
more addresses than needed. Also planning must include growth; you need pick a mask that works for both
subnets with big host count and quantity of subnets.
18. Question:
In a scenario with multiple floors in a building, each floor needs ~70 devices, plus a network device closet per
floor needing 5, and inter-floor links. How would you plan subnets?
Answer:
You may assign each floor a subnet sized for ~70 + future growth (say 100 hosts) → /25 gives 126 usable. For
network device closet, combine into main or allocate smaller if needed. Inter-floor links use /30. Use VLSM:
allocate /25 per floor (e.g. Floor1: 10.1.1.0/25, Floor2: 10.1.1.128/25, Floor3: 10.1.2.0/25, etc). WAN /MTU
links or backbone links /30. Reserve space contiguous.
19. Question:
What is “wasted address space” in subnet design, and how can you minimize it?
Answer:
Wasted address space occurs when subnets have many unused addresses (because mask chosen too large for
host count). Also when masks are uniform but host counts vary. To minimize: use VLSM to match mask to host
requirement; plan growth but not over-allocate; group hosts by size; avoid large subnets where few hosts.
20. Question:
Answer:
You need to plan where DHCP servers will provide leases, ensure DHCP pools align with subnets, static
assignments don’t overlap with DHCP pool. Also ensure gateway addresses are known and reserved. Address
plan must include enough addresses for dynamic hosts and static devices.
21. Question:
Given that routers may have interface limits (number of physical or logical interfaces), how should you design
subnets with that constraint?
Answer:
Ensure that number of subnets does not exceed router’s interface capacity (including VLAN interfaces, logical
interfaces). Maybe group small networks under one router, but avoid too many small subnets if router cannot
support them. Plan for stacking, trunking, possibly layer-3 switches.
22. Question:
Answer:
Subnets can isolate sensitive departments (finance, R&D), servers, printers, guest networks. By assigning them
separate subnets, you can apply firewall or ACL rules between subnets, monitor traffic easier, limit broadcast
exposure. So design must include secure VLAN/subnet boundaries.
23. Question:
How do you incorporate WAN links and special links (point-to-point) into subnet design?
Answer:
WAN links typically need only two IPs → use /30 (or /31 where supported). Such links should be planned
separately in the address block. Do not mix them with LAN subnets. Reserve some address space for such links.
In VLSM, allocate smallest possible for those to preserve larger blocks for LANs.
24. Question:
If an organization expects mergers/acquisitions, how should you factor that into subnet design?
Answer:
Reserve large contiguous address spaces for future subnets; avoid tight blocks; ensure hierarchy allows
expansion; use private address blocks large enough; document plan; possibly design in a way that merging in
new site can adopt similar subnet mask structure.
25. Question:
What is the difference between using a mask for address conservation vs using mask for performance or
security?
Answer:
Address conservation (reduce waste) drives use of smaller subnets or varied masks; performance/security often
drives isolation of traffic, small broadcast domains, isolation of servers, using separate subnets for VLANs or
securing traffic. Sometimes these goals conflict: e.g. small subnets help security but many small subnets might
complicate routing. Design must balance.
26. Question:
Describe a situation where using /30 for many WAN links, /24 for LANs, and /28 for server groups would make
sense in design.
Answer:
In a distributed enterprise: each LAN (office floor) needs up to 200 users → /24. Servers (fewer, maybe 10-20)
→ /28. WAN links connecting branch offices or routers need only 2 hosts → /30. So design: allocate large /24
blocks to floors, reserve server groups as /28, then assign /30s for point-to-point. This preserves space and
organizes by function.
27. Question:
Given a requirement: 100 subnets across many sites, but many of those subnets will only ever need around 10
hosts. Which mask strategy (FLSM, VLSM) is more efficient?
Answer:
VLSM is more efficient because you can assign small masks (e.g. /28 for ~14 usable) to those small host
subnets, saving address space, while using larger masks where needed. FLSM would force all 100 subnets to
have mask sized for the largest host count, likely causing waste.
28. Question:
What is the CLI approach to test whether two hosts are in the same subnet after design?
Answer:
On routers or hosts, check IP and mask:
Then compute subnet ID manually or using built-in tools. Attempt ping from one host to other without routing:
if same subnet, ARP should resolve; if not, router needed.
29. Question:
In designing subnets, why is reserving the zero or all-ones subnet sometimes relevant even if modern devices
allow them?
Answer:
For backward compatibility, some older equipment or protocols might still have problems with subnet-zero or
all-ones subnets. Also sometimes policy restricts their use. So design may reserve them (i.e. not using the first
or last subnet in the address block) as safety margin.
30. Question:
What’s an example of designing subnets for both IPv4 conservation and readiness for summarization in
routing?
Answer:
Use a contiguous address block per major site (e.g. Site A: 10.10.0.0/22, Site B: 10.10.4.0/22 etc), within each
site subdivide with VLSM. Ensure site blocks align on boundaries (multiples of /22) so routers can advertise
aggregated routes per site. Allocate FLSM per site only if needed, but make sure blocks are aligned.
31. Question:
How do you compute required mask given largest host requirement and number of subnets, when using FLSM?
Answer:
Compute required host bits H so that 2^H −2 ≥ largest number of hosts per subnet. Compute required subnet
bits S so that 2^S ≥ number of subnets needed. Then prefix length = (default network bits) + S. Ensure that (32
− prefix length) ≥ H. If not, no mask meets both; must trade off or adopt VLSM.
32. Question:
What is default network bits for class A, B, and C, and why that matters in mask calculation?
Answer:
Class A default network bits = 8; Class B = 16; Class C = 24. Because any subnet design (especially under
classful origin) starts from default classful network plus borrowed bits (subnet bits). Knowing default network
bits helps calculate prefix length when choosing masks.
33. Question:
Given a class C network 192.168.5.0/24 and requirement: create at least 6 subnets each with at least 30 hosts.
What mask would you choose and what are all subnets?
Answer:
Need ≥6 subnets → 2^S ≥6 → S=3 (since 2^3=8). Need ≥30 hosts → host bits H where 2^H −2 ≥30 → H=5
(2^5 −2=30). Since default Class C has host bits 8, need borrow S=3 bits → new host bits=5 (i.e. / (24+3)=/27).
So mask = /27 => 255.255.255.224. Subnets:
192.168.5.0/27
192.168.5.32/27
192.168.5.64/27
192.168.5.96/27
192.168.5.128/27
192.168.5.160/27
192.168.5.192/27
192.168.5.224/27
You’ll have 8 subnets; only need 6, but mask accommodates both requirements.
34. Question:
Why in many designs you reserve one or more subnets for future unexpected growth?
Answer:
Because you rarely fully predict future: new departments, more hosts, IoT devices, new offices, etc. If no free
subnet space is left, you may need renumbering which is expensive. Reserving ensures you have “safe”
contiguous space to expand.
35. Question:
Answer:
Use structured naming: for example, sites may have site codes, floors, departments. Numbering subnets using
incremental address blocks. Include metadata (e.g. “HQ-Floor3”, “BranchA-VLAN20”) and maintain
documentation. Keep consistent mask choices per category.
36. Question:
Given 10.5.0.0/16 as your address block, how many /24 subnets can you get, and what mask would that be?
Answer:
/24 = host bits =8, so from /16 to /24 borrowed bits =8 → number of /24 subnets = 2^8 =256. Mask = /24
(255.255.255.0).
37. Question:
What is the smallest subnet size (mask) for a LAN needing 14 hosts, including buffer for growth?
Answer:
Need usable ≥14 → 2^H −2 ≥14 → H=4 gives 14 (2^4−2=14). So mask = /28 (host bits =4) gives exactly 14
usable. But for buffer, may choose /28 or slightly bigger.
38. Question:
If you design using FLSM and then some subnets run out of host addresses, what happens?
Answer:
You may need to renumber: change mask, migrate devices, update routing, DHCP, etc. This is disruptive.
Hence in good design you plan for growth or use VLSM to avoid running out early.
39. Question:
40. Question:
In CCNA design problems, why is the “largest host requirement” often the driving factor for mask selection
when using one mask per network?
Answer:
Because the mask must accommodate the largest subnet’s host need. If mask is too small, the largest will not
have enough usable addresses. So even though many subnets might have fewer hosts, the largest determines the
minimum size for host bits when using FLSM.
41. Question:
Answer:
Magic number = 256 − value of mask octet where bits are borrowed. It gives you block size in that octet, helps
you compute subnet boundaries quickly, helps you ensure subnets align in address space.
42. Question:
Given the mask options /27, /26, /25, /24, how would you choose among them if you have three departments
needing 60, 120, and 20 hosts?
Answer:
[Sorting descending] Need 120 hosts → mask that gives ≥120 usable → /25 gives 126 usable. For 60 hosts
→ /26 gives 62 usable. For 20 hosts → /28 gives 14 (too small), so /27 gives 30 usable. If forced to choose one
mask for all (FLSM), mask must satisfy largest → /25. But then 60-host dept gets 126 usable (half wasted),
20-host dept gets same. If VLSM allowed, assign /25 to 120-host dept; /26 to 60-host; /27 to 20-host.
43. Question:
What are practical considerations besides host count when designing subnets (e.g. latency, broadcast,
management)?
Answer:
Broadcast domain size affects broadcast storm risk; latency and performance suffers if too many hosts in a
subnet. Management overhead: more subnets means more routing, more DHCP scopes, more complexity. Also
physical/geographical grouping: if remote site, subnet local to that site. Security: VLANs or subnets for special
devices. Compatibility: older equipment, mask restrictions.
44. Question:
How do you design subnets for multi-site enterprise, each with its own LANs, WAN interconnections, and
regional aggregation?
Answer:
Use hierarchical design: central/global block, allocate per site blocks (e.g. site prefixes), within site subdivide
into LANs, server VLANs, management, etc. For WAN links use /30 or /31 usually. Leave enough address
space per site for future growth. Ensure site blocks align for summarization at higher level.
45. Question:
What is summary route drift and how can bad subnet design cause it?
Answer:
Summary route drift occurs when subnets are not aligned on boundaries required for aggregation; you cannot
summarize cleanly because subnets selected are not contiguous or not aligned. Bad design (random blocks,
fragmentation) prevents summarization, leading to many individual routes in routing table.
46. Question:
Given IP block 192.168.0.0/22, you need 4 subnets, three with ~250 hosts each, one with ~50 hosts. Design
using VLSM.
Answer:
/22 has host bits=10 → total addresses 1024, usable 1022.
Largest need ~250 hosts → need at least 256 total addresses → /24 gives 254 usable. Assign three /24s:
192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24. Then remaining block for the ~50-host = need /26 (62 usable).
Next available: 192.168.3.0/26.
47. Question:
How do you decide whether to use /30 or /31 for point-to-point links?
Answer:
/30 is traditional: gives 2 usable hosts and uses 4 total addresses. /31 gives 2 addresses total with no broadcast
(both used by endpoints). If devices and protocols support /31 you can use it to conserve addresses. But check
device compatibility and whether broadcast is required.
48. Question:
What is the CLI procedure to verify that your router interfaces are configured per your subnet design?
Answer:
Use:
and
To check IP addresses, masks, interface status. Also test connectivity among hosts using:
ping [remote_host_IP]
To verify reachability.
49. Question:
Given requirement: need at least 2000 hosts in one subnet and 100 in another, what mask(s) would you choose
under VLSM starting from 10.0.0.0/16?
Answer:
2000 hosts → need ≥2048 total addresses → mask /21 gives 2046 usable hosts (2^11 −2). For 100 hosts →
mask /25 gives 126 usable. So subnets: 10.0.0.0/21 for the 2000-host subnet; then allocate 10.0.8.0/25 (or next
free block) for the 100-host one.
50. Question:
What is the effect of alignment of subnets on network block boundaries (e.g. starting at “nice” increments) on
routing & management?
Answer:
Aligning on nice increments (block sizes, boundaries) helps with summarization, reduces fragmentation,
reduces chance for overlapping, easier visual recognition. It simplifies management: for example subnets
at .0, .128 etc. Also routing summaries require aligned prefixes.
51. Question:
Answer:
Because without clear documentation: address conflicts, overlapping subnets, misconfigured masks, routers
misrouting, difficulty in troubleshooting. Documentation includes mapping of subnets →
function/location/gateway, mask used, reserved blocks. Enables future expansions without errors.
52. Question:
How do network devices like switches and routers play a role in influencing subnet design?
Answer:
Router interface count may limit number of subnets manageable. Switch VLANs correspond to subnets;
trunking/VLAN capacity matter. DHCP server capacity and scopes. Also devices may not support certain masks
or features (like /31). Also router performance in handling many small subnets or summarization.
53. Question:
If you have a mask /24 for LANs, but hosts per LAN are only ~20, what design change might you make?
Answer:
Use a smaller mask (like /27 or /28) for those LANs to reduce wasted addresses. Or use VLSM: allocate /28 (14
usable) or /27 (30 usable) to those small LANs. Free up remaining address space.
54. Question:
Given a block 172.16.0.0/20, and you need 3 subnets for LANs of 300, 120, and 30 hosts, design the subnets.
Answer:
/20 has host bits=12 → 4094 usable.
Largest: 300 → need ≥ 512 total → /23 gives 510 usable (close; /23 = host bits 9 → 510). Next 120 → /25 gives
126 usable. Next 30 → /27 gives 30 usable (but /27 gives 30, equals; okay).
Allocate:
55. Question:
What mask would you choose if you need exactly 1024 subnets from a /16 network?
Answer:
Need S = number of subnet bits where 2^S ≥1024 → S=10 (2^10 =1024). So mask = / (16 +10) = /26. So /26
(255.255.255.192). Each subnet then has host bits =32−26 =6 → usable hosts =62.
56. Question:
Given that some subnets will be completely underutilized for long periods, how much address slack (wastage
allowance) should be built into those subnets in design?
Answer:
Typical practice is to allow ~20-30% growth on host count. For very unpredictable departments perhaps more.
Even if usage is low now, ensure mask allows for growth without readdressing. Also reserve additional
contiguous subnets for expansion.
57. Question:
How do you account for special use cases: servers, printers, infrastructure, voice, IoT when designing subnets?
Answer:
These often have different availability, security, performance, static IP needs. Servers may need high reliability
and availability, printers static, IoT maybe many small hosts. You might group these in separate subnets (with
appropriate mask), isolate via VLAN, allocate static ranges. Either assign subnets sized for their needs or share,
depending on scale.
58. Question:
What is the impact of too fine-grained subnetting (many very small subnets) on routing tables and protocols?
Answer:
Many subnets increase number of route entries, load on routing tables, potential convergence overhead, larger
memory/CPU usage, less summarization. Also more DHCP scopes, more configuration overhead. Thus balance
between granularity and manageability is key.
59. Question:
In subnet design, why is it often best practice to allocate addresses for WAN/point-to-point links first (smallest
subnets), then LANs, then servers etc.?
Answer:
Because WAN links are small and need small address blocks. Allocating them first ensures you don’t
accidentally allocate large blocks covering up what should be reserved small WAN blocks. Also prevents
fragmentation of address space. LANs and servers generally need bigger blocks; placing them later avoids
getting stuck without small contiguous space.
60. Question:
Given a scenario: need 8 subnets, each with at least 100 hosts, and you have 10.0.0.0/8 to allocate. What generic
plan using FLSM would you use?
Answer:
Need 8 subnets → S bits: 2^S ≥8 → S=3. Need ≥100 hosts → 2^H −2 ≥100 → H=7 gives 126 usable. So host
bits =7, prefix = (network bits 8 + S bits 3) = /11. Mask = / (8+3)=/11 or maybe /25? Wait: 32−H =32−7=25 so
mask= /25 would be too big for 8 subnets from /8? Actually calculating: default A is /8, borrow 3 bits →
mask /11, host bits =21 gives huge hosts. But to meet hosts minimal you could use more subnets if needed.
FLSM mask = /25? No. For 8 subnets from /8, with each subnet needing ≥100 hosts, you could choose mask /25
but that gives way more subnets than needed, but FLSM allows oversupply. Many valid designs. Good plan:
mask /25 gives 2^(25−8)=2^17 subnets, huge. But simplest minimal mask satisfying both is /25.
61. Question:
What is “dynamic growth factor” and how do you use it in subnet design?
Answer:
Dynamic growth factor is percentage or number of extra hosts you expect in the future beyond current
requirement (e.g. 20%, 50%). You add that to current host requirement when choosing mask so that subnet is
not immediately too small. E.g., if you need 100 hosts now, expecting 30% growth → design for 130 hosts →
choose mask that gives ≥130 usable addresses.
62. Question:
In a scenario you have multiple remote sites, each with different host requirements: small offices need ~25
hosts, medium offices ~150 hosts, large sites ~500 hosts. How do you combine FLSM/VLSM to design
efficiently?
Answer:
Use VLSM for offices with different sizes. Possibly group large offices under bigger subnet block, medium
under another, small under another within the same top-level address block. Use FLSM only within similar size
groups if desired for simplicity. Reserve common WAN links. Ensuring contiguous address blocks per size
class if summarization is required later.
63. Question:
64. Question:
Given that devices often need static IPs (servers, routers, printers), how do you allocate those in your design
relative to DHCP pools?
Answer:
Reserve static ranges in each subnet (often low addresses of the usable range). Outside DHCP pool to avoid
overlap. Document static assignments. For example in a /24, servers static from .1-.50; DHCP from .100-.200;
reserve rest.
65. Question:
1. Given requirement: 12 subnets total. 2) One subnet needs 800 hosts. 3) Others need up to 100 hosts
each. Using block 172.16.0.0/16, how design using VLSM?
Answer:
Largest: 800 hosts → need ≥1024 total addresses → /22 gives 1022 usable (so use /22). Others: need 100 hosts
→ need /25 or /26; /25 gives126 usable.
Allocate:
66. Question:
Answer:
Keep a ledger or map of assigned subnets. Always compute subnet ID and broadcast before allocating. Use
contiguous blocks. Use non-overlapping increments. Double-check that next block begins at previous broadcast
+1.
67. Question:
Answer:
Address hierarchy means grouping and arranging IP address blocks by logical structure: organization → region
→ site → floor → department. It makes routing, summarization, management easier. Helps in understanding
which block belongs where, simplifies configuration and documentation.
68. Question:
Given need for 5 subnets of around 300 hosts each from a /16, what mask do you choose under FLSM?
Answer:
300 hosts → need ≥512 total addresses → /23 gives 510 usable. Need 5 subnets → S where 2^S ≥5 → S=3 (8
subnets). Use mask / (16 +3) = /19? Wait: that’s for 8 subnet bits; but host bits then are 32−19=13 → 8190
hosts, overkill. Actually if using /23, mask =255.255.254.0, that gives large number of subnets from /16:
2^(23−16)=128 subnets. That gives more than 5; more than required but acceptable under FLSM with one
mask. So choose /23 mask: each subnet /23 yields 510 usable hosts.
69. Question:
What is the difference between designing subnets from a public vs private block?
Answer:
Public blocks have scarcity, possibly cost, and possibly require approval. Private blocks (RFC 1918) are
plentiful. But both require logical design. Public IP design often must coordinate with other networks, ensure
uniqueness. Private design allows more flexibility. But in either case you want efficiency, no waste, good
documentation.
70. Question:
Given block 192.168.100.0/24, need at least 6 subnets, largest with 40 hosts. What is smallest FLSM mask?
Answer:
Largest host need 40 → need ≥ 64 total addresses → host bits H such that 2^H −2 ≥40 → H=6 → gives 62
usable (2^6−2), mask = / (32−6)=/26. Need ≥6 subnets → S bits: 2^S ≥6 → S=3 (8 subnets). Under Class C
default /24, borrow 3 bits → /27? Wait: if S=3 borrowed bits (i.e. mask /27), host bits=5 gives 30 usable hosts
only (<40), so too small. So need more host bits: mask /26 (host bits=6) gives 62 hosts, subnet bits borrowed=2
(since /24→/26 borrowed 2 bits → 4 subnets only). But we need ≥6 subnets → no single mask meets both: /26
gives enough hosts, but only 4 subnets; /27 gives enough subnets but insufficient hosts. So you must use VLSM
here, or accept trade-off.
71. Question:
How do you plan for hierarchical routing in subnet design so that summarization works at routers between
sites?
Answer:
Group site subnets into contiguous address blocks. For each site have a block aligned on boundary of
summarization mask. Use consistent mask sizes where possible among similar sites. Avoid mixing small
fragmentary subnets in middle so summary prefixes can cover all site subnets.
72. Question:
Answer:
Subnets must be contiguous and their network IDs must align such that the bits to be summarized are identical
among them. Also the number of networks being summarized must be a power of 2. Mask boundaries must
align with block sizes (the block size must match the summary prefix increment).
73. Question:
Given that some devices or protocols require broadcast address, what mask limitations might affect your
design?
Answer:
Masks like /31 remove broadcast (so limited broadcast may not exist in that subnet). If devices or services rely
on broadcast, you cannot use /31 for those. Also routers, ACLs, etc may expect certain block sizes. If you use
too small masks, you may break certain network applications that expect broadcast or multiple hosts.
74. Question:
What is the CLI command to show a subnet mask in prefix notation and confirm your design is correctly
applied on router interfaces?
Answer:
show ip interface brief
75. Question:
If you allocate a large address block to a site but most of it remains unused for years, what is the downside?
What is the upside?
Answer:
Downside: wasted addresses that could have been used elsewhere; possible inefficient summarization; larger
broadcast domain if misused; harder tracking. Upside: flexibility to grow without renumbering; ability to add
new departments/devices without address conflict; less hassle in future expansion. Trade-off must be balanced.
76. Question:
When designing subnets for voice (VoIP) devices, which often have many small devices, how might you design
mask and subnet size?
Answer:
Voice VLAN might have many phones but often static or semi-static. If you expect say 80 phones, design for
e.g. /25 (126 usable) so you have room. If fewer, maybe /26 or /27. Also ensure QoS, possibly separate VLAN
and subnet for voice for security/performance. Treat voice like “department” with its own subnet.
77. Question:
Answer:
Even though IPv6 has large space, you still need logical design: allocate site /48 or /56 blocks, subdivide into
/64s per LAN. Consider similar hierarchy: global prefix → site → subnet. Document both IPv4 and IPv6 plans
side by side. Subnets for IPv6 typically default /64, but plan numbering for consistency.
78. Question:
What is “supernetting” and when is it used in relation to subnet design?
Answer:
Supernetting is combining multiple contiguous subnets into a larger network for routing summary and to reduce
routing table size. It is used when you have designed multiple small subnets and want to advertise them as one
aggregate route. Requires contiguous subnets and appropriate alignment.
79. Question:
Given two adjacent /24 subnets, 192.168.10.0/24 and 192.168.11.0/24, can they be summarized? What
summary mask and address?
Answer:
Yes. Two contiguous /24s can be summarized into a /23. Summarization address: 192.168.10.0/23 covers both
192.168.10.0 and 192.168.11.0. Mask =255.255.254.0.
80. Question:
If a branch office has fluctuating host counts between 80 and 120 over time, how would you choose a mask?
Answer:
Design for peak (120) plus some growth margin (say 25%) → maybe plan for ~150 hosts. Mask giving ≥150
usable: /24 gives 254 usable. If using /25 (126 usable) is too small. So choose /24 to allow growth. Or if
acceptable, choose /25 but accept occasional rework.
81. Question:
What is the effect of choosing mask /28 vs /29 in terms of maintenance of network, DHCP scopes, router
configuration?
Answer:
/28 offers 14 usable hosts; /29 offers only 6. If you choose /29 and later need 10 devices, you’ll have to
readdress. Smaller masks also mean more subnets to manage (DHCP scopes, route entries, etc.). Also
documentation and maintenance effort increases. Bigger masks (up to necessary) reduce these overheads.
82. Question:
How do you test your subnet design in a lab or simulation to ensure it works before deployment?
Answer:
Simulate using Packet Tracer, GNS3, or physical lab: assign addresses per plan, configure routers, VLANs,
verify inter-subnet routing, gateway connectivity, subnet mask correctness, DHCP functionality. Use pings,
trace routes. Check whether hosts in different subnets can reach correctly and hosts in same subnet
communicate.
83. Question:
Given mask design with many /30s for WAN, many /25s for LAN, /28s for server clusters, how would you
document address plan for clarity?
Answer:
Make table listing: subnet ID, prefix/mask, purpose (LAN, WAN, server, voice, etc.), location, first usable, last
usable, broadcast, gateway. Also map visual diagrams with site names. Always include reserved blocks. Use
consistent notation (CIDR and dotted decimal).
84. Question:
What is the CLI command to see the routing table summary and check whether summarization is happening as
designed?
Answer:
show ip route
This shows routing table entries. Summarized entries will be visible. Also use show ip protocols to see networks
being advertised.
85. Question:
Given 192.168.100.0/24 block, you’re designing network with HostA (must support 100 hosts), HostB (25
hosts), two serial links. How design using VLSM?
Answer:
Largest: 100 hosts → need ≥126 usable → /25. Then 25 hosts → /27 gives 30 usable. Serial links → /30 (2
usable). Allocate:
86. Question:
Why is it often better to assign subnets by department or function in design rather than mixing departments in
the same subnet?
Answer:
Because separation by department supports security (you can apply ACLs, isolate traffic), simplifies
troubleshooting, organizes address space, aligns with VLANs, improves management and control. Also
broadcast traffic from one department doesn’t impact others.
87. Question:
What mask would you use if you had to create 30 subnets from a /16 network and ensure each has at least 200
hosts?
Answer:
Need ≥30 subnets → S such that 2^S ≥30 → S=5 (32 subnets). Need ≥200 hosts per subnet → host bits H such
that 2^H −2 ≥200 → H=8 (254 usable). Then prefix = / (16 +5) = /21, host bits =11 (32−21=11 gives 2046
usable hosts, more than needed). So mask = /21 or possibly /24? No /21 is correct for at least 32 subnets each
giving ~2046 hosts, so plenty. You could also use /24 (256 hosts), but that gives many more subnets.
88. Question:
Summarize best practice checklist for subnet design you should review before finalizing a design.
Answer:
Checklist:
Confirm host requirements per subnet (including growth)
Confirm number of subnets needed
Choose whether FLSM or VLSM is appropriate
Ensure mask chosen satisfies both hosts & subnets (with margin)
Reserve address space / blocks for future
Separate subnet types (LANs, servers, WAN links) logically
Minimize wasted addresses
Ensure alignment for summarization
Verify router/interface constraints
Document each subnet: subnet ID, mask, usable range, broadcast, purpose
Test in lab/simulation if possible