Which of the following would be the correct network classification for large network unicast addresses?
A) Class A
B) Class B
C) Class C
D) Class D
E) Class E
A
Explanation: A) Class A networks with a first octet value of 1—126 are for large network unicast.
You might also like to view...
You cannot store a mixture of __________ in an array.
Fill in the blank(s) with the appropriate word(s).
What type of attack exploits a lack of bounds checking on the size of data stored in an array?
A. buffer overflow B. SQL injection C. phishing D. ActiveX control
You can enter, edit, and navigate data in a query datasheet just like a(n) report datasheet. _________________________
Answer the following statement true (T) or false (F)
The ____________________ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.
A. WWW B. TCP C. FTP D. HTTP