1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana [24]
3 years ago
12

A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve

r has been repaired, however it is feared that DNS entries may remain in client computer caches. Which of the following tools can be used to flush the DNS cache on a Windows client?
a. NET
b. PING
c. NSLOOKUP
d. IPCONFIG
Computers and Technology
1 answer:
mario62 [17]3 years ago
3 0

Answer: (D) IPCONFIG

Explanation:

The IPCONFIG is the type of tool that can be use to flush or refresh the dynamic host configuration (DNS) cache on the window client. The IPCONFIG display various types of parameters such as subnet mask, IP address and the default gateway.

 In the computing, the IPCONFIG is stand for the internet protocol configuration and it is one of the operating system applications which basically display all Transmission control protocol/ Internet protocol (TCP/IP) network configurations.

Therefore,Option (D) is correct.

 

You might be interested in
You can find synonyms and disciplinary jargon in the ______, _______, and ______ in your search results. You can then use these
Slav-nsk [51]

Answer:

1. Title

2. Abstract

3. Subject Headings

Explanation:

To carry out a project or research survey, a researcher needs an appropriate title that satisfies the technical keywords relating to the content and expected outcome of the research.

Hence, in this case, to find an appropriate title for a research survey "You can find synonyms and disciplinary jargon in the TITLE, ABSTRACT, and SUBJECT HEADINGS in your search results. you can then use these as keywords in additional searches."

7 0
3 years ago
What is causing the electricity prices to increase in South Africa?​
Pepsi [2]
The law of demand says that the higher the price of a good is, the less people will demand it. But South Africa , sales of electricity have been dropping, yet the utility wants consumers to even pay more for its good. The national utility, South Africa wants consumers to pay more for electricity.
4 0
3 years ago
On a digital clock the displayed time changes constantly (True or False)
Vlada [557]
The answer is true as it will change on its own
8 0
3 years ago
Today when Dylan turned on his computer, he noticed that the monitor was very dim. He could still see the desktop icon and text.
Vadim26 [7]

Answer:

B. Monitor backlighting

Explanation:

The computer system is a machine that can digitally receive input, process the inputted data and display and save results. The computer system is a physical system driven by a software component.

The computer hardware components are classified as input unit or devices, output unit, memory and storage unit, and  processing unit. The screen is an output unit of the computer system, it displays the output or result of the processed data.

The power supply to the screen, in this context, is not faulty due to the other screen used in testing the supply and input connectors. The back light on the screen has failed and that is why the brightness can not be adjusted.

3 0
3 years ago
Choose the answer. Janice's IT department found that her computer had a program on it that was collecting her personal informati
harkovskaia [24]

Answer:

Spyware

Spam is just unwanted soliciation, spoofing is making links appear as something else, pharming is creating a fake website for victims to use.

7 0
2 years ago
Other questions:
  • Which of the following statements is NOT true about a mainframe computer?
    14·1 answer
  • Identify the four basic categories of hardware in a microcomputer system. system unit, modem, ram, and microprocessor system uni
    5·1 answer
  • True / False
    5·1 answer
  • Describe the following types of data hazards. RAW WAR WAW
    13·1 answer
  • Consider the following partial class definitions: public class A1 { public int x; private int y; protected int z; ... } public c
    12·1 answer
  • For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the f
    9·1 answer
  • You are given a 5-letter word (for example, abcde). Write a C-Program which outputs all possible unique 5 letter permutations of
    13·1 answer
  • Please tell fast plzzzzzzz​
    11·1 answer
  • 5. Compare the telephone network and the internet. What are the similarities? What are the differences?
    12·1 answer
  • Jackie created a poster for a rock band. Which file format will best preserve the graphics? 20PTS​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!