1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
UkoKoshka [18]
3 years ago
11

You are troubleshooting a dns issue on a linux system, and need to test the resolution of your domain mycompany.com mx record us

ing google's dns server with the ip address of 8.8.8.8. what dig command will accomplish this?
Computers and Technology
2 answers:
nekit [7.7K]3 years ago
7 0

Answer:

nslookup

Explanation:

Step 1: Open a DOS command window. To do this click Start, click Run, type cmd and press enter.

Step 2: in command prompt type "nslookup mycompany.com 8.8.8.8".

Step 3: Interpret output from nslookup. Output will be something like:

Server:  XYZ

Address: 8.8.8.8

Name: mycompany.com

Address: 8.8.8.8

Ipatiy [6.2K]3 years ago
4 0

Answer:

nsLookup mycompany.com

Explanation:

Start a DOS command window. To do that, click Start, click Run, type cmd, and later press Enter.At the command prompt, copy the following command. Substitute example.com with the domain that you need to examine:

"nsLookup mycompany.com"

You might be interested in
When would a one way flag variable be used
Tamiku [17]
A one-way flag<span> can also be </span>used<span>, for example, to watch errors occuring in input data so that the program </span>could<span> ask the inputs again. A </span>variable<span> is a temporary if its value is always needed only for a very short period.</span>
7 0
3 years ago
Why is it important to send a cover letter with a resume?
Novay_Z [31]
It's important to do so because you want to be sure it looks professional, just like it's important to add a cover to a report. It's also the first look at the resume and gives the overall look of it. It lets the job or employer know the specifics and into the resume talk more of what you do. It's like the overall information page..... Hope this helps. 
5 0
3 years ago
Read 2 more answers
Which technology will a business use to identify unauthorized access to intranet sites or files by its employees?
monitta

Answer:

Computer Forensics

Explanation:

Your Welcome....

8 0
3 years ago
The listing of a directory shows certain files with permissions set to rwsr-xr-x. what does this indicate?
marta [7]
<span>"rws" means that the user has permissions to read, write and setuid. "r" means the user can read the file and "w" means that the user can write to the file. "s" stands for "setuid" (set user id) is a permission bit that allows the users to execute a program with the permissions of its owner. The "s" can also mean "setgid" (set group id) is a bit that allows the user to execute a program with the permissions of the group owner.</span>
5 0
4 years ago
Help me right now!!!!!!!!!!!!!!!!!!!!!!!!11
PilotLPTM [1.2K]
Word-processing software includes basic applications designed for casual business or home users and powerful, advanced applications capable of meeting the most-demanding needs of businesses. Many word-processing applications are designed for use as part of a suite or integrated group of word-processing, spreadsheet, and presentation programs
4 0
3 years ago
Other questions:
  • 1. Create a view named customer_addresses that shows the shipping and billing addresses for each customer.
    15·1 answer
  • What type of link is used to call this file
    11·1 answer
  • The IP address 129.53.82.20 falls under what class of IP addresses??
    5·2 answers
  • What udp port is used for i k e traffic from vpn client to server?
    14·1 answer
  • If you want a user to enter exactly 20 values, which loop would be the best to use?
    9·1 answer
  • Describe the differences between program development and program execution, including the installed software required for develo
    5·1 answer
  • Is the following statement TRUE or FALSE?
    9·1 answer
  • Search engines use indexes created by web _________ to provide fast searches.
    7·1 answer
  • You will implement three different types of FFs with two different reset types. You have to show your results on your FPGA. You
    9·1 answer
  • What is the range for copper tape
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!