1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
3 years ago
9

A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve

r has been repaired, however it is feared that DNS entries may remain in client computer caches. Which of the following tools can be used to flush the DNS cache on a Windows client?
Computers and Technology
2 answers:
MAVERICK [17]3 years ago
8 0

Answer:

The easiest method to clear a DNS cache is to use either the command line, PowerShell or Windows Server's DNS Manager

Explanation:

You can use either the ipconfig /flushdns (command line), Clear-DnsClientCache (PowerShell) or DNS->(name)->Clear Cache (from the DNS Manager)

source:

https://activedirectorypro.com/clear-windows-dns-cache/

https://www.technipages.com/flush-and-reset-the-dns-resolver-cache-using-ipconfig

bazaltina [42]3 years ago
6 0

Answer:

hi your question lacks the option but here is the best tool to be used by the security administrator

using the IPCONFIG

Explanation:

The DNS cache on a windows client is the temporary storage of the DNS files on the client system that was connected to a DNS server. if there has been a suspected attack on the DNS server it is necessary that after clearing the DNS cache of the server it is necessary to clear that of the client system because the corrupted/attacked DNS file might be retained in the DNS cache of the client system.

The security administrator can use a tool called IPCONFIG to perform this task of clearing/flushing the DNS cache on a windows client system to eliminate completely the corrupted files that the attacked DNS server might have transmitted to systems connected to it.

You might be interested in
Social scientists who study criminal behavior.
Sveta_85 [38]
That;d be a criminologist, wouldn't it?
5 0
3 years ago
Read 2 more answers
Explain Hayflick limit and why are HeLa cells able to live beyond the Hayflick limit?
Crank

Answer:

The Hela cells live beyond the Hayflick limit due to the secretion of telomerase in the Hela cells.

Explanation:

Hayflick limit is the number of times a cell divides by mitosis, due to  the continuous shortening of the telomeres at the end of the chromosomes. It only apply to normal living cells.

Hela cells are human cancerous cells found in the cervix or the entrance of the uterus. They cause cervical cancer as they grow uncontrollably, affecting other cells around it.

The Hela cell survive the hayflick limit because it produces a hormone called telomerase, that continuously elongates the telomeres of the chromosomes, for continuous cell division.

3 0
3 years ago
What are the main dimensions of information system and their components
nydimaria [60]

Answer:

The dimensions of information systems include organizations, management, and information technology. The key elements of an organization are its people, structure, business processes, politics, and culture. An organization coordinates work through a structured hierarchy and formal standard operating procedures.

7 0
3 years ago
Consider a router that interconnects three subnets: subnet 1, subnet 2, and subnet 3. suppose all of the interfaces in each of t
creativ13 [48]

Answer:

thank God for us you and keep hoping tougher than I thought it would be

4 0
3 years ago
Read 2 more answers
What ip address cidrs are not allowed to be communicated with by our malware?
dalvyx [7]

For this project an analysis tool must be used that will do the analysis for you. Following the provided set of access rules -A FORWARD -s 192.168.56.0/24 -d 130.207.0.0/16 -j DROP above rule will drop every packet from the source IP range (192.168.56.0 to 192.168.56.255) and having destination IP range (130.207.0.0 to 130.207.255.254).

4 0
3 years ago
Other questions:
  • Can someone show me a image of this completed I will mark brainliest!!! It's typing.com
    11·1 answer
  • Write a function cipher(plaintext, n) to shift all characters in a string of text. Your function should take 2 parameters, the p
    15·1 answer
  • The drone intercepts at 1256 hour. what time do they plane to take control of the drone
    11·1 answer
  • Write a program named Admission for a college’s admissions office. The user enters a numeric high school grade point average (fo
    15·1 answer
  • Write a C++ program that determines if a given string is a palindrome. A palindrome is a word or phrase that reads the same back
    6·1 answer
  • How to show neither precious nor accurate
    13·1 answer
  • By default, EC2 instances pull SQS messages from an SQS queue on a FIFO basis.
    6·1 answer
  • Most widely used insulator for splices of smaller wires
    13·1 answer
  • Today's consoles and games have audio features that rival cinematic audio.<br> True or False?
    6·2 answers
  • When was the first computer made?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!