1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
15

Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. Th

e technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.)
A. The web server at 192.168.0.10 is reachable from the source host.
B. The default gateway between the source host and the server at 192.168.0.10 is down.
C. There is a problem with the web server software on web-s1.cisco.com.
D. A router is down between the source host and the server web-s1.cisco.com.
E. DNS cannot resolve the IP address for the server web-s1.cisco.com.
Computers and Technology
1 answer:
pantera1 [17]3 years ago
8 0

......Explanation:

ascsmlmcm

You might be interested in
What are some of the challenges that could arise from setting up a file management system on a computer?
son4ous [18]
It could glitch out or be hacked or deleted.
8 0
3 years ago
4. What two important events occurred early in the formation of the universe?
Annette [7]
C. When they separated it created the big bang
4 0
3 years ago
Use the drop-down menus to complete statements about the Quick Steps function.
Sloan [31]

Answer:

  1. pray the god for your answer

Explanation:

I lllllllllllllll believe the Jesus

7 0
2 years ago
A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a singl
victus00 [196]

Answer: (D) Distributed denial- of- service (DDoS)

Explanation:

The distributed denial of service attack is one of the type of attack that occur when the multiple system are basically flooded with the resources and the bandwidth.

  • Botnet is one of the example of DDoS as it caused the DOS (denial of service) for the users.
  • This type of attack is more substantial as compared to the DoS attack as they use the multiple system for attack the single target simultaneously.

Therefore, Option (D) is correct.

8 0
3 years ago
25 points select 3 options!!!!!!!!!!!!!!!!!!!!!!!!!
STALIN [3.7K]
A, B , and E sorry if I’m wrong
4 0
2 years ago
Other questions:
  • Business Risks are ​
    15·1 answer
  • Maria found a cupcake recipe on a cooking blog. However, she would like to read comments and suggestions before she begins bakin
    6·2 answers
  • Which of the following image file formats uses lossy file compression?
    7·1 answer
  • Someone who is young, lacks funds, and really wants to gain technical skills while serving his or her nation should consider
    8·1 answer
  • You want to join your computer to a homegroup but you don't see any homegroups on your home network
    11·1 answer
  • 1. A tachometer measures:
    8·1 answer
  • Who invented the ENIAC? More than one answer may apply.
    14·1 answer
  • What is the importance of eliminating marks that classify a master key
    7·1 answer
  • Which memory will be suitable (a) to Run a software (b) to store a software permanently ?
    9·1 answer
  • Which factor affects reading speed the most?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!