1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
8

The DHCP server is configured with the address lease duration set at 5 days. An employee returns to the office after an absence

of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain
Computers and Technology
2 answers:
Wewaii [24]3 years ago
3 0

Answer:

both MAC and IPv4 addresses of the DHCP server

FF-FF-FF-FF-FF-FF and IPv4 address of the DHCP server

FF-FF-FF-FF-FF-FF and 255.255.255.255

MAC address of the DHCP server and 255.255.255.255

Explanation:

When the lease of a dynamically assigned IPv4 address has expired, a workstation will send a DHCPDISCOVER message to start the process of obtaining a valid IP address. Because the workstation does not know the addresses of DHCP servers, it sends the message via broadcast, with destination addresses of FF-FF-FF-FF-FF-FF and 255.255.255.255.

givi [52]3 years ago
3 0

Answer:

FF-FF-FF-FF-FF-FF and 255.255.255.255

Explanation:

At the expiration of the assigned IPV4 address, the work station will send a DHCPDISCOVER message so as to initiate the process of getting an authentic IP address. This is because the workstation cannot identify the DHCP serves address.

The second layer address broadcast FF-FF-FF-FF-FF-FF is adopted on the ethernet frame and is assumed to be broadcasted on all equipment.

255.255.255.255 is the 3rd layer address used to label the exact same host.

You might be interested in
Question 4 / 5
kkurt [141]

Answer:

it can damage you liver. and you can drink to much and bleed inside.

4 0
2 years ago
Can you anyone please help me​
Yuliya22 [10]

Answer:

Option C I think

3 0
2 years ago
Review the portion of the application above. Record any changes or corrections that need to be made and why.
crimeas [40]

Answer:

Necessary Corrections: First Name and Last Name are recorded in incorrect boxes. Scribbles on errors instead of making corrections Does not include information in the SSN or Desired Salary blank Does not list which position she is applying for Has box checked that she has worked for the company, but does not say when For education just wrote “Yes” instead of listing the high school and address Justification: All of this make the applicant appear less professional and hurt her chances of getting hired. She is not following the directions properly, and she is not asking questions so that she can accurately fill out the application.

(I got a 100% so I know its correct)

4 0
2 years ago
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________
tresset_1 [31]
The answer is Phishing
3 0
3 years ago
Read 2 more answers
Which of the following is true about operating system.
zalisa [80]

Answer:

google kis kam ka hai us se puch lo

7 0
2 years ago
Other questions:
  • What computer system was the first to run the unix operating system?
    11·1 answer
  • Can somebody explain me what this code does in a few or one sentence?#include #include using namespace std;int main () { const i
    12·1 answer
  • A drowsy cat spots a flowerpot that sails first up and then down past an open window. The pot is in view for a total of 0.50 sec
    13·1 answer
  • . Two or more functions may have the same name, as long as their _________ are different.
    9·1 answer
  • What is a collection of computer programs that administer the hardware and software of a computer so that they work properly?
    7·1 answer
  • Write a Java program that generates a new string by concatenating the reversed substrings of even indexes and odd indexes separa
    5·1 answer
  • What should be used to keep a tablet dry?
    13·1 answer
  • Ill give alot of points if you answer: How do I get a 100 dollar ps4
    5·2 answers
  • For all programs, you should write a small amount of code and _______
    6·1 answer
  • The most common technique for using an appropriate synchronization mechanism to serialize the accesses to prevent errors is to a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!