When you are designing IP subnets, the ________ defines the size of the subnet
A) Autonomous system
B) Wildcard mask
C) Subnet mask
D) Area
C
Explanation: C) When you are configuring subnets, you use the subnet mask to define the size of a subnet along with the IP address class.
You might also like to view...
Cisco uses the term ________ to refer to a reinitialization of the software
A) Reload B) Reboot C) Reinitialize D) Refresh
The years between 1920 and 1960 are considered the Golden Age of ________.
Fill in the blank(s) with the appropriate word(s).
The break statement violates pure structured programming principles because it provides a second, nonstandard exit from a loop.
Answer the following statement true (T) or false (F)
To check for invalid data entered as the result of a formula or automated tools such as Goal Seek, use the ‘____' command.
A. Bold Invalid Data B. Delete Invalid Data C. Circle Invalid Data D. Replace Invalid Data