1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
OLga [1]
4 years ago
7

Each organization that provides host services on the public Internet is responsible for providing and maintaining DNS authoritat

ive servers for public access.A. TrueB. False
Computers and Technology
1 answer:
kompoz [17]4 years ago
5 0

Answer:

True

Explanation:

You might be interested in
attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
bogdanovich [222]

Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.

<h3>What is ack scan ?</h3>
  • ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
  • Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
  • TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
  • On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
  • The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.

To learn more about ask scan refer to:

brainly.com/question/13055134

#SPJ4

3 0
1 year ago
What sets Web pages apart from other documents is that they contain a special kind of text called ___, which is document text th
kvv77 [185]

The web pages contain a special kind of text that allowed to respond to the user input is termed hypertext.

<h3>What are web pages?</h3>

The web pages are given as the web server delivery with the displaying of the web browser. It is given with the HTML language and comprises several resources and information.

The web page document is accessed with the presence of the hypertext or the hyperlink that enables the user selection to respond to it.

Learn more about web pages, here:

brainly.com/question/9060926

#SPJ1

5 0
2 years ago
How can a user view the options for Junk E-mail?
alexdok [17]
B. by right clicking all messages in the junk email folder
8 0
3 years ago
Read 2 more answers
HOW DO I HACK PUBG MOBILE WITH PROOF <br>GIVE ME LINK​
muminat

Answer:

why do u want to do that i have an acc i dont even use that is so good with so much uc and other skins on it

Explanation:

5 0
3 years ago
Read 2 more answers
When there is a missing DLL file, _______.
sattari [20]

When there is a missing DLL file, the computer will display error messages. The correct option is B.

<h3>What is a DLL file?</h3>

DLL is dynamic link library is a concept of Microsoft implementation of the shared library concept of Microsoft Windows. This library contains codes and data that can be use in making a program.

Thus, the correct option is B. the computer will display error messages.

Learn more about a DLL file

brainly.com/question/23551323

#SPJ1

4 0
2 years ago
Read 2 more answers
Other questions:
  • A construction company has an online system that tracks all of the status and progress of their projects. The system is hosted i
    10·1 answer
  • Heeeaaaalp please!!!!
    15·2 answers
  • The Joint Photographic Experts Group developed the ___________ graphic format.
    12·2 answers
  • Show the output waveform of an AND gate with the inputs A, B,
    5·1 answer
  • Choose all items that represent essential items to bring to an interview.
    9·2 answers
  • How do you mark someone brainliest? The person with the best explanation gets brainliest.
    11·2 answers
  • Select the correct answer from each drop-down menu.
    5·2 answers
  • 2. What is the first part of the 3D printing process ?
    11·1 answer
  • In a web application, the client uses a ___________ to interact with a web server.
    5·1 answer
  • Data mining requires specialized data analysts to ask ad hoc questions and obtain answers quickly from the system. select one: t
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!