From 037763770dc443080a94ca0e1dd70b4f71b3c617 Mon Sep 17 00:00:00 2001 From: roadmap bot <135830415+roadmap-bot@users.noreply.github.com> Date: Sun, 2 Jul 2023 23:35:41 +0100 Subject: [PATCH] chore: add resource under cyber-security:networking-knowledge:ip-terminology:subnet-mask --- .../106-ip-terminology/104-subnet-mask.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/104-subnet-mask.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/104-subnet-mask.md index 42d48ab27..694a1d8b4 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/104-subnet-mask.md +++ b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/104-subnet-mask.md @@ -22,3 +22,5 @@ Understanding and configuring subnet masks correctly is crucial in cybersecurity - Improve the overall network stability and monitoring capabilities To determine the appropriate subnet mask for different requirements, you can use various subnetting tools available online. Proper management of subnet masks is crucial for maintaining a secure, efficient, and well-functioning network. + +- [Wildcard mask](https://en.wikipedia.org/wiki/Wildcard_mask) \ No newline at end of file