For locating and removing stale resource DNS records, a process known as _____________ is employed

a. Cleaning
b. Garbage collection
c. Scavenging
d. None of the above


C. The server searches for and deletes aged resource records. You can control the scavenging process by specifying which servers can scavenge the records, which zones are to be checked, and which records are to be scavenged if they become stale.

Computer Science & Information Technology

You might also like to view...

When a resource is assigned to more work than available working hours, the resource will be ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Information security refers to ________ or ________ information and information systems that use, store, and transmit information from unauthorized access, disclosure, alteration, and destruction.

A. compiling / securing B. imaging / shielding C. duplicating / saving D. protecting / safeguarding

Computer Science & Information Technology

Which algorithms (in the implementations described in the course) can achieve a worst–case matching time of O(n) (check all that apply)?

a. Boyer-Moore b. Rabin-Karp c. Knuth-Morris-Pratt d. Aho-Corasick

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1) Exceptions always are handled in the method that initially detects the exception. 2) User-defined exception classes should extend class SystemException. 3) Accessing an out-of-bounds array index causes the CLR to throw an exception. 4) A finally block is optional after a try block that does not have any corresponding catch blocks. 5) A finally block is guaranteed to execute.

Computer Science & Information Technology