The ____ is a protocol used to manage networked equipment.
A. PPTP
B. SNMP
C. FTP
D. L2TP
Answer: B
You might also like to view...
Theoretically, clients do not need to see the _________ of classes from which they derive other classes.
a. Header files. b. Source code. c. Object code. d. Interface.
An user's system clock is in the format "dd-mm-yyyy". In A1 of a spreadsheet he enters a date: 30-02-2014. Then in A2 he enter a following formula: =DATE(A1). What would be the result of A2?
Select one: a. 02 b. An error c. 30
The probability that a specific vulnerability within an organization will beĀ attacked by a threat is known as __________.
A. impact B. likelihood C. uncertainty D. tolerance
The most common connection setting is FTP, which stands for _________________________.
Fill in the blank(s) with the appropriate word(s).