COMPUTER THREATS SECURITY
TYPES OF NETWORK SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Update the HOST file with the URLs for all websites
|
|
Use NSLOOKUP to resolve URLs
|
|
Ensure ICMP messages can pass through the firewall
|
|
Enable port 53 on the firewall
|
Detailed explanation-1: -This issue is typically caused by a problem with domain name server (DNS) resolution because the Internet service provider’s DNS servers are unavailable or a problem with the security software (usually a firewall) running on the computer which is attempting to access the Internet.
Detailed explanation-2: -DHCP Reservations – This is where you can assign a unique, fixed IP Address to a specific device on your network. This is helpful when you want your device to have the same IP Address every time it connects to the network.
Detailed explanation-3: -The third step is to test the theory of probable cause. If the theory is confirmed, the technician should move on to the next step. If the theory is proven to be incorrect, then it will be necessary to reestablish a new theory of probable cause.
Detailed explanation-4: -Which best describes IP’s use of the time-to-live (TTL) field? The TTL specifies the time a datagram is allowed to remain on the network.