adplus-dvertising
frame-decoration

Question

Which protocol will be used to automate the IP configuration mechanism which includes IP address, subnet mask, default gateway, and DNS information?

a.

SMTP

b.

DHCP

c.

ARP

d.

TCP/IP

Answer: (b).DHCP

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which protocol will be used to automate the IP configuration mechanism which includes IP address, subnet mask, default gateway, and DNS information?

Similar Questions

Discover Related MCQs

Q. In Go–back 3 flow control protocol every 6th packet is lost. If we have to send 11 packets. How many transmissions will be needed ?

Q. What will be the total minimum bandwidth of the channel required for 7 channels of 400 kHz bandwidth multiplexed together with each guard band of 20 kHz?

Q. Which of the following is false:

Q. The subnet mask for a particular network is 255.255.31.0. Which of the following pairs of IP addresses could belong to this network?

Q. Which of the following protocol is called as byte-oriented protocol?

Q. If syn = 0 and ack = 1, it indicates

Q. A DNS.....................server gets its data from another DNS server.

Q. The .............................field in the MIME header describes the method used to encode the data.

Q. A client message usually needs ........................ to send mail.

Q. Which one is not a method of HTTP?

Q. Which one of the following is a communication protocol used for email?

Q. Which one of the following statement about email is false?

Q. Which one of the following can be used on the IP network to monitor a router?

Q. Which of the following is true?

Q. Which of the following is not a Block cipher?

Q. In a ................................attack, an intruder comes between two communicating parties, Intercepting and replying to their messages.

Q. A computer crime is

Q. A program that migrates through networks and operating systems by attaching itself to different Programs and databases is a

Q. In RSA.............................in the common factor in both keys?

Q. Programs that come into a computer system disguised as something else are called