1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
6

Your organization's IT department has developed a custom application that reports the hostname of each client that tries to acce

ss three servers in the accounting department that store sensitive information. You do a random test and find that the program is not reporting the host names for some clients even though it properly records their IP addresses. This is because the custom application submits reverse lookup requests to the DNS server to discover the host names for the specified IP addresses. As you investigate further, you learn that the clients whose hostnames could not be reported have static IP addresses and are on subnet 192.168.3.0. What should you do
Computers and Technology
1 answer:
Andrews [41]3 years ago
5 0

Answer:

Configure DC1 to forward name resolution requests to 192.168.3.0

Explanation:

DC1 is configured in order to use forwarders so that they can send unresolvable host name requests to a DNS server at the main office or the head quarters.

This also prevent sending of DNS spoofing attack  to a DNS client

You might be interested in
Write a SELECT statement that returns these columns from the Orders table: The card_number column The length of the card_number
VashaNatasha [74]

Answer:

Select CardNumber, LEN(cardNumber) as CARDLEN,

Right (CardNumberR,4) AS LAST4DIGITS FROM ORDER

Explanation:

5 0
4 years ago
Whate are some creatures/animals that the robot rex imitates?
Rzqust [24]

<span>The Rex robot imitates the dinosaur perfectly. In terms of its structure, the robot looks like a dinosaur, and this is seen in the robot’s serrated teeth. To some extent, the robot imitates the cheetah due to its speed ability.</span>

3 0
4 years ago
How do you operate a screwdriver if it wont screw nothing
Delicious77 [7]
You cannot, I would recommend going to a hardware store and buying a new one.
5 0
3 years ago
Read 2 more answers
Certain files, such as the ____ and Security log in Windows, might lose essential network activity records if power is terminate
Hoochie [10]

Answer:

The answer to this question is a. Event log

Explanation:

Event log in Windows is a comprehensive record of security,system and application notifications stored by the Windows and it is used by administrators to determine problems in the system and foretell issues that going to happen in future.

Operating system and the Apps use event logs to keep account of important software and hardware activity that administrator can use to correct issues with the operating system.

7 0
3 years ago
Given numRows and numColumns, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
Salsk061 [2.6K]

Answer:

import java.util.Scanner;

public class NestedLoops {

   public static void main (String [] args) {

       Scanner scnr = new Scanner(System.in);

       int numRows;

       int numColumns;

       int currentRow;

       int currentColumn;

       char currentColumnLetter;

       numRows = scnr.nextInt();

       numColumns = scnr.nextInt();

       for (currentRow = 0; currentRow < numRows; currentRow++) {

           currentColumnLetter = 'A';

           for (currentColumn = 0; currentColumn < numColumns; currentColumn++) {

               System.out.print(currentRow + 1);

               System.out.print(currentColumnLetter + " ");

               currentColumnLetter++;

           }

       }

       System.out.println("");

   }

}

4 0
4 years ago
Other questions:
  • If you are asked to bring in agile way of working into the way a meeting runs, which one among the listed options will you imple
    11·1 answer
  • Tomi is testing all of the links on her web page by clicking on each one in a browser. What type of testing is this considered?
    6·2 answers
  • With which feature or menu option of a word processing program can you make an image like this ?
    15·2 answers
  • How do assembly language different from machine language?
    15·1 answer
  • The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use
    6·1 answer
  • Select the parts of a business letter.
    6·2 answers
  • What is the mest gun in pixel gun 3d imma give you brainliest
    14·2 answers
  • Hello! Please Answer This One Question!<br><br>Write a 50-word summary about Digital Citizenship
    10·1 answer
  • Why linked list is better than an array?
    7·1 answer
  • Exam Instructions
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!