1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enyata [817]
4 years ago
9

Which two wildcard masks are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to n

etwork 172.16.32.0/28?
(Choose two.)
a. 0.0.63.255
b. 0.0.0.63
c. 0.0.0.31
d. 0.0.0.15
e. 0.0.0.0
Computers and Technology
1 answer:
Jobisdone [24]4 years ago
8 0

Answer:

The two wildcard masks that are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to network 172.16.32.0/28 is 0.0.0.63 and 0.0.0.15

Explanation:

To identify the wild cards simply look slash number. Regardless of the netmask number, the corresponding wildcard mask for the slash /26 and /28 are 0.0.0.63 and 0.0.0.15.

You might be interested in
What is closeable interface in java.
alisha [4.7K]

Answer:

A Closeable is a source or destination of data that can be closed. The close method is invoked to release resources that the object is holding (such as open files).

Explanation:

hope it help?

8 0
3 years ago
How to create json object from variables javascript
tino4ka555 [31]
Not entirely sure what you want to achieve, but consider this program:

var a = 'foo';
var b = 'bar';

var c = { first : a, second : b };

console.log(JSON.stringify(c, null, 4));

A json object c is constructed using the values from variables a and b. Is this what you mean?
8 0
4 years ago
Which business application uses electronic tags and labels to identify objects wirelessly over short distances?
Varvara68 [4.7K]

Answer:

Option A (Radio Frequency Identification)

Explanation:

Option A (Radio Frequency Identification)

Radio Frequency Identification:

This technology uses radio waves to transfer data between a reader and movable items. The benefit of this technology is we do not require physical contact with items and scanner.

Components of RFID:

  • tags (computer chip)
  • Reader
  • Communication System
  • RFID software

There are two RFID standards:

  • Electronic Product Code (EPC) standard
  • International Standard Organization (ISO)
4 0
3 years ago
Windows explorer has a pane located on the left side which can display the directory structure of one or more drives. what is th
Triss [41]
It is called the Navigation Pane
4 0
4 years ago
Jose is upgrading the memory on his laptop. The laptop has two slots for RAM, but one of them is currently being occupied. He ha
inn [45]

Answer:

Reseat the new stick of RAM

Explanation:

Joe needs to reseat the new stick of the RAM. For that, he should gently release the clips which hold RAM in the correct posture, and one on each side. Joe is required to do this for each of the available memory modules. And then he will have the cautiously replace all the memory modules( 2 in number) through to DIMM slots which are on the motherboard. Make sure that you have noted down the locations of each notches on the RAM as well as the DIMM slots.

3 0
3 years ago
Other questions:
  • What is the keyboard command that allows you to copy text
    12·2 answers
  • Your smartphone, digital camera, and printer are all part of a network in your workspace. What type of network is likely in use
    7·1 answer
  • . Does Zuckerberg believe in the thought that “the endpoint is when you sell the
    15·1 answer
  • Create and Provide complete program that includes a comments header with your name, course, section and other program details an
    9·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • What happens if i unplug my alarm system?
    11·1 answer
  • How would asking questions or defining problems be used in this career?<br> -
    13·1 answer
  • You would like to narrow your search on this topic.
    15·2 answers
  • What key do I use to start my presentation
    9·1 answer
  • Above all else, be...
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!