1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nat2105 [25]
2 years ago
13

The network administrator modified a configuration file to utilize a tier 1 time server. since making the change, time updates v

ia ntp are no longer occurring. what most likely has occurred?
Computers and Technology
1 answer:
Elza [17]2 years ago
3 0

To use a tier 1 time server, the network administrator changed a configuration file. Time up what has likely happened since making the modification. The firewall has blocked Port 123, which is where the most likely attack originated from.

<h3>What is the network administrator?</h3>
  • The person authorized in an organization to maintain computer infrastructures, with a focus on local area networks (LANs) and up to wide area networks, is known as a network administrator (WANs).
  • Organization-specific responsibilities may differ, but some of the primary areas of attention include setting up new hardware, maintaining local servers, enforcing licensing agreements, monitoring software-network interactions, and ensuring network integrity and resilience.

Therefore the correct answer is, option a) Port 123 is blocked on the firewall

The complete question is:

The Network Administrator modified a configuration file to utilize a tier 1 timeserver. Since making the change, time updates via NTP are no longer occurring. What most likely has occurred?

a. Port 123 is blocked on the firewall

b. The Network Administrator forgot to reboot the system

c. The Network Administrator improperly ran the timedatectl command

d. The feature is not available on Red Hat strains of Linux, and must be converted to a Debian strain

To learn more about The network administrator, refer to:

brainly.com/question/27745003

#SPJ4

You might be interested in
What is radio frequency identification used for
Sauron [17]

Answer:

Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID tag consists of a tiny radio transponder; a radio receiver and transmitter.

Radio Frequency Identification (RFID) is a technology designed to allow objects, animals and even human beings to be identified, located, and tracked using radio frequency signals.

8 0
3 years ago
Question #5<br> How does the computer decide which path to follow in a selection control structure?
konstantin123 [22]

Answer:

to answer your question in my thoughts the material of the coding structure helps the software or the cpu translate or guide the programming  .

Explanation:

6 0
3 years ago
BRAINLIEST You have a small company and want to keep your costs low, but it is important your employees share data. Which networ
solmaris [256]

Answer:Peer-to-peer

Explanation: I hope this helps

5 0
3 years ago
Read 2 more answers
A foreach statement can be used in place of the for statement whenever code looping through an array requires "access" to the co
Ede4ka [16]

Answer:

False

Explanation:

Foreach is useful when we want to do something for each element rather than repeating something for  n times

Answer is False

5 0
3 years ago
Which section of a personal narrative requires the most development
attashe74 [19]
D. Plot because a,b,and c is consider plot can i have brainlest answer please

5 0
4 years ago
Other questions:
  • Clunker Motors Inc. is recalling all vehicles from model years 1995-1998 and 2004-2006.Given a variable modelYear write a statem
    5·1 answer
  • What is the main benefit of seeing your document in Page Break Preview?
    9·2 answers
  • Write a class that can make comparisons between the efficiency of the common methods from the List interface in the ArrayList an
    5·1 answer
  • Public class Car {
    15·1 answer
  • What is likely to happen to the economy when there’s too much money or credit circulating?
    13·1 answer
  • How can you get access to Help? Click all that apply.
    5·2 answers
  • The section of the browser window highlighted in yellow is the _____.
    11·1 answer
  • HELP WILL GIVE BRAINIEST IF YOU HELP ME.....
    8·2 answers
  • Question 2:
    7·1 answer
  • ____ includes) all tools that capture, store, process, exchange, and use information.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!