DNS server located on the DMZ should be configured to prohibit unauthorized ____.

A. partitions
B. log files
C. backups
D. zone transfers


Answer: D

Computer Science & Information Technology

You might also like to view...

Match the following Word features to the dialog box where it can be accessed:

I. change to superscript A. Symbols dialog box II. insert a nonbreaking hyphen B. Tabs dialog box III. specify a leader character C. Borders and Shading dialog box IV. add a Box style to a paragraph D. Paragraph dialog box V. change line spacing E. Font dialog box

Computer Science & Information Technology

Press ____ to copy selected files to the system clipboard.

a. CTRL+A b. CTRL+C c. ALT+SHIFT+B d. CTRL+S

Computer Science & Information Technology

MRP is a _____________ function.

A. computer-integrated manufacturing B. in-house logistics and materials management C. planning production and operation D. product lifecycle management

Computer Science & Information Technology

Matthew would like to send a private message to Richard using an asymmetric cryptosystem. What key should Matthew use to encrypt the message?

a. Matthew's public key b. Matthew's private key c. Richard's public key d. Richard's private key e. Shared secret key

Computer Science & Information Technology