A technician is not able to ping a server by the FQDN but can by the IP. Which of the following should the technician check?

A. Ensure that WINS is configured
B. Ensure that the DNS is configured
C. Ensure the MAC address is correct
D. Ensure that the IP address is correct


Answer: B. Ensure that the DNS is configured

Computer Science & Information Technology

You might also like to view...

Because a bibliography must begin on a new page, at the location of the insertion point, you can insert a manual ________ to force one page to end and a new page to begin

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the context of computer crimes and attacks, the difference between phishing and spear phishing is that:

Computer Science & Information Technology

Briefly describe protocol abuse.

What will be an ideal response?

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Shellcode is not specific to a particular processor architecture. 2. There are several generic restrictions on the content of shellcode. 3. An attacker can generally determine in advance exactly where the targeted buffer will be located in the stack frame of the function in which it is defined. 4. Shellcode must be able to run no matter where in memory it is located. 5. Buffer overflows can be found in a wide variety of programs, processing a range of different input, and with a variety of possible responses.

Computer Science & Information Technology