1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
3 years ago
8

A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve

r has been repaired, however it is feared that DNS entries may remain in client computer caches. Which of the following tools can be used to flush the DNS cache on a Windows client?a. NET
b. PING
c. NSLOOKUP
d. IPCONFIG
Computers and Technology
1 answer:
sattari [20]3 years ago
3 0

Answer:

IPCONFIG Pls mark brainliest

Explanation:

You might be interested in
Both IT and organizational strategies are static and can be harmed when people resist change because IS success depends on the s
anzhelika [568]
Think it’s true idk
8 0
3 years ago
 Formulas within table cells always begin with
Delicious77 [7]
(D) I don't know about other spread sheet software, but in Microsoft Excel, a formula is always entered beginning with an 'equals' sign. ( = ).
4 0
3 years ago
Edhesive coding practice 3.4​
allsm [11]

I'm sorry i have to go to sleep.. Can we continue tm?

In the morning

8 0
4 years ago
Read 2 more answers
What saw do you use to cut wood in design and technology
tia_tia [17]
Your answer would be a coping saw!
Coping saws are most commonly used cutting woof in design and technology! :)

5 0
3 years ago
This type of software works with end users, application software, and computer hardware to handle the majority of technical deta
Lena [83]
System software will be the answer
3 0
4 years ago
Other questions:
  • Which of the following is not a feature of Hootsuite?
    14·1 answer
  • Directions: Using the decoder key and the code chart on the second page, find out the name that has been coded. After coding the
    15·1 answer
  • A new employee has reported that print jobs are printing as garbled text. Which of the following is MOST likely the reason for t
    8·1 answer
  • Which of the following in not part of the CIA triad that is one of the cornerstones of information security? a. Confidentiality
    14·1 answer
  • Which activity represents a violation of the licensing agreement?
    13·2 answers
  • A palindrome is a word or a phrase that is the same when read both forward and backward. Examples are: "bob," "sees," or "never
    7·1 answer
  • How to change your name to a fake one
    8·1 answer
  • Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?
    8·1 answer
  • What is the computer that is connected to a<br> server
    8·2 answers
  • if a manager identifies numerous data integrity issues, she/he should consider the reports generated from that data as invalid a
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!