1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
8

You have noticed that one of your DNS servers has possibly been compromised. You believe that a cached DNS entry for your domain

is being targeted by an attacker. What new feature in Windows Server 2016 could you use on your DNS server to help prevent a man-in-the-middle attack in which your cached DNS entry for your domain is altered by an attacker?
Computers and Technology
1 answer:
yKpoI14uk [10]3 years ago
5 0

Answer:

DNS-based Authentication of Named Entities .

Explanation:

While realizing how one of the DNS servers could have been affected. He thinks an intruder is targeting a stored DNS record for his domain.

So, the DNS-based Named Entities Authentication in Windows Server 2016 should be used on the user's DNS server to try to prevent a man-in-the-middle attempt from which an intruder changes his stored DNS record for the user's domain.

You might be interested in
Digital cameras are less susceptible to UV light.Select one of the options below as your answer:A. TrueB. False
horrorfan [7]
<span>Digital cameras are less susceptible to UV light. TRUE. In fact, there is an existing photography called Ultraviolet Photography. It is a process of photography that records images by using the light from the ultraviolet spectrum. There are two possible ways to use UV in taking photographs: via reflected UV and UV induced fluorescence.</span>
4 0
3 years ago
Read 2 more answers
The following pseudocode is an example of ____.do stepAdo stepBif conditionC is true thendo stepDelsedo stepEendifwhile conditio
rewona [7]

Answer:

Option d pretest

Explanation:

Given the pseudocode:

  1. do stepA
  2. do stepB
  3. if conditionC is true
  4. then do stepD
  5. else
  6. do stepE
  7. end if
  8. while conditionF is true
  9. do stepG
  10. end while

The pseudocode above shows that there is a pretest before some codes are executed. For example, line 3 check if condition is true then only execute stepD otherwise execute stepE. Line 8 check if conditionF is true then repeatedly execute stepG. These are examples of pretest a condition will must be met (pretest passed) before a block of codes can be executed. This pretest can be seen in if-else statements and also the while condition.  

6 0
3 years ago
The function known as "Comments" can be displayed during a presentation<br>O True<br>False​
Sonja [21]

Answer:

false

Explanation:

Select the comment icon. on the slide. The Comments pane will open and you can see comments for that slide.

Select Reply to respond to a comment.

Select the Next or Back buttons to go between comments and slides.

3 0
3 years ago
Read 2 more answers
Which of the following is the largest unit of information?
Mila [183]
What are the choices?

5 0
3 years ago
Read 2 more answers
Jacob is a teacher and wants to sort his grades based on Test 1 and then on Test 2.
Pachacha [2.7K]
<span>He would click on the Test 1 column and press Sort, then click on the Test 2 column and press Sort. 
 It depends on what you learn because it says "shift"</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • Write a Java program to print the result in the series 10, 15, 20, 25, ..., 50. Hint: You can use an iteration statement for wri
    9·1 answer
  • Wireless attacks avoid the access points to limit detection. <br> a. True <br> b. False
    9·1 answer
  • How important is the mail merge feature of microsoft word in different organization.?
    8·2 answers
  • Cynthia realized that she used a wrong term throughout her paper. Which option can help her quickly correct her mistake?
    5·1 answer
  • Fill in the blank: _________ is Google’s machine-learning artificial intelligence system that interprets people’s searches to fi
    9·1 answer
  • Activity
    7·1 answer
  • How do you resolve conflicts in your life??
    11·1 answer
  • What are examples of templates the Input Mask Wizard offers? Check all that apply.
    12·2 answers
  • Which are ways that technology keeps you hooked?
    6·1 answer
  • question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!