1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stolb23 [73]
3 years ago
8

You have two DCs, each with three Active Directory-integrated zones. You're getting inconsistent DNS lookup results and suspect

a problem with Active Directory replication. What tool can you use to investigate the problem?
Computers and Technology
1 answer:
nikklg [1K]3 years ago
8 0

Since their or two domain controller and where their or three active directory is associates.

  • As first check the tcpip ranges to be checked if both falls on same tcpip address. Better to change the one from tcpip address.
  • Second is host and subdomain has to checked and reconfigure if necessary.
  • Computer name and connected their group to be checked.
  • With NSLOOKUP command from disk operation system come check ping tracking reply is positive or negative.

When we query for DNS, end user need to see the positive reply from list of servers. Possible for scanning the IPV6 address across the domains and find as positive or negative response. End user has to decide the primary and secondary domain controller’s

Normally secondary domain controller’s as to be configured as standard alone. On success on deciding primary and secondary domain controller’s automate the process from primary to secondary by configuration with ns records. Possible for domain partition also.

You might be interested in
Suppose you are an ad-serving company and you maintain a log of cookie data for ads you serve to the Web pages for a particular
Firlakuza [10]

Answer:

A

Explanation:

thethe more you have attached the more people are going to know your product so that it's going to be a long process which people can introduce to their friends

3 0
3 years ago
What is technology?
Anestetic [448]
D. the application of scientific discoveries 
5 0
3 years ago
The basic difference between RAM and ROM memory is: Question 5 options: A) RAM is nonvolatile while ROM is volatile. B) RAM is r
schepotkina [342]

The basic difference between RAM and ROM memory is RAM is read/write while ROM Is read-only.

Explanation:

  • A ROM, non-volatile memory, does not use to store data, but RAM is volatile and requires power to store data.
  • ROM is not given usually as a specification, but RAM is typically specified when buying a computer.
  • We can write data only once in ROM. However, once it is written, we can read it any number of times. RAM is the main memory in a computer, and read from and write to it much faster than other storage types. RAM is used to store files in use on the computer.

Hence the basic difference between RAM and ROM memory is RAM is read/write while ROM Is read-only.

6 0
3 years ago
6. The
nordsb [41]

In spermatocytogenesis, a diploid spermatogonium, which resides in the basal compartment of the seminiferous tubules, divides mitotically, producing two diploid intermediate cells called primary spermatocytes.

Fertilization takes place in the fallopian tubes, which connect the ovaries to the uterus. Fertilization happens when a sperm cell successfully meets an egg cell in the fallopian tube.

7 0
4 years ago
A type of security control that takes measures to help restore a system is referred to as:
vovikov84 [41]

Answer:

C.  corrective

Explanation:

Security controls

These are actions or measures taken to maintain and/ or restore the security of the system. Security controls are categorized as corrective, preventive and detective, which are discussed below.

Corrective

Security controls which help in taking the corrective steps after the malicious activity has done damage to the system or restoring the security of the system are called corrective security controls.

These controls also act as preventive measures for future risks.

These controls perform the healing and have remedial action for the damage done to the system.

Once the system has been recovered, appropriate measures are put in place to avoid further damage.

The damage can be done to the computer system, its hardware and software resources or the data.

Examples include restoring the database from the backup file.

Updating or renewing antivirus software rectifies the security against virus.

For example, once the database has been restored, access control, antivirus and other measures are employed to prevent the database from being corrupted and to prevent system from being affected.

Preventive

Security controls which help in stopping the malicious activity from harming the system are called preventive security controls.

As per the name, these measures are employed to prevent any security breach.

These measures prevent any suspicious activity from taking place which may cause harm to the system.

Firewalls prevent unauthorized access.

Antivirus prevents malicious applications from running.

Login feature to give access only to authorized user.

Detective

Security controls which help in detecting the malicious activities and alerting the security personnel are called detective security controls.

As per the name, these measures are used to identify any suspicious activity and report them. Detective controls do not prevent or correct any security breach.

Alarms are employed to detect and alert any suspicious activity.

Intrusion detection system (IDS).

In an ideal situation, security controls are a combination of all the types mentioned above.

4 0
3 years ago
Other questions:
  • Microsoft Paint can be described as a digital sketch pad ?
    8·1 answer
  • A(n) ____ tag is used to let the compiler know that your intention is to override a method in a parent class
    10·1 answer
  • The class shown below called is called CSVReader. Use this class exactly as it is written (specifically don’t add any instance v
    8·1 answer
  • What is an activity that can help you enhance the appearance of your computer's desktop?
    10·2 answers
  • ____________________ software is a type of security software designed to identify and neutralize web bugs, ad-serving cookies, a
    8·1 answer
  • Lab Assignment 7A For the lab this week, you will sort an array - using any of the sort methods discussed in Chapter 23 or the S
    6·1 answer
  • The activity, set of institutions, and processes for creating, capturing, communicating, delivering, and exchanging offerings th
    6·1 answer
  • Write down the functions of network layer in your own words.ASAP
    14·1 answer
  • Select the correct answer. Which symbol denotes markup tags? A. {} B. < >. C. ( ) OD. [] ​
    7·1 answer
  • Will give brainliest help asap
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!