1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
3 years ago
9

A security administrator wants to empty the DNS cache after a suspected attack that may have corrupted the DNS server. The serve

r has been repaired, however it is feared that DNS entries may remain in client computer caches. Which of the following tools can be used to flush the DNS cache on a Windows client?
Computers and Technology
2 answers:
MAVERICK [17]3 years ago
8 0

Answer:

The easiest method to clear a DNS cache is to use either the command line, PowerShell or Windows Server's DNS Manager

Explanation:

You can use either the ipconfig /flushdns (command line), Clear-DnsClientCache (PowerShell) or DNS->(name)->Clear Cache (from the DNS Manager)

source:

https://activedirectorypro.com/clear-windows-dns-cache/

https://www.technipages.com/flush-and-reset-the-dns-resolver-cache-using-ipconfig

bazaltina [42]3 years ago
6 0

Answer:

hi your question lacks the option but here is the best tool to be used by the security administrator

using the IPCONFIG

Explanation:

The DNS cache on a windows client is the temporary storage of the DNS files on the client system that was connected to a DNS server. if there has been a suspected attack on the DNS server it is necessary that after clearing the DNS cache of the server it is necessary to clear that of the client system because the corrupted/attacked DNS file might be retained in the DNS cache of the client system.

The security administrator can use a tool called IPCONFIG to perform this task of clearing/flushing the DNS cache on a windows client system to eliminate completely the corrupted files that the attacked DNS server might have transmitted to systems connected to it.

You might be interested in
Look at the logos below, decide which one would be the most suitable to use for a Cooking App? Please explain your reason below.
den301095 [7]

Answer:

The logo on the top right

Explanation:

It's pretty obvious :/

Everything else is not related to baking or cooking (kiiiinda excluding taco bell, but thats a fast food chain)

6 0
3 years ago
Suppose you find a magic $1.00 coin. Its magic power is as follows: as each day passes, you get an additional dollar plus half o
AfilCa [17]

Answer:

See explaination

Explanation:

public class QuickRich {

static void getRichQuick() {

double amount = 1;

int day = 1;

System.out.println("Day 1: $1");

while (amount < 1000000) {

day++;

if(amount + 1 + (amount/2) < 1000000)

System.out.printf("Day %d: $%.2f + ($1 + %.2f) = $%.2f\n", day, amount, amount/2, amount+(amount/2)+1);

else

System.out.printf("Day %d: $%.2f + ($1 + %.2f) >= $1000000\n", day, amount, amount/2);

amount += (1 + (amount/2));

}

}

public static void main(String[] args) {

getRichQuick();

}

}

7 0
4 years ago
List the main industries in Sierra Leone​
Dafna11 [192]

Answer:

The main industries in Sierra Leone are: Diamond mining

Petroleum refining

Small - scale manufacturing (beverage, textiles,footwear)

Explanation:

They also engage in commercial ship repair

3 0
3 years ago
The keyboard and the mouse are types of BLANK devices
Stolb23 [73]
Input is the right answer.hope it helps.
3 0
3 years ago
Read 2 more answers
Suppose a system administrator at sls happened to read the details of this case. what steps should he or she take to improve the
kvv77 [185]
He should add more security applications to the software and inform the company to not tell any details.
6 0
4 years ago
Other questions:
  • The information security organization performs a significant role in the implementation of solutions that mitigate risk and cont
    6·1 answer
  • Physical access, security bypass, and eavesdropping are examples of how access controls can be ________.
    15·1 answer
  • The ____________________ packet-filtering firewall allows only a particular packet with a particular source, destination, and po
    10·1 answer
  • What are some ways in which reading and writing have changed in our newly networked world
    10·1 answer
  • When naming a file to upload into an assignment in blackboard, it is okay to use special characters?
    13·1 answer
  • Problem: you need to write a code that read 2 array of size 10x10 of zero and ones that represent black
    8·1 answer
  • Customizing ads to people who had earlier visited the site is
    14·1 answer
  • Explain the iterative nature of the database requirements collection, definition, and visualization process.
    14·1 answer
  • Which statement is true? A. Pseudocode uses shapes such as rectangles and diamonds to plan a program. B. You only use comments f
    10·1 answer
  • A__ is a part of a GUI that allows a specific type of interaction with the user.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!