1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
6

Your organization's IT department has developed a custom application that reports the hostname of each client that tries to acce

ss three servers in the accounting department that store sensitive information. You do a random test and find that the program is not reporting the host names for some clients even though it properly records their IP addresses. This is because the custom application submits reverse lookup requests to the DNS server to discover the host names for the specified IP addresses. As you investigate further, you learn that the clients whose hostnames could not be reported have static IP addresses and are on subnet 192.168.3.0. What should you do
Computers and Technology
1 answer:
Andrews [41]3 years ago
5 0

Answer:

Configure DC1 to forward name resolution requests to 192.168.3.0

Explanation:

DC1 is configured in order to use forwarders so that they can send unresolvable host name requests to a DNS server at the main office or the head quarters.

This also prevent sending of DNS spoofing attack  to a DNS client

You might be interested in
How to write a program to draw 1000 random points on a frame in python language for coding?
harina [27]

Answer:

You could generate random numbers between the pixel amount of the height and width than place the dots at those random points

Explanation:

Do you need the code or can you make it using my "headstart"

8 0
3 years ago
The method "someOtherMethod" is NOT defined as static. This means...
Verdich [7]

Answer:

3

Explanation:

7 0
3 years ago
In the context of intentional security threats, _____ can erase data and wreak havoc on computers and networks but do not replic
mihalych1998 [28]

Answer:

The answer is "Option D".

Explanation:

Trojan program is a malicious code that is also known as a virus. It is a rootkit, that aims to infect the computer to hide or obscure an object. These programs are mainly used to download additional content, such as additional pieces of malware, to the infected computer, and other options are wrong that can be defined as follows:

  • In option A, It is not correct, this option infects the system.
  • In option B, It is used for infects another computer that's why it is incorrect.
  • In option C, It is incorrect because it is used in cybersecurity.  
5 0
3 years ago
*
asambeis [7]

Answer:

I think they're all valid but the validility depends on the website your using the usernames on.

Explanation:

6 0
3 years ago
A(n) ____ is a named collection of data that exists on a storage medium.
MissTica
S a named collection of data that exists on a storage medium<span>.</span>
6 0
4 years ago
Other questions:
  • Sarah's research shows that business information management professionals also perform the duties of other professionals. Which
    9·1 answer
  • ________is one color shade gradually progressing to another shade of the same color or one color progressing to another color.
    14·1 answer
  • Show the printout of the following code.
    14·1 answer
  • What was originally called "shareware"
    9·2 answers
  • Https://www.bing.com/videos/search?q=dancing+aaron+smith+1+hour&amp;view=detail&amp;mid=C6C28AF3C0CEC1E4AEE3C6C28AF3C0CEC1E4AEE3
    14·1 answer
  • What is the number system that uses only the numbers 0 and 1?
    8·1 answer
  • What type of platform is SAP?
    9·1 answer
  • Explain in detail what it means to synchronize computers and mobile devices and include at least two strategies for keeping your
    8·1 answer
  • So has anyone opened the link/file those people are giving out as answers? Like what are they, viruses, answers, nothing??? Some
    9·2 answers
  • Why do we need to connect computers"​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!