Bob is configuring egress filtering on his network, examining traffic destined for the Internet. His organization uses the public address range 12.8.195.0/24. Packets with which one of the following destination addresses should Bob permit to leave the network?

A. 12.8.195.15
B. 10.8.15.9
C. 192.168.109.55
D. 129.53.44.124


Answer: D. 129.53.44.124

Computer Science & Information Technology

You might also like to view...

The role of the ____ part of the security process is to ensure that the selected approach represents the most effective security response, as well as the greatest cost benefit for the organization as a whole.

A. plan B. evaluate C. management D. design

Computer Science & Information Technology

When a method is called, the compiler tries to find a method that matches the _________ of the method call.

a) name b) argument types c) return type d) a and b e) All of the above

Computer Science & Information Technology

Suppose the dictionary is randomly ordered. Asymptotically (that is, in terms of a likely Big-Oh running time), which of the following alterna tives is the fastest if we assume that no words are longer than ten char acters?

a. Sort the dictionary, and then use the algorithm in the text b. Sort the dictionary, but then use interpolation search c. Place the dictionary items in a binary search tree based map; the prefix test must be performed explicitly d. Place the dictionary items in a hash table based map; the prefix test must be performed explicitly e. Use a sequential search of the dictionary

Computer Science & Information Technology

The ________ command causes text to appear as if it has been highlighted with a marker

A) Shadow B) Highlighting C) Boldface D) Underline

Computer Science & Information Technology