1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
postnew [5]
2 years ago
7

You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Wind

ows Server 2016. Windows Server Update Services (WSUS) is installed on two servers, SERVERA and SERVERB. SERVERA receives software updates from Microsoft Windows Update servers. You manually synchronized SERVERB with the Windows Update servers, and now you need to complete the WSUS configuration on SERVERB. Which of the following is not a step you might take to complete the configuration of WSUS on SERVERB?
A. Approve the current updates.
B. Set SERVERB to receive updates from SERVERA and automatically synchronize with approved updates on SERVERA.
C. Set SERVERB to draw updates automatically from whichever sources SERVERA is set to draw from.
D. Set SERVERB to receive daily updates automatically at a given time
Computers and Technology
1 answer:
Maksim231197 [3]2 years ago
5 0

Answer:

The answer is "Choice C"

Explanation:

The server is a computer or network which supplies other devices called clients through a net with resources, data or applications, or programs. Source Server allows a client can retrieve the cells are attached to the source code for a program. All required source control files were retrieved by the source server. Its app must've been indexed to source in enabled to use source server.

You might be interested in
What is the default text-wrapping option when inserting images into a Word document?
JulijaS [17]

Answer:

In line with the text

Explanation:

8 0
3 years ago
Read 2 more answers
Jeremy knows that there is a keyboard shortcut in Word, but he does not know what it is. What should Jeremy do to find out what
loris [4]

The correct answer to this question is that Jeremy should use the F1 key.

In Word, the F1 key is the help button that will help Jeremy find any keyboard shortcut that he is looking for. After pressing F1, he can search for what he is looking for. A second option to find a keyboard short would be to perform a simple search on the Internet for what he is looking for.

3 0
2 years ago
Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
grandymaker [24]
False because it might damage it more but if it was recommended by lots of people i mean the software then its true
6 0
3 years ago
Which command is used to format a partition on a hard disk drive with the ext4 filesystem?
FinnZ [79.3K]
Mkfs -t ext4 /dev/file
5 0
3 years ago
In a penetration test, the ________ team comprises testers who are given no knowledge of the infrastructure and are attacking a
just olya [345]

Answer:

TIGER TEAM

Explanation:

Penetration testing is the act of simulating an attack on an organization's resources to assess an infrastructure's true vulnerabilities. A penetration test simulates an actual attack. Penetration testers use a variety of methods including social engineering, software hacking and physical intrusion.

There are different types of penetration testing teams which are: red team, blue team and purple team.

Red team also known as the tiger team simulates real types of cyber attacks in order to discover any unknown security vulnerabilities or weaknesses.

In penetration testing, tiger (red) team are the attackers and are usually outside contractors, with a lot of knowledge of how to break in but NO KNOWLEDGE OF WHAT SECURITY IS IN PLACE.

Therefore, In a penetration test, the TIGER TEAM comprises testers who are given no knowledge of the infrastructure and are attacking a target that is unaware of their existence until the attack is made.

3 0
3 years ago
Other questions:
  • Diane wants to maintain a record of grades scored in the fifth, sixth, and seventh grades. She enters her grades and the total p
    13·1 answer
  • The master system database stores a database template that is used as a blueprint when creating a new user database.
    10·1 answer
  • What are the design concepts and assumptions behind a class, an object and the relationship between them? What are the roles met
    9·1 answer
  • What is the full form of bcc please tell​
    15·2 answers
  • Sometimes a database can contain "bad data," meaning incomplete, incorrect, inaccurate, or irrelevant records, which can be corr
    7·1 answer
  • Why do you think that so many of these sources have similar names?
    9·1 answer
  • Favorite color should it be stored why?or why not?<br>​
    6·1 answer
  • _____________________________________________________is a pre-designed format to help users with the creation of a document, lik
    6·1 answer
  • Complete the following sentence. <br> _______ is often used to solve riddles and puzzles.
    7·2 answers
  • Which type of information should never be given out on social media?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!