1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Grace [21]
3 years ago
8

You have noticed that one of your DNS servers has possibly been compromised. You believe that a cached DNS entry for your domain

is being targeted by an attacker. What new feature in Windows Server 2016 could you use on your DNS server to help prevent a man-in-the-middle attack in which your cached DNS entry for your domain is altered by an attacker?
Computers and Technology
1 answer:
yKpoI14uk [10]3 years ago
5 0

Answer:

DNS-based Authentication of Named Entities .

Explanation:

While realizing how one of the DNS servers could have been affected. He thinks an intruder is targeting a stored DNS record for his domain.

So, the DNS-based Named Entities Authentication in Windows Server 2016 should be used on the user's DNS server to try to prevent a man-in-the-middle attempt from which an intruder changes his stored DNS record for the user's domain.

You might be interested in
Pls help........
Fantom [35]
Hey Jay!

The word "<span>netiquette" means the most acceptable way, or approving way of doing something.

So, by rephrasing this question in it most possible way would be the following: 

</span><span>Which acceptable practices should Stella follow?

I believe, and I hope this would be correct, but, seriously, the answer should be "</span><span>Stella should obtain permission from her friends before posting their photographs." You would want to make sure that what you are doing in is acceptable to your parents, so even before you do so, ask your parents.

Hope this helps you!</span>
8 0
3 years ago
Why are various creative works split up into different types under copyright law?
noname [10]

Answer:

I want brainliest plz!!!

Explanation:

There are two ways that derivative rights are protected under copyright law. First, the derivative work has protection under the copyright of the original work. Copyright protection for the owner of the original copyright extends to derivative works. ... Second, the derivative work itself has copyright protection.

6 0
3 years ago
​​most code division multiple access (cdma) networks conform to ____________ , created by the telecommunications industry associ
Lyrx [107]
The answer is <span>IS-95.  M</span><span>ost Code Division Multiple Access (CDMA) networks conform to IS-95, created by the Telecommunications Industry Association (TIA).  I</span><span>nterim Standard </span>95<span> (</span>IS-95<span>) was the first ever CDMA-based digital cellular technology, developed by Qualcomm and later adopted as a standard by the Telecommunications Industry Association (TIA).</span>
3 0
3 years ago
Programmers use a(n) ____ when they need the computer to repeatedly process one or more program instructions until some conditio
Arlecino [84]

Answer:

Loop

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

Programmers use a(n) <u>loop</u> when they need the computer to repeatedly process one or more program instructions until some condition is met, at which time the <u>loop</u> ends.

<u><em>Loops</em></u> repeat a certain set of instructions until a certain condition is acuired and then exit out of the loop. There are a couple of different types of loops such as For Loop, While Loop, and Do-While loop. Each repeats a set of instructions but for a different set of times.

<u><em>For Loops</em></u> repeat for a fixed amount of Times or until the condition is met and it breaks out of the loop. Meanwhile,  <em><u>While</u></em> and <em><u>Do-While</u></em> loops keep repeating until the condition is me, but the Do-While checks the condition at the end of the loop.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
The mouse and keyboard are also sometimes called
likoan [24]
Hi!

The mouse and the keyboard are <em>input devices. </em>By using them, we can input data which will give us a (hopefully) desired output!

For example...

Just by using my keyboard to type, I'm inputting data in the form of ASCII characters and symbols.

By using my mouse to click on an area so I can move this sentence on a new line, I had to input a request to do such!

Hopefully, this helps! =)
7 0
4 years ago
Other questions:
  • A. True <br> b. False: variables represent storage locations in the computer's memory.
    13·1 answer
  • An ARP broadcast is sent to the special MAC address _______.
    9·1 answer
  • Clarisse is setting the white spaces at the edge of her Word document to be 1 inch. She is setting the _____.
    7·1 answer
  • Part cost Calculator Modify the GUI in your program to look like the following GUI. To do that you need to add the following to
    13·1 answer
  • Cell A1 contains the formula "=10+D2". If you copied A1 to B3, what would be the formula in B3?
    10·2 answers
  • Write two statements to get input values into birthMonth and birthYear. Then write a statement to output the month, a slash, and
    5·1 answer
  • How to can you avoid becoming a victim of identity theft?
    10·1 answer
  • How are hyperlinks created and used within a presentation? Check all that apply. Hyperlinks are set to open another source file.
    7·2 answers
  • The _____ of a story describes the time and location of a story.
    5·2 answers
  • How to make classs constructer java.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!