1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mekhanik [1.2K]
3 years ago
6

1) Explain stateful autoconfiguration and which Windows Server 2016 role enables use of this technology on a network.

Computers and Technology
2 answers:
svp [43]3 years ago
4 0

Answer: Stateful autoconfiguration is an ipv6 address assignment in which the configuration server assign a unique address to device as they need them drawing from a collection of such address. It is the ipv6 equivalent of DHCP. It is a new protocol called DHCPv6 which is somehow closed to DHCP, used to pass out addressing and service information in the same way the DHCP is used in IPV4. It is called Stateful because the DHCP server and clients must both maintenance state information to keep address from conflicts. It also handle leases and renew address overtime. This process add flexibility to automatic configuration.

The DHCP server role is used on window server 2016 to accommodate Stateful autoconfiguration.

2. It eliminates the needs to have DNS replication

b. It is used to enable fast DNS queries.

3. Configure the HTTPS response headers function to expire specific document.

4. 24hrs.

5. DNS lookup zone records are not set up to date automatically and your colleague has not created records manually.

b. There is no WIN-R zone.

6. All are applicable.

7.Server manager plus, and network binder.

8. All applicable.

algol [13]3 years ago
3 0

"Stateful autoconfiguration is an ipv6 address assignment in which the configuration server assign a unique address to device as they need them drawing from a collection of such address. It is the ipv6 equivalent of DHCP. It is a new protocol called DHCPv6 which is somehow closed to DHCP, used to pass out addressing and service information in the same way the DHCP is used in IPV4. It is called Stateful because the DHCP server and clients must both maintenance state information to keep address from conflicts. It also handle leases and renew address overtime. This process add flexibility to automatic configuration.

The DHCP server role is used on window server 2016 to accommodate Stateful autoconfiguration.

2. It eliminates the needs to have DNS replication

b. It is used to enable fast DNS queries.

3. Configure the HTTPS response headers function to expire specific document.

4. 24hrs.

5. DNS lookup zone records are not set up to date automatically and your colleague has not created records manually.

b. There is no WIN-R zone.

6. All are applicable.

7.Server manager plus, and network binder.

8. All applicable."

You might be interested in
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
A(n) ____ is a front-end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large compu
Taya2010 [7]
I think it'd be terminal concentrator.  A(n) terminal concentrator is a front - end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large computer. 
7 0
3 years ago
Which design element is used to convey smoothness or roughness in a design
iris [78.8K]

Keyboard would be the correct answer

5 0
3 years ago
Technologies that function within the established system are called
vesna_86 [32]
<span>Authorizing technologies are technologies that controls the use of system and network resources through authentication and authorization. 
</span><span>Enabling technologies are innovation technologies that drive radical change in the capabilities of a user or culture.
</span>Obstructing technologies include blocking<span> and filtering, content manipulation, attacks.
</span>Preemption means "prior seizure of" and preemptive technologies <span>take control of the operating system from one task and giving </span>it<span> to another task.
</span><span>Technologies that function within the established system are called enabling technologies.</span>
8 0
2 years ago
Hi can someone help me make a like a song for music Class pls I attached an example of what i need.
g100num [7]

Answer:

i dont really like music so sorry i cant help i hope someone can help you with this.

8 0
3 years ago
Other questions:
  • What may happen if a large number of computer users are attempting to access a web site at the same time that you are
    9·2 answers
  • A_____refers to the entire Excel file
    14·1 answer
  • . String literals are surrounded by _____ quotes
    14·1 answer
  • OSHA's mission is to: A. Ensure that all workers receive adequate workers' compensation payments B. Esnure that all workers rece
    8·2 answers
  • Which of the following statements is true?
    8·1 answer
  • 3.24 LAB: Seasons
    13·1 answer
  • In general, smartphones do NOT hold as much personal information as tablets.
    11·1 answer
  • Jeremy is working with a team that is creating an application using attributes and associated methods. What type of programming
    8·1 answer
  • Does nature behave the exact same way as fractals?
    15·1 answer
  • A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!