1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
8

You have noticed that one of your DNS servers has possibly been compromised. You believe that a cached DNS entry for your domain

is being targeted by an attacker. What new feature in Windows Server 2016 could you use on your DNS server to help prevent a man-in-the-middle attack in which your cached DNS entry for your domain is altered by an attacker?
Computers and Technology
1 answer:
yKpoI14uk [10]3 years ago
5 0

Answer:

DNS-based Authentication of Named Entities .

Explanation:

While realizing how one of the DNS servers could have been affected. He thinks an intruder is targeting a stored DNS record for his domain.

So, the DNS-based Named Entities Authentication in Windows Server 2016 should be used on the user's DNS server to try to prevent a man-in-the-middle attempt from which an intruder changes his stored DNS record for the user's domain.

You might be interested in
You are a domain administrator for a large domain. Recently, you have been asked to make changes to some of the permissions rela
Lisa [10]

Explanation:

Since the Austin OU (organization unit) is a descendant of the Texas OU, it naturally inherits the permissions from its parent/ancestors.

Any restriction (permissions removed) from the Texas OU will be inherited onto the Austin OU.  This is exactly the intended purpose of organizing groups in OU's because all changes will automatically inherited within the OU without having to work down the tree.

This can be confirmed by checking with other cities to see if they too have the same restriction.

The proper way the request should have been done is to apply the changes to the most specific unit possible, be that OU's, groups, etc.

7 0
2 years ago
Each device attached to your computer comes with a special program called a(n ________ that enables the device and operating sys
Serhud [2]
Driver- comes with a driver installed.
7 0
3 years ago
What is a break in the content that forces takes on to the next line
Dovator [93]

I DONT KNOW AT All what so ever


7 0
3 years ago
Read 2 more answers
I would A lot of knowledge and education for computers and <br> Technology
borishaifa [10]

Answer:

Pay attention in your class.

Explanation:

If you paid attention in your class, you would have at least a basic understanding of the material.

7 0
2 years ago
Read 2 more answers
What connections do you see between variables and what you learned about the Input-Output-Store-Process model of a computer?
vladimir1956 [14]

Answer:

h

Explanation:

4 0
2 years ago
Other questions:
  • What is the type of account and normal balance of allowance for uncollectible accounts?
    13·2 answers
  • 13. You're expecting an important call from Mr. Suarez, a potential customer. While waiting for this call, your supervisor calls
    15·1 answer
  • Which buttons should you use to publish and change a message on a message board
    6·2 answers
  • How can an administrator make only the files and folders to which a user has at least Read permissions visible?
    13·1 answer
  • An organization is trying to decide which type of access control is most appropriate for the network. The current access control
    12·1 answer
  • What is the computer that is similar to a destop but smaller in size
    8·1 answer
  • Thank you very much for your email. ...... was very interesting​
    15·1 answer
  • Which of the following component is required to insert text in multimedia
    8·1 answer
  • Microsoft Access is a
    10·1 answer
  • A word or phrase to help identify a file when you do not know the file name during the file expiration search
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!