1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
9

You want to configure two DHCP servers; one is running Windows Server 2012 R2, and the other is running Windows Server 2016. One

will be the primary server, and the other should assign addresses to clients only if the primary server doesn't respond within about a second. You don't want replication to be part of the configuration. What should you configure
Computers and Technology
1 answer:
Tom [10]3 years ago
8 0

Answer:

Relay agent

DHCP failover

Split scope

Multicast scope

Explanation:

You might be interested in
If someone you don’t know asks where you go to school, what should you do
My name is Ann [436]

Answer:

Don't answer him because you don't know what he is going to do

8 0
3 years ago
What e-mail protocol does Marina and Rita’s Cupcakes use and why is it important?
Taya2010 [7]

Marina and Rita’s Cupcakes use the IMAP email protocol. It is important since it stores copies of all the emails stored on the server.

 

To add, IMAP<span> (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages,</span>

8 0
4 years ago
One form of Intrusion Detection System (IDS) starts operation by generating an alert for every action. Over time, the administra
soldier1979 [14.2K]

Answer:

advantages

- detect anomalies

- information for new security rules

disadvantages

- false alarms

Explanation:

Advantages

- With an IDS we can check and track every attack or detect anomalies even when you don't know about these behaviors.

- When an IDS detects anomalies, the system generates information about these behaviors and you can create new rules for these attacks.

Disadvantages

- When we use an IDS, we could receive false alarms because we cannot predict every behavior.

4 0
4 years ago
I want to do is speed test to do i go to for my computer
laiz [17]

I just go to the speed test on my browser

7 0
3 years ago
What is the amount of money you still owe to their credit card company called?
Colt1911 [192]
It mean that you are in dept

6 0
4 years ago
Read 2 more answers
Other questions:
  • Consider the following code snippet.a.File inputFile = new File("dataIn.txt");b.Scanner in = new Scanner(inputFile);c.while (in.
    7·1 answer
  • Write a short program using a while loop which will display all of the even numbers starting with 12 and ending with 86. (test y
    10·1 answer
  • Which of the following terms is computed as cash provided by operations less capital expenditures and cash dividends? A : adjust
    5·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • C programming: loading a dictionary into a trie data structure. Why am I segfaulting?
    8·1 answer
  • The rules of right-of-way<br> Pedestrians, bicyclists, and skateboarders<br> when they use the road.
    12·1 answer
  • Plz answer me will mark as brainliest​
    13·1 answer
  • Write function that ask for input from a user. Use this input as input for the countdown function that we wrote using the while
    6·1 answer
  • WILL GIVE A BRAINLIEST!!! PLS HELP!!!
    5·1 answer
  • I just tested how resistant my skin is with a multimeter and I stuck the probe tips pretty hard into my left and right hand. The
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!