It is possible to replace the 0.0.0.0 255.255.255.255 entry, which represents all hosts and all networks, with the ____ keyword.
A. all
B. any
C. each
D. none
Answer: B
You might also like to view...
What are two different ways that form values are used?
What will be an ideal response?
FIGURE 5-2____ detection was used in Figure 5-2 above to remove the full colors of the original image to uncover the outlines of the objects represented in the image.
A. Line B. Edge C. Luminance D. Color
____ lists have elements that are arranged according to some criteria.
A. Structured B. Unstructured C. Random D. Sorted
A network administrator notices that all of the company switches are running at capacity on a given day, which is abnormal according to network baselines taken recently. Which tool would BEST allow the administrator to inspect what type of traffic is on the network?
A. Wire tap B. Network sniffer C. Load balancing appliance D. NIPS