DNS server located on the DMZ should be configured to prohibit unauthorized ____.
A. partitions
B. log files
C. backups
D. zone transfers
Answer: D
You might also like to view...
Match the following Word features to the dialog box where it can be accessed:
I. change to superscript A. Symbols dialog box II. insert a nonbreaking hyphen B. Tabs dialog box III. specify a leader character C. Borders and Shading dialog box IV. add a Box style to a paragraph D. Paragraph dialog box V. change line spacing E. Font dialog box
Press ____ to copy selected files to the system clipboard.
a. CTRL+A b. CTRL+C c. ALT+SHIFT+B d. CTRL+S
MRP is a _____________ function.
A. computer-integrated manufacturing B. in-house logistics and materials management C. planning production and operation D. product lifecycle management
Matthew would like to send a private message to Richard using an asymmetric cryptosystem. What key should Matthew use to encrypt the message?
a. Matthew's public key b. Matthew's private key c. Richard's public key d. Richard's private key e. Shared secret key