For locating and removing stale resource DNS records, a process known as _____________ is employed
a. Cleaning
b. Garbage collection
c. Scavenging
d. None of the above
C. The server searches for and deletes aged resource records. You can control the scavenging process by specifying which servers can scavenge the records, which zones are to be checked, and which records are to be scavenged if they become stale.
You might also like to view...
When a resource is assigned to more work than available working hours, the resource will be ________
Fill in the blank(s) with correct word
Information security refers to ________ or ________ information and information systems that use, store, and transmit information from unauthorized access, disclosure, alteration, and destruction.
A. compiling / securing B. imaging / shielding C. duplicating / saving D. protecting / safeguarding
Which algorithms (in the implementations described in the course) can achieve a worst–case matching time of O(n) (check all that apply)?
a. Boyer-Moore b. Rabin-Karp c. Knuth-Morris-Pratt d. Aho-Corasick
Answer the following statements true (T) or false (F)
1) Exceptions always are handled in the method that initially detects the exception. 2) User-defined exception classes should extend class SystemException. 3) Accessing an out-of-bounds array index causes the CLR to throw an exception. 4) A finally block is optional after a try block that does not have any corresponding catch blocks. 5) A finally block is guaranteed to execute.