1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
3 years ago
8

A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve

r has been repaired, however it is feared that DNS entries may remain in client computer caches. Which of the following tools can be used to flush the DNS cache on a Windows client?a. NET
b. PING
c. NSLOOKUP
d. IPCONFIG
Computers and Technology
1 answer:
sattari [20]3 years ago
3 0

Answer:

IPCONFIG Pls mark brainliest

Explanation:

You might be interested in
In a relational database design, all relationships are expressed by ________.
velikii [3]
Explain what is meant by a limited data set and how this HIPAA rule may affect medical assistants
8 0
4 years ago
Which of the following is not a valid SQL command? (Points : 2) UPDATE acctmanager SET amedate = SYSDATE WHERE amid = 'J500';
Volgvan

Answer:

UPDATE acctmanager WHERE amid = 'J500';

Explanation:

The statement written above is not valid SQL statement because there is no SET after UPDATE. Update is always used with SET.If you are updating something then you need to specify the value with which that value should be replaced.

UPDATE acctmanager SET amname = UPPER(amname);

This statement does not contains WHERE clause but it will run all the values of amname column will get updated in the table acctmanager.

6 0
3 years ago
____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to pa
Talja [164]

Answer: Zombies

Explanation: Zombie is a computer device that is responsible for the compromising the system and making it prone to several destruction such as the Trojan horse virus,hackers and other viruses as well. Zombie makes the computer system to get malfunctioned easily ,that is without much security and various malicious functions can be performed.They basically act as the infected computer .

6 0
3 years ago
Read 2 more answers
program that initialises a vector with the following string values: “what” “book” “is” “that” “you” “are” “reading”.
Zanzabum

A program that initializes a vector with the following string values: “what” “book” “is” “that” “you” “are” “reading” are the usage of namespace std;int main().

<h3>What is a vector software program?</h3>

Vector images software program permits customers to layout and manages pc photos the usage of geometric and mathematical commands, instead of clicks and strokes as utilized in drawing software program. Vector photos created the usage of those applications may be scaled indefinitely with out dropping quality.

  1. #include
  2. #include
  3. #include
  4. the usage of namespace std;
  5. int main()
  6. ;
  7. vector::iterator it;
  8. for (it = vs.begin(); it != vs.end(); it++)
  9. string tmp;
  10. while (cin.get()!='n')
  11. for (it = vs.begin(); it != vs.end(); it++)
  12. }

Read more about the vector :

brainly.com/question/25705666

#SPJ1

3 0
2 years ago
Task 7: The following is a quiz program that asks the us-
Leni [432]

Answer:

peread

Explanation:

7 0
3 years ago
Other questions:
  • What country is now the number one source of attack traffic?
    5·1 answer
  • What is the most powerful gpu or known as the graphics card in the world?
    8·2 answers
  • Match the job titles to the tasks
    11·2 answers
  • 3. Before you get ready to go diving, you want to explore the area. You see a small snowpack across a small bridge, a short walk
    11·1 answer
  • The mac group does not replace the primary functions of eocs or other dispatch organizations. True or False
    8·1 answer
  • Knowing what you know about today’s video games, imagine what it would look like if you had to create a modern-day version of Sp
    6·1 answer
  • Rerouting traffic using arp poisoning is an attack on ________ of a network.
    8·1 answer
  • Its a zoom call
    7·1 answer
  • Select three advantages of cloud computing.
    10·1 answer
  • What is the value of six sigma ? How dose it relate to agile management
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!