Which of the following are suitable subnet masks for use in configuring static routes for the network shown in Figure 9-14?

a. 255.255.0.0
b. 255.0.0.0
c. 255.255.255.224
d. All these answers are correct.
e. None of these answers is correct.


d. All these answers are correct.

Computer Science & Information Technology

You might also like to view...

All processes running on a computer must be monitored periodically with the ____ command to check for rogue or malfunctioning processes.

A. mn B. pr C. ps D. show

Computer Science & Information Technology

Within a site, folders and filenames can contain spaces.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

You can sort a list that is not organized in a table.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The key principle in preventing disruption, destruction and disaster is ___________.

a. redundancy b. control spreadsheet c. IDS d. anti-virus software e. prevention controls

Computer Science & Information Technology