For the IP address 192.168.2.1 which of the following subnet masks would be MOST likely used?
A. 255.255.0.0
B. 255.255.248.0
C. 255.255.255.0
D. 255.255.255.255
Answer: C. 255.255.255.0
You might also like to view...
Which of the following are the three categories of fire suppression systems?
A) Wet pipe, dry pipe, and pre-action B) Wet fire, dry fire, and pre-action C) Flammable fire, electrical fire, and wood fire D) Wet fire,dry fire, and electrical fire
Information about the speed of the computer and Internet connection that the target audience uses tells you the ____ limitations of an effective site.
A. technical B. content C. educational D. profitability
A user will be installing a switch in a public location and will allow the six users in the office to connect to it with CAT6 Ethernet. Which of the following actions would best ensure that there is no unauthorized access to the switch?
a. Disable new VLANS b. Disable unused ports c. Assign static IP addresses d. Disable PoE
How does a watering-hole attack work?
What will be an ideal response?