diff --git a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/104-subnet-mask.md b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/104-subnet-mask.md index 42d48ab27..694a1d8b4 100644 --- a/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/104-subnet-mask.md +++ b/src/data/roadmaps/cyber-security/content/102-networking-knowledge/106-ip-terminology/104-subnet-mask.md @@ -22,3 +22,5 @@ Understanding and configuring subnet masks correctly is crucial in cybersecurity - Improve the overall network stability and monitoring capabilities To determine the appropriate subnet mask for different requirements, you can use various subnetting tools available online. Proper management of subnet masks is crucial for maintaining a secure, efficient, and well-functioning network. + +- [Wildcard mask](https://en.wikipedia.org/wiki/Wildcard_mask) \ No newline at end of file