The ____ registers the IP addresses and names of its client computers by writing them to the WINS database.
A. DHCP server
B. BOOTP server
C. WINS server
D. DNS server
Answer: C
You might also like to view...
vty is the virtual terminal used for which of the following?
What will be an ideal response?
What must happen before an IPsec tunnel can be established?
a. Security parameters have to be negotiated and publicly agreed upon by both ends. b. IKE Phase 1 is a phase where both network nodes authenticate each other and set up an IKE SA. IKE Phase 2 uses the plain-text channel established in phase 1 to negotiate the unidirectional IPsec SAs, inbound and outbound, to set up the IPsec tunnel. c. IKE Phase 1 is a phase where one network node authenticates the other and sets up an IKE SA. IKE Phase 2 uses the open channel established in phase 1 to negotiate the unidirectional IPsec SAs, inbound and outbound, to set up the IPsec tunnel. d. Security parameters have to be negotiated and agreed upon by both ends.
Which of the following statements about animations is NOT true?
A) Animations can be applied to an individual slide, a slide master, or a custom slide layout. B) Animations can decrease file size. C) Too many animations might cause viewer discomfort. D) The overuse of animations can detract from a professional presentation.
Which HDMI connector type has 29-pins and is used with very high resolution displays?
A) Type A B) Type B C) Type C D) Type D