In a client-server architecture, a domain name service (DNS)
is MOST important because it provides the:
A. address of the domain server.
B. resolution service for the name/address.
C. IP addresses for the Internet.
D. domain name system.
Answers were Sorted based on User's Feedback
Answer / rajesh
B. DNS is utilized primarily on the Internet for resolution of
the name/address of the web site. It is an Internet service
that translates domain names into IP addresses. As names are
alphabetic, they are easier to remember. However, the
Internet is based on IP addresses. Every time a domain name
is used, a DNS service must translate the name into the
corresponding IP address. The DNS system has its own
network. If one DNS server does not know how to translate a
particular domain name, it asks another one, and so on,
until the correct IP address is returned.
| Is This Answer Correct ? | 10 Yes | 1 No |
Answer / guest
Answer: C
DNS is utilized primarily on the Internet for resolution of
the name/address of the web site. It is an Internet service
that translates domain names into IP addresses. As names are
alphabetic, they are easier to remember. However, the
Internet is based on IP addresses. Every time a domain name
is used, a DNS service must translate the name into the
corresponding IP address. The DNS system has its own
network. If one DNS server does not know how to translate a
particular domain name, it asks another one, and so on,
until the correct IP address is returned.
| Is This Answer Correct ? | 3 Yes | 3 No |
Answer / ca ramesh chandra giri
Correct Answer is C. IP addresses for the Internet.
Reason
Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.
| Is This Answer Correct ? | 0 Yes | 1 No |
Which of the following processes describes risk assessment? Risk assessment is: A. subjective. B. objective. C. mathematical. D. statistical.
Which of the following is the MOST critical element of an effective disaster recovery plan (DRP)? A. Offsite storage of backup data B. Up-to-date list of key disaster recovery contacts C. Availability of a replacement data center D. Clearly defined recovery time objective (RTO)
Which of the following is the most important element in the design of a data warehouse? A. Quality of the metadata B. Speed of the transactions C. Volatility of the data D. Vulnerability of the system
Confidential data stored on a laptop is BEST protected by: A. storage on optical disks. B. logon ID and password. C. data encryption. D. physical locks.
An IS auditor reviewing database controls discovered that changes to the database during normal working hours were handled through a standard set of procedures. However, changes made after normal hours required only an abbreviated number of steps. In this situation, which of the following would be considered an adequate set of compensating controls? A. Allow changes to be made only with the DBA user account. B. Make changes to the database after granting access to a normal user account C. Use the DBA user account to make changes, log the changes and review the change log the following day. D. Use the normal user account to make changes, log the changes and review the change log the following day.
Following a reorganization of a company's legacy database, it was discovered that records were accidentally deleted. Which of the following controls would have MOST effectively detected this occurrence? A. Range check B. Table lookups C. Run-to-run totals D. One-for-one checking
During which phase of a system development process should an IS auditor first raise the issue of application controls? A. Construction B. System design C. Acceptance testing D. Functional specification
Which tests is an IS auditor performing when certain program is selected to determine if the source and object versions are the same?
When an organization's network is connected to an external network in an Internet client-server model not under that organization's control, security becomes a concern. In providing adequate security in this environment, which of the following assurance levels is LEAST important? A. Server and client authentication B. Data integrity C. Data recovery D. Data confidentiality
The purpose of debugging programs is to: A. generate random data that can be used to test programs before implementing them. B. protect valid changes from being overwritten by other changes during programming. C. define the program development and maintenance costs to be include in the feasibility study. D. ensure that abnormal terminations and coding flaws are detected and corrected.
The purpose of debugging programs is to: A. generate random data that can be used to test programs before implementing them. B. protect, during the programming phase, valid changes from being overwritten by other changes. C. define the program development and maintenance costs to be include in the feasibility study. D. ensure that program abnormal terminations and program coding flaws are detected and corrected.
Which of the following techniques would provide the BEST assurance that the estimate of program development effort is reliable? A. Function point analysis B. Estimates by business area C. A computer-based project schedule D. An estimate by experienced programmer