When monitoring DHCP, the best way to check the bindings is to execute the ____ command on the router.
A. show binding
B. show ip dhcp
C. show ip domain-server
D. show ip dhcp binding
Answer: D
Computer Science & Information Technology
You might also like to view...
The identification of vulnerabilities is usually done through ____ tests.
A. network B. application C. penetration D. protocol
Computer Science & Information Technology
Orientation refers to the absolute positions of the worksheet and the paper.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Static RAM
What is the meaning of the term (when applied to memory systems technology)?
Computer Science & Information Technology
Explain in detail how to know when to justify text. Include in your answer definitions of the following terms: flush left, flush right, justify, loose line, type line, and river.
What will be an ideal response?
Computer Science & Information Technology