Which of the following is the subnet mask for CIDR /22?

a. 255.255.255.252
b. 255.252.0.0
c. 255.255.255.254
d. 255.255.252.0


d. 255.255.252.0

Computer Science & Information Technology

You might also like to view...

If you write a C++ program using operating system dependent libraries, will you be able to re-compile and re-link it on a different operating system? Explain why?

What will be an ideal response?

Computer Science & Information Technology

What is the name of the technology used on T-carrier leased lines that separates channels by specific time intervals?

A) FDM B) ATM C) Frame Relay D) TDM

Computer Science & Information Technology

List the three types of service provided by the LLC protocol.

What will be an ideal response?

Computer Science & Information Technology

Which is NOT a characteristic of validation the input request?

A. Cleansing the request B. Authorizing the sender C. Code for software diversity D. Encapsulating the data

Computer Science & Information Technology