Which underlying protocol enables network monitoring tools to work?

A. TCP
B. SNMP
C. UDP
D. SMTP
 


Answer: B

Computer Science & Information Technology

You might also like to view...

Which feature was first introduced with Windows Server 2012 R2, and are new Active Directory containers to which authentication policies can be applied to restrict where high-privilege user accounts can be used in the domain?

A. Authentication Policy silos B. Automatic SPN management C. AES support D. DFS replication

Computer Science & Information Technology

Changes you make to a photo do not become permanent until you _________________________ or store them on a storage device.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can use the Word Options button within the File menu to determine specific defaults

Indicate whether the statement is true or false

Computer Science & Information Technology

You can use the Format Painter to copy formatting from text or an object to another

Indicate whether the statement is true or false.

Computer Science & Information Technology