1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
soldi70 [24.7K]
3 years ago
8

You want to verify whether a PTR record exists for the Serv2.csmpub.local host, but you don't know the IP address. Which of the

following commands should you use?
a. ping -a Serv2.csmpub.local and then ping IPAddress returned from the first ping
b. nslookup Serv2.csmpub.local and then nslookup IPAddress returned from the first nslookup
c. dnscmd /PTR Serv2.csmpub.local
d. netsh /PTR Serv2.csmpub.local
Computers and Technology
1 answer:
Zielflug [23.3K]3 years ago
7 0

Answer:

b. nslookup Serv2.csmpub.local and then nslookup IPAddress returned from the first nslookup.

Explanation:

That's the best command to use when one wants to verify whether PTR record exists for a Serv2.csmpub.local host

You might be interested in
Explain why testing can only detect the presence of errors, not their absence.
Alchen [17]

Explanation: Testing is a set of activities that aim to detect software anomalies in a way that the errors can be discovered and correctes. The goal of software testing is to observe if the software behavior meet the requirements that they are expected to meet. Testing demonstrates to the developer that the software fullfils its requirements and it is a way to find out if it behaves in a incorrect, undesirable ou different form from the specifications.

6 0
3 years ago
In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the
allochka39001 [22]

Answer: Routing table

Explanation:

  Routing table is basically used to store the network route information in the form of data file in the random access memory (RAM). It mainly store information about the various types of connection and the remote network.

The routing table contain two columns and the first column is basically used for listing the every networking device and the computer system.

On the other hand, the second column s basically used to list about the destination device in which the computer wants to send a message. The main function of the router is to forward the packet to its actual destination by using the routing table.

4 0
3 years ago
Jim wants to buy a car, but he’ll probably only need it for a couple of years. He has a short commute to work, so he won’t be pu
aalyn [17]
The best is bus or walking
4 0
3 years ago
Hanging out with friends, watching your favorite TV show, and buying a pair of new shoes are all examples of _____ for doing wel
SpyIntel [72]
<span>Hanging out with friends, watching your favorite TV show, and buying a pair of new shoes are all examples of rewards for doing well in school. As the result of doing well in studies, a person can hang out with friends, watch their own favorite TV show and can buy a new pair of shoes. Hence all these things are the rewards that are being generated for a good performance in school.</span>
8 0
3 years ago
Read 2 more answers
What’s a sign you should talk to an adult about your online time
vesna_86 [32]

Answer:

If your are getting bullied or getting depressed about something in the internet, you should talk with a adult.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Jose calls you at the help desk because he is having a problem logging on to his laptop computer. After several unsuccessful att
    14·1 answer
  • How many rows and columns does ms-excel 2007 have???
    10·1 answer
  • Music voice and sound effects can all be recorded and stored on a computer as
    15·1 answer
  • .<br> 1. Press the _______ key to move to the next cell in a row.
    14·2 answers
  • Tools, documents, language and processes—these are examples of boundary objects. Which of the following is the best definition o
    11·1 answer
  • How do you copy and paste plz let me know
    14·2 answers
  • The type of medium used to hide data in steganography is referred to as __________. This may be a photo, video, sound file, or V
    12·2 answers
  • What is adobe photoshop?
    10·2 answers
  • Name any three areas of of application of excel.
    12·1 answer
  • Which of the following is an example of group dynamics?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!