The ____ command-line utility is used to trace the route a packet of information takes to get to its target.

A. ping
B. ping -a 192.168.1.1
C. tracert
D. tracepath


Answer: C. tracert

Computer Science & Information Technology

You might also like to view...

If a shorthand background property is used and all background properties are to be changed, which value should be listed last?

A. attachment B. position C. image D. repeat

Computer Science & Information Technology

In a data dictionary, data elements are combined into _____, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

A. fields B. columns C. records D. decimals

Computer Science & Information Technology

What technology is an open source federation framework and supports the development of authorization protocols?

A. Shibboleth B. OAuth C. SAML D. Kerberos

Computer Science & Information Technology

_____ ensures that aproject will meet the needs for which it was undertaken.

a. Quality analysis b. Quality schedule c. Quality expatriation d. Quality management

Computer Science & Information Technology