_______________are examples of supervisory protocols in TCP/IP.

A. DNS, DHCP, and LDAP
B. DNS, SSL, and TLS
C. SIP, HTTP, and LDAP
D. HTML, SMTP, and LDAP


A. DNS, DHCP, and LDAP

Computer Science & Information Technology

You might also like to view...

There is(are) ____________ base case(s) in the recursive solution to finding a path through a maze.

a) 0 b) 1 c) 2 d) 3 e) 4

Computer Science & Information Technology

The ________ displays above the selected picture and provides a way to rotate the image

A) alignment handle B) sizing handle C) picture handle D) rotation handle

Computer Science & Information Technology

The unauthorized duplication, installation, or distribution of copyrighted computer software, which is a violation of intellectual property, is called __________.

A. software piracy  B. copyright infringement C. trademark violation D. data hijacking

Computer Science & Information Technology

Which of the following specifications of 802.11 can operate simultaneously at 2.4GHz and 5GHz?

A. 802.11a B. 802.11b C. 802.11g D. 802.11n

Computer Science & Information Technology