The ____ is a protocol used to manage networked equipment.

A. PPTP
B. SNMP
C. FTP
D. L2TP


Answer: B

Computer Science & Information Technology

You might also like to view...

Theoretically, clients do not need to see the _________ of classes from which they derive other classes.

a. Header files. b. Source code. c. Object code. d. Interface.

Computer Science & Information Technology

An user's system clock is in the format "dd-mm-yyyy". In A1 of a spreadsheet he enters a date: 30-02-2014. Then in A2 he enter a following formula: =DATE(A1). What would be the result of A2?

Select one: a. 02 b. An error c. 30

Computer Science & Information Technology

The probability that a specific vulnerability within an organization will beĀ attacked by a threat is known as __________.

A. impact B. likelihood C. uncertainty D. tolerance

Computer Science & Information Technology

The most common connection setting is FTP, which stands for _________________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology