answersLogoWhite

0


Best Answer

80/20 rule

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What method is used to providing fault tolerance to DHCP?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which method is most frequently used for providing fault tolerance to DHCP servers?

A) failover clusteringB) standby serversC) splitting scopes


How do you enable the dhcp?

The method of enabling DHCP depends on the OS in use. On Windows, DHCP can be enabled by activating the 'Automatically choose IP address' setting in the connection properties dialogue box of the connection.


What is server in networking?

Server is a system that is used for providing services to clients. for example print server provides print service, dhcp service provides dhcp service


What uses a centralized authentication method?

Active Directory is commonly used for this.


IP address be assign serveral method Identify those methods involve?

1. DHCP server 2.Static assignment 3 manual dhcp


In the Absence of dhcp server which ip client will receive?

A DHCP server will privide a client with a valid IP address for the network for which the DHCP server is providing a service.Where there is no DHCP server the IP address for a client must be set manually. When doing this care must be taken to ensure that two IP addresses are not set the same on the network.


What is role in active directory?

The role refers to the service or services that the server is providing, such as DHCP, DNS, HTTP, etc.


Which protocol allows for the automatic configuration of host tcp ip address?

There are two ways to configure Ip address . One method is to do this manually .And other is to do this using dynamic host configuration protocol.


What is dhcp spoofing?

DHCP Spoofing is a Man-in-The-Middle technique whereby the attacker responds to DHCP request message, providing the target with an IP address and also setting the attacker's IP address as the gateway address of the victim machine, thereby relaying all traffic from the victim's machine via the attacker's machine.


Can a computer communicate without an IP address?

Yes. There are a number of ways this can (and in fact does) happen. The most obvious happens in a DHCP request, which is a method by which a computer that does not have an IP address gets an IP address from a DHCP server.


What protocols have made rarp largely unnecessary on modern tcp ip networks?

BOOTP, and eventually DHCP, replaced RARP. Both BOOTP and DHCP offer a more robust, flexible method of assigning IP addresses.


What ports are used by dhcp and the DHCP client?

The port 67 and port 68 are used by DHCP and the DHCP clients.