1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reptile [31]
3 years ago
15

Users are reporting Internet connectivity issues. The network administrator wants to determine if the issues are internal to the

company network or if there is an issue with the ISP. Which of the following tools should be used to BEST determine where the outage is occurring?
traceroute
ping
nslookup
netstat
Computers and Technology
1 answer:
Anika [276]3 years ago
8 0

Answer:

traceroute.

Explanation:

Traceroute these are the computer networking commands and they are used to determine the path or route that data packets take on the network with the delays that are associated with it.So according to me traceroute is the best tool to determine the issues or outrages are in the internet connectivity.

You might be interested in
a company is using aws fargate to run a batch job whenever an object is uploaded to an amazon s3 bucket. the minimum ecs task co
wlad13 [49]

The suitable option to implement with the LEAST amount of effort is

  • Set up a CloudWatch Event rule to detect S3 object PUT operations and set the target to the ECS cluster with the increased number of tasks. Create another rule to detect S3 DELETE operations and set the target to the ECS Cluster with 1 as the Task count.

<h3>What are Amazon S3 buckets?</h3>

A bucket is know to be a kind of a cup or a container that is known to be made for objects saved in Amazon S3.

Note that based on the above firm's work, The suitable option to implement with the LEAST amount of effort is

  • Set up a CloudWatch Event rule to detect S3 object PUT operations and set the target to the ECS cluster with the increased number of tasks. Create another rule to detect S3 DELETE operations and set the target to the ECS Cluster with 1 as the Task count.

Learn more about amazon s3 bucket from

brainly.com/question/28085364

#SPJ1

See question below

An application is hosted in an AWS Fargate cluster that runs a batch job whenever an object is loaded on an Amazon S3 bucket. The minimum number of ECS Tasks is initially set to 1 to save on costs, and it will only increase the task count based on the new objects uploaded on the S3 bucket. Once processing is done, the bucket becomes empty and the ECS Task count should be back to 1.

Which is the most suitable option to implement with the LEAST amount of effort?

Set up a CloudWatch Event rule to detect S3 object PUT operations and set the target to a Lambda function that will run Amazon ECS API command to increase the number of tasks on ECS. Create another rule to detect S3 DELETE operations and run the Lambda function to reduce the number of ECS tasks.

Set up a CloudWatch Event rule to detect S3 object PUT operations and set the target to the ECS cluster with the increased number of tasks. Create another rule to detect S3 DELETE operations and set the target to the ECS Cluster with 1 as the Task count.

Set up an alarm in CloudWatch to monitor CloudTrail since the S3 object-level operations are recorded on CloudTrail. Create two Lambda functions for increasing/decreasing the ECS task count. Set these as respective targets for the CloudWatch Alarm depending on the S3 event.

Set up an alarm in CloudWatch to monitor CloudTrail since this S3 object-level operations are recorded on CloudTrail. Set two alarm actions to update ECS task count to scale-out/scale-in depending on the S3 event.

3 0
1 year ago
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will
lozanna [386]

Answer:

C. Accept the risk

Explanation:

The first option is close but might not be suitable for a small company considering it's cost.

The second option which is to spend fifty thousand dollars per year on a data loss prevention solution is projected to cost you more than the risk.

The third option isn't specific and lacks a course of action.

6 0
3 years ago
• Use variable to create the number 0 at location 0, 400.
pashok25 [27]

Answer: i thinks its

Explanation:

$('button')

 .html('Click me') // Try edit it...

 .on('click', () => console.log(''))

.on('click', () => console.log(''))

.on('click', () => console.log(''))

console.log('App started')

8 0
2 years ago
If Mary makes homemade jams that she sells to her local grocer, she is practicing:
DIA [1.3K]

Answer: c) C2B (Consumer to business)

Explanation: Consumer to business (C2B) is the business technique in which the consumer or customer generates the good or service and then businesses are offered to take that product or service. The case mentioned in the question is also similar where May sells the jams made by her to the local grocer who has his business.

Other options are incorrect because Business to business (B2B) is where two business party trade with each other, Business to consumer (B2C) is business offer the product or service to consumer and Costumer to costumer(C2C) is the private trading of service between two individual parties. Thus,the correct option is option(c).

8 0
3 years ago
How is a Creative Commons license different from a regular copyright?
gayaneshka [121]

Answer:

Creative Commons is actually a license that is applied to a work that is protected by copyright. It's not separate from copyright, but instead is a way of easily sharing copyrighted work. ... Copyright confers some pretty heavy duty protections so that others don't use your work without your permission.

Explanation:

8 0
3 years ago
Other questions:
  • Alonzo collects bugs. He has created a fascinating display of large insects. Collecting bugs is a(n) _____ to Alonzo.
    10·2 answers
  • A ____ is text and graphics that print at the bottom of every page.
    12·1 answer
  • Hello... does anyone know why Brainly notifications aren’t working???
    11·2 answers
  • a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style
    6·1 answer
  • _________ attacks are becoming less common in modern operating systems.
    11·1 answer
  • Please fill these out. I really need this done.
    5·1 answer
  • What is the output?<br> &gt;&gt;&gt; password = "sdf#_356"<br> &gt;&gt;&gt; password.isalnum()
    8·2 answers
  • Consider we have n pointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we sw
    11·1 answer
  • Free coins who is octane and dont say u dont know because i will do the same to u
    13·2 answers
  • Keith would like to compare data he has collected from research. The data includes the electrical output
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!