If you are using a Class C network ID with 2 subnets and need 31 hosts per network, which of the following masks should you use?
A) 255.255.255.0
B) 255.255.255.192
C) 255.255.255.224
D) 255.255.255.248
B
Explanation: B) Of the available options, the only one that provides for 2 subnets with at least 31 available host addresses is 255.255.255.192, or /26.
You might also like to view...
Suppose you program an app with two compute-intensive tasks that run on one core of a dual-core system. Then, suppose you program the app so that the two compute-intensive tasks run asynchronously in separate threads on a dual-core system. Should you expect the latter program to run in half the time? Why?
What will be an ideal response?
The ________ setting adjusts the image to be as large as possible without distorting the image
Fill in the blank(s) with correct word
In regard to spelling and grammar in Office 2010, it is important to know that, in general,:
A) all Office applications check your spelling and grammar as you type. B) you turn on the Spelling and Grammar features in all applications. C) Word and PowerPoint check spelling and grammar as you type; Access and Excel do not. D) only a small selection of words will be checked as you type; the rest must be accessed through the Spelling and Grammar features.
Recently, your company implemented two wireless networks. Within days of implementation, you discover that unauthorized devices have connected to the wireless networks. You need to ensure that unauthorized devices are unable to connect to either wireless network. What should you do?
A. Deploy the wireless access points behind a firewall. B. Deploy the wireless access points behind an intrusion prevention system (IPS). C. Employ MAC filtering on the wireless access points. D. Disable SSID broadcast on the wireless access points.