更多"[单选题]The Dynamic Host Configuration"的相关试题:
[单选题]The Dynamic Host Configuration Protocol provides configuration parameters to Internet( ).DHCP consists of two components:a( )for delivering host-specifie configuration parameters from a DHCP server to a host and a mechanism for allocation of network addresses to hosts.DHCP is built on a client-server model,where designated DHCP server hosts allocate network addresses and deliver( )parameters to dynamically configured hosts.DHCP supports three mechanisms for IP address allocation.In“automatic allocation”,DHCP assigns a( )IP address to client.In“dynamic allocation”,DHCP assigns an IP address to a client for a limited period of time.In“manual allocation”,a client’s IP address is assigned by the network(本题),and DHCP is used simply to convey the assigned address to the client.
A.controller
B.user
C.host
D.administrator
[单选题]The TCP protocol is a ( ) layer protocol.
A.physical
B.network
C.transport
D.application
[单选题]Configuration management system can be used in defining approval levels for authorizing changes and providing a method to validate approved changes. ( ) is not a project configuration management tool.
A.Rational Clearcase
B.Quality Function Deployment
C.Visual SourceSafe
D.Concurrent Versions System
[单选题]Configuration management is focused on the specification of both the deliverables and the processes;while( )is focused on identifying,documenting,and approving or rejecting changes to the project documents,deliverables,or baselines.
A.cost management
B.change management
C.configuration management
D.capacity management
[单选题]In order to facilitate configuration and change management, manual or automated tools maybe used. Tools selection should be based on the needs of the( ).
A. Project manager
A.CC
B.members
C.Project stakeholders
D.Project Management Office(PMO)
[单选题]Software configuration management(SCM)is the task of tracking and controlling changes in the software. Configuration management practices include configuration identification,change control, ( ) and configuration audit.
A.milestones marking
B.status reporting
C.stakeholder management
D.quality audit
[单选题]TCP/IP communication protocol contains four layers. From bottom to top, the four layers are ( ) .
A.network interface layer—internet layer—transport layer—application layer
B.internet layer —network interface layer—transport layer—application layer
C.network interface layer—transport layer —network interface layer—application layer
D.application layer—transport layer —internet layer—network interface layer
[单选题]The prototyping method is a dynamic design processes,which requires people who use prototyping method to have the following capability of( ).
A.proficient program expertise
B.immediately acquire requirement
C.coordinata&organize eloquently
D.handle tools smartly
[单选题]IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual ( ) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the (请作答此空) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.
A.network
B.transport
C.application
D.session
[单选题]TCP (Transmission Control Protocol) was specifically designed to provide a reliable end-to-end byte stream over a (n)
A.IP address
B.reliable network
C.Socket
D.unreliable internetwork
[单选题]Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device(请作答此空). SNMP is a component of the Internet Protocol Suiteas defined by the Internet( )Task Force. SNMP operates in the( )layer of the Internet protocol suite. All SNMP messages are transported via User( )Protocol. An SNMP-managed network consists of three key components: a) Managed devices, b) ( )(i.e.,software which runs on managed devices), and c) Network management station (NMS) (i.e., software which runs on the manager).
A.behavior
B.configuration
C.performance
D.status