Which of the following are suitable subnet masks for use in configuring static routes for the network shown in Figure 9-14?
a. 255.255.0.0
b. 255.0.0.0
c. 255.255.255.224
d. All these answers are correct.
e. None of these answers is correct.
d. All these answers are correct.
Computer Science & Information Technology
You might also like to view...
All processes running on a computer must be monitored periodically with the ____ command to check for rogue or malfunctioning processes.
A. mn B. pr C. ps D. show
Computer Science & Information Technology
Within a site, folders and filenames can contain spaces.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
You can sort a list that is not organized in a table.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The key principle in preventing disruption, destruction and disaster is ___________.
a. redundancy b. control spreadsheet c. IDS d. anti-virus software e. prevention controls
Computer Science & Information Technology