Which of the following is a service that provides a way for a client computer that lacks an IP address assignment to request one from any listening DHCP server - without the help of an administrator?
A. TCP/IP
B. DHCP
C. BOOTP
D. PING
Answer: B
You might also like to view...
Which of the following statements is false?
a. You can solve any computing problem by executing a series of actions in a specific order. b. An algorithm is a procedure for solving a problem in terms of the actions to execute, and the order in which these actions execute. c. Program control specifies the order in which statements (actions) execute in a program. d. All of the above statements are true.
Consider a file system with a graphical user interface, such as Macintosh’s Finder, Microsoft’s Windows Explorer, or Linux’s KDE. The following objects were identified from a use case describing how to copy a file from a floppy disk to a hard disk: File, Icon, TrashCan, Folder, Disk, Pointer. Specify which are entity objects, which are boundary objects, and which are control objects.
What will be an ideal response?
When the data in a combo box is based on a field in a related table, you can edit the related value from both tables within the combo box
Indicate whether the statement is true or false
A ____ attack takes each word from a dictionary and encodes it in the same way the passphrase was encoded.
A. social engineering B. brute force C. dictionary D. birthday