Which wildcard mask would be used to match all the addresses that exist within the 87.100.45.0/21 network?

A) 0.0.0.7
B) 0.0.7.255
C) 0.0.15.255
D) 0.0.31.255


B
Explanation: B) The wildcard mask required is based on the subnet mask given. In this case, the subnet mask was 255.255.248.0; the wildcard equivalent is 0.0.7.255.
The following is the math for the last two octets:
248 = 11111000
7 = 00000111
255 = 11111111
0 = 00000000
The wildcard is just the inverse of the subnet mask.

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Changes in employee behavior such as unusually high absenteeism, high job dissatisfaction, or high worker turnover should alert managers to potential problems. 2. Analysts should have little interest in improving worker satisfaction with the system. 3. Objectives are major independent pieces of the problem. 4. Requirements of a problem definition include the word "not," indicating a limitation. 5. Once issues have been identified, and objectives have been stated, the relative importance of the issues or objectives must be determined.

Computer Science & Information Technology

Match the terms about the object element to the descriptions

I. param A. An attribute used to set a value for an object property II. classid B. A property that can be set to true or false III. name C. An object attribute that uniquely identifies the type of object IV. value D. An element used to set object properties V. autostart E. An attribute used to specify a particular property What will be an ideal response?

Computer Science & Information Technology

A Telnet server may have _____________

a. a single client requesting a service b. multiple clients requesting services, but not at the same time c. multiple clients requesting services, simultaneously but as separate transactions d. multiple clients requesting services, simultaneously and as a single transaction

Computer Science & Information Technology

What temporarily holds programs and data while the computer is on and allows the computer to access that information randomly?

a. cache b. RAM c. CMOS d. ROM

Computer Science & Information Technology