1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
11

You work in an office that uses Linux and Windows servers. The network uses the IP protocol. You are sitting at a Windows workst

ation. An application you are using is unable to connect to a Windows server named FileSrv2. Which of the following commands would work BEST to test network connectivity between your workstation and the server?
a. arp
b. dig
c. tracert
d. nslookup
e. ping
Computers and Technology
1 answer:
-Dominant- [34]3 years ago
3 0

Answer:

ping

Explanation:

its ping. im a computer science nerd :')

You might be interested in
What variation of a dictionary attack involves a dictionary attack combined with a brute force attack, and will slightly alter d
allochka39001 [22]

Answer:

hybrid

Explanation:

A hybrid attack is a blend of both a dictionary attack method as well as brute force attack. This means that while a dictionary attack method would include a wordlist of passwords, the brute-force attack would be applied to each possible password in that list.

7 0
3 years ago
In Labrador retrievers, black coats are dominant and brown coats are recessive. What is the genotype of a brown Labrador?
cluponka [151]
Assuming b is brown (recessive)

bb would be the correct genotype as it would require 2 recessive genes for brown fur to be expressed
4 0
4 years ago
Who do politicians listen to?
horrorfan [7]

Answer:

they dont realy listen to anybody

Explanation:

6 0
4 years ago
what should the timing of transition slides be per minute? maintain the flow of the presentation to ______ slides per minute.
murzikaleks [220]

Answer:

1-2

Explanation:

It depends on the amount of information that you have on each slide. You want to make sure you're not going too fast but also make sure you arent taking up to much time. Be sure to speak clearly it will make the presentation better by looking clean and time organized. hope this helps :)

8 0
3 years ago
Non-delivered goods, counterfeit products, fraudulent payments are common type of cyber crime these
Arisa [49]

Answer:

a. Internet auction fraud

b. Counterfeit products are products made and/or sold under the brand name of a product of a higher quality

c. 1) Monitor business transactions

2) Use an Address Verification System AVS

Explanation:

a. Such types of cyber crimes are collectively called Internet auction fraud

Internet or online auction fraud is a form of fraud that involves the act of providing misleading information about goods paced on advert for sale on an online auction site, including the sale of counterfeit goods, sale of goods of poor quality, receiving a different item from what was ordered, artificial bidding to increase price, omission of important information about a product, delivering an item that looks different from what was displayed on the website and the non-delivery of an item already to the buyer.

A seller can be a victim of the internet auction fraud when a buyer does not pay for goods an/or services received, request for delivery before payment, the buyer pays with a stolen credit card, the buyer uses a fake escrow account such that the money returns to the buyer after receiving the goods

b. Counterfeit products or goods are products that are being manufactured and marketed, without formal authorization, under the name of a popular and recognized but are usually of lesser quality than the product they try to imitate

c. Measures that can be taken to stop fraudulent payments are;

1) Monitor transactions to to check for red flags, including disparity in shipping and billing information

Monitor transactions from customer that use free or anonymous emails services which can easily be opened and closed without payment or proper  documentation

2) Make use of Address Verification System to authenticate the billing address on a payment, and the address on the credit card.

7 0
3 years ago
Other questions:
  • White arrows in the middle of the lane indicate whether the lane must __________.
    8·2 answers
  • You must establish credit in order to buy a house true or false
    5·2 answers
  • In order to delete an object, it must be?
    14·1 answer
  • A network administrator has received the IPv6 prefix 2001:DB8::/48 for subnetting. Assuming the administrator does not subnet in
    11·1 answer
  • Help
    9·1 answer
  • An art board on which text and graphics are pasted is known as a __?
    12·1 answer
  • Use C++:
    9·1 answer
  • You construct a simple electrical current to boil water for tea. A battery generates positive and negative charges. A wire conne
    13·1 answer
  • Mencione 2ejemplos de procesos manuales
    11·2 answers
  • Mary and Billy are moving away to college and both know in their hearts that they need to end their relationship. They move away
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!