The ____ registers the IP addresses and names of its client computers by writing them to the WINS database.

A. DHCP server
B. BOOTP server
C. WINS server
D. DNS server


Answer: C

Computer Science & Information Technology

You might also like to view...

vty is the virtual terminal used for which of the following?

What will be an ideal response?

Computer Science & Information Technology

What must happen before an IPsec tunnel can be established?

a. Security parameters have to be negotiated and publicly agreed upon by both ends. b. IKE Phase 1 is a phase where both network nodes authenticate each other and set up an IKE SA. IKE Phase 2 uses the plain-text channel established in phase 1 to negotiate the unidirectional IPsec SAs, inbound and outbound, to set up the IPsec tunnel. c. IKE Phase 1 is a phase where one network node authenticates the other and sets up an IKE SA. IKE Phase 2 uses the open channel established in phase 1 to negotiate the unidirectional IPsec SAs, inbound and outbound, to set up the IPsec tunnel. d. Security parameters have to be negotiated and agreed upon by both ends.

Computer Science & Information Technology

Which of the following statements about animations is NOT true?

A) Animations can be applied to an individual slide, a slide master, or a custom slide layout. B) Animations can decrease file size. C) Too many animations might cause viewer discomfort. D) The overuse of animations can detract from a professional presentation.

Computer Science & Information Technology

Which HDMI connector type has 29-pins and is used with very high resolution displays?

A) Type A B) Type B C) Type C D) Type D

Computer Science & Information Technology