1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
PIT_PIT [208]
2 years ago
10

In order to look up ipv4 and ipv6 dhcp leases, what two files should be viewed?​

Computers and Technology
1 answer:
Zigmanuir [339]2 years ago
7 0
The answers are  /var/lib/dhcpd/dhcpd.leases   &                                                                       /var/lib/dhcpd/dhcpd6.leases
In order to look up ipv4 and ipv6 dhcp leases, The two files that should be viewed are  /var/lib/dhcpd/dhcpd.leases &  /var/lib/dhcpd/dhcpd6.leases                                             
You might be interested in
A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action shoul
sergij07 [2.7K]

An action which this organization should take to find out if systems have been compromised is: C. Look for unauthorized accounts.

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities and compromises in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails a tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the computer system.

In this scenario, we can reasonably infer and logically deduce that an action which this organization or cybersecurity specialist should take to find out if systems have been compromised is to look out for unauthorized accounts.

Read more on penetration test here: brainly.com/question/25813524

#SPJ1

Complete Question:

A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?

Look for policy changes in Event Viewer.

Scan the systems for viruses.

Look for unauthorized accounts.

Look for usernames that do not have passwords.

7 0
9 months ago
A document repository is down when you attempt to access it. which isa principle is being violated?
Tju [1.3M]
When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. <span>The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.</span>
3 0
2 years ago
You must establish credit in order to buy a house true or false
iren2701 [21]

verry true, unless ou dont need a loan, if you have cash then the answer is false

8 0
3 years ago
________ are devices in a computer that are in either the on or off state
Vanyuwa [196]
The appropriate response is Electrical Switches. These are electromechanical gadgets that are utilized as a part of electrical circuits to control, recognize when frameworks are outside their working reaches, flag controllers of the whereabouts of machine individuals and work pieces, give a way to manual control of machine and process capacities, control lighting, et cetera.
6 0
3 years ago
For two integers m and n, their GCD(Greatest Common Divisor) can be computed by a recursive function. Write a recursive method g
konstantin123 [22]

Answer:

In Python:

def gcd(m,n):

if n == 0:

 return m

elif m == 0:

    return n

else:

 return gcd(n,m%n)

Explanation:

This defines the function

def gcd(m,n):

If n is 0, return m

<em> if n == 0: </em>

<em>  return m </em>

If m is 0, return n

<em> elif m == 0: </em>

<em>     return n </em>

If otherwise, calculate the gcd recursively

<em> else: </em>

<em>  return gcd(n,m%n)</em>

<em />

<em>To call the function to calculate the gcd of say 15 and 5 from main, use:</em>

<em>gcd(15,5)</em>

6 0
3 years ago
Other questions:
  • Consider the following class definitions. public class BClass { private int x; public void set(int a) { x = a; } public void pri
    11·1 answer
  • The computer stores a program while the program is running, as well as the data thatthe program is working with, in _____.
    10·1 answer
  • Which of the following types of computers is typically used by governments and hospitals and can support hundreds of users?
    6·2 answers
  • What is the missing line of code?
    7·1 answer
  • Convert the decimal number 164 into the equivalent 8 bit binary number. ​
    11·1 answer
  • HELP FAST
    14·1 answer
  • How do I go to files in Brainly I need help
    13·1 answer
  • A ____ is a share of ownership in a company
    11·2 answers
  • How many 60 KB jpeg files can be stored on a 2 MB folder in your hard drive?​
    7·1 answer
  • Explain with examples what is software​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!