_______ is when the networking portion borrows bits from the host portion.

Prepare for the Cyber Fundamentals Block 3 Test with our engaging quiz. Tackle multiple choice questions featuring hints and detailed explanations. Enhance your cyber security expertise and feel confident on exam day!

Multiple Choice

_______ is when the networking portion borrows bits from the host portion.

Explanation:
Subnetting is the process of extending the network portion of an address by borrowing bits from the host portion to create smaller subnets. By moving the boundary between network and host bits, you increase the number of networks while reducing the number of hosts available in each subnet. For example, taking a /24 network like 192.168.1.0 and using a /27 mask (255.255.255.224) splits it into eight subnets, each with 32 addresses (30 usable hosts). CIDR is the overarching approach that allows variable-length masks, but the act described—creating multiple subnets by using more network bits—is specifically subnetting. Supernetting and aggregation, in contrast, combine subnets into a larger block or summarized route, not the creation of subnets.

Subnetting is the process of extending the network portion of an address by borrowing bits from the host portion to create smaller subnets. By moving the boundary between network and host bits, you increase the number of networks while reducing the number of hosts available in each subnet. For example, taking a /24 network like 192.168.1.0 and using a /27 mask (255.255.255.224) splits it into eight subnets, each with 32 addresses (30 usable hosts). CIDR is the overarching approach that allows variable-length masks, but the act described—creating multiple subnets by using more network bits—is specifically subnetting. Supernetting and aggregation, in contrast, combine subnets into a larger block or summarized route, not the creation of subnets.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy