1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
8

You have noticed that one of your DNS servers has possibly been compromised. You believe that a cached DNS entry for your domain

is being targeted by an attacker. What new feature in Windows Server 2016 could you use on your DNS server to help prevent a man-in-the-middle attack in which your cached DNS entry for your domain is altered by an attacker?
Computers and Technology
1 answer:
yKpoI14uk [10]3 years ago
5 0

Answer:

DNS-based Authentication of Named Entities .

Explanation:

While realizing how one of the DNS servers could have been affected. He thinks an intruder is targeting a stored DNS record for his domain.

So, the DNS-based Named Entities Authentication in Windows Server 2016 should be used on the user's DNS server to try to prevent a man-in-the-middle attempt from which an intruder changes his stored DNS record for the user's domain.

You might be interested in
What is the advantage of learning through story compared to learning through personal experience?
Inessa [10]

Answer:

Personal Experience

Explanation:

If a story is based on a personal experience then yes, the two doesn't matter. <em>However</em>, usually learning through personal experience is better because you learn firsthand while stories are written from a different perspective.

6 0
3 years ago
Read 2 more answers
____ is a linux-based operating system developed by the open handset alliance.
Misha Larkins [42]
The answer is Android
6 0
3 years ago
Write a program that grades arithmetic quizzes as follows: Ask the user how many questions are in the quiz. Ask the user to ente
kirill115 [55]

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

int main(){

   int questions, answer;

   cout<<"Questions: ";

   cin>>questions;

   int answerkey[questions];

   cout<<"Enter answer keys: ";

   for(int i = 0; i< questions; i++){

       cin>>answerkey[i];    }

   int correct = 0;

   cout<<"Enter answers: ";

   for(int i = 0; i< questions; i++){

       cin>>answer;

       if(answer == answerkey[i]){

           correct++;        }    }

   cout<<"Correct answers: "<<correct<<endl;

   cout<<"Percentage correct : "<<(100 * correct)/questions<<"%";

   return 0;

}

Explanation:

This declares the number of questions and the answers submitted to each equation

   int questions, answer;

Prompt to get the number of questions

   cout<<"Questions: ";

This gets input for the number of questions

   cin>>questions;

This declares the answerkey as an array

   int answerkey[questions];

Prompt to get the answer key

   cout<<"Enter answer keys: ";

This iteration gets the answer key for each question

<em>    for(int i = 0; i< questions; i++){</em>

<em>        cin>>answerkey[i];    }</em>

This initializes the number of correct answers to 0

   int correct = 0;

Prompt to get the enter the answers

   cout<<"Enter answers: ";

This iterates through the answer keys

   for(int i = 0; i< questions; i++){

This gets the answer to each question

       cin>>answer;

This compares the answer to the answer key of the question

       if(answer == answerkey[i]){

If they are the same, correct is incremented by 1

           correct++;        }    }

Print the number of correct answers

   cout<<"Correct answers: "<<correct<<endl;

Print the percentage of correct answers

   cout<<"Percentage correct : "<<(100 * correct)/questions<<"%";

7 0
3 years ago
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
What is the different between the simple statement and compound statement ?​
OverLord2011 [107]

Answer:

Following is the difference between Simple and Compound statement; Simple statement (sentence) is one which has only one subject and one predicate. A Compound statement (sentence) is one which has two or more independent clauses consisting of their own subject and predicate.

Explanation:

hope it helps you

Mark as brainliest.

And follow for a follow back

4 0
3 years ago
Other questions:
  • (Drag each tile to the correct box)While surfing online, Patricia first checks her email and reads the latest messages. She then
    8·1 answer
  • Advances in television broadcasting have created changes in millions of U.S. families in a. ​sleep habits. b. ​conversation patt
    5·1 answer
  • Describe how using active listening at work can help you be a better employee.
    15·1 answer
  • Compare and contrast the following network types: Personal Area Network (PAN) Local Area Network (LAN) Metropolitan Area Network
    14·1 answer
  • Rate is how fast a screen updates the information being displayed.
    6·2 answers
  • Mobile devices need to work within limited screen space ? true or false
    9·2 answers
  • Consider the problem of solving two 8-puzzles.
    10·1 answer
  • If Anyone can help me out that'll be great
    11·1 answer
  • Plzz help me with this question.........
    6·1 answer
  • Enzo is writing a paper about the similarities and differences between ancient Rome and modern America. Which text structure is
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!