Which of the following is the subnet mask for CIDR /22?
a. 255.255.255.252
b. 255.252.0.0
c. 255.255.255.254
d. 255.255.252.0
d. 255.255.252.0
Computer Science & Information Technology
You might also like to view...
If you write a C++ program using operating system dependent libraries, will you be able to re-compile and re-link it on a different operating system? Explain why?
What will be an ideal response?
Computer Science & Information Technology
What is the name of the technology used on T-carrier leased lines that separates channels by specific time intervals?
A) FDM B) ATM C) Frame Relay D) TDM
Computer Science & Information Technology
List the three types of service provided by the LLC protocol.
What will be an ideal response?
Computer Science & Information Technology
Which is NOT a characteristic of validation the input request?
A. Cleansing the request B. Authorizing the sender C. Code for software diversity D. Encapsulating the data
Computer Science & Information Technology