1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
enyata [817]
3 years ago
9

Which two wildcard masks are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to n

etwork 172.16.32.0/28?
(Choose two.)
a. 0.0.63.255
b. 0.0.0.63
c. 0.0.0.31
d. 0.0.0.15
e. 0.0.0.0
Computers and Technology
1 answer:
Jobisdone [24]3 years ago
8 0

Answer:

The two wildcard masks that are required in an extended access list entry that blocks the traffic from network 192.168.20.0/26 to network 172.16.32.0/28 is 0.0.0.63 and 0.0.0.15

Explanation:

To identify the wild cards simply look slash number. Regardless of the netmask number, the corresponding wildcard mask for the slash /26 and /28 are 0.0.0.63 and 0.0.0.15.

You might be interested in
You want to establish the validity of a test designed for computer technicians using a predictive criterion-related validation s
fgiga [73]

Answer:

(C) people applying for computer technician jobs in your company.

Explanation:

According to my research on information technology, I can say that based on the information provided within the question in order to establish the validity of the test you should give the test to people applying for computer technician jobs in your company. Then examine and compare their score with their job performance if hired.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
HELP 20 points THIS IS ON EDGE IF YOU DON'T KNOW THE ANSWER DON'T RESPOND
fenix001 [56]

Aaaaaaaaaaaaaa aap poora en of sk of eu

4 0
3 years ago
Read 2 more answers
Pam wants to make a note for other programmers in her Python code. How should the line of code for the note begin?
Kisachek [45]

Based on Pam's work, the line of code for the note should begin with  # sign.

<h3>What is # the sign about?</h3>

Note that in Python, comments are said to be shown or indicated through the use of a line starting with a # symbol.

Note also that  that # symbol  is one that also tells the computer that it should not  execute the statement that is found in that line.

Learn more about from

brainly.com/question/23275071

#SPJ1

5 0
2 years ago
Read 2 more answers
Please help me with these questions
adelina 88 [10]

3. A, (first choice)

4. C (Third choice from top)


6 0
3 years ago
You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby o
Karo-lina-s [1.5K]

Answer:

<u>VLANs</u>

Explanation:

Virtual LANs (VLANs) are a type of network connection or arrangement of network devices in the same broadcast domain. They are called Virtual LANs because they represent fractions or subgroups in the switch ports found in an Ethernet LAN.

Indeed, because of their topological arrangement, this reduces the security risk of unauthorized access to sensitive data or devices since the host can be placed on a different VLAN. Hence, in this scenario, using this network feature would allow visitors to plug into these ports to gain internet access, but they would not have access to any other devices on the private network.

5 0
3 years ago
Other questions:
  • Encryption is the process of:
    12·1 answer
  • What daily life problems does the algorithm quicksort solve?
    14·1 answer
  • In a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place,
    12·1 answer
  • What important information is added to the TCP/IP transport layer header to ensure communication and connectivity with a remote
    13·1 answer
  • Create a new conditional format that applies yellow fill (fourth color under Standard Colors) and bold font to values that conta
    14·1 answer
  • A financially stable person is able to
    12·2 answers
  • why is the disk method a special case of the general slicing​ method? choose the correct answer below. a. the cross sections of
    7·1 answer
  • If you copy a drawing from the Internet and use it in a report, you might be violating the artist's
    8·1 answer
  • Which sentence is correctly punctuated? WILL GIVE YU MONEY GIVE ME YOUR CASH APP PLS
    12·2 answers
  • The purpose of Appetizers on the menu​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!