In a client-server architecture, a domain name service (DNS)
is MOST important because it provides the:
A. address of the domain server.
B. resolution service for the name/address.
C. IP addresses for the Internet.
D. domain name system.
Answers were Sorted based on User's Feedback
Answer / rajesh
B. DNS is utilized primarily on the Internet for resolution of
the name/address of the web site. It is an Internet service
that translates domain names into IP addresses. As names are
alphabetic, they are easier to remember. However, the
Internet is based on IP addresses. Every time a domain name
is used, a DNS service must translate the name into the
corresponding IP address. The DNS system has its own
network. If one DNS server does not know how to translate a
particular domain name, it asks another one, and so on,
until the correct IP address is returned.
Is This Answer Correct ? | 10 Yes | 1 No |
Answer / guest
Answer: C
DNS is utilized primarily on the Internet for resolution of
the name/address of the web site. It is an Internet service
that translates domain names into IP addresses. As names are
alphabetic, they are easier to remember. However, the
Internet is based on IP addresses. Every time a domain name
is used, a DNS service must translate the name into the
corresponding IP address. The DNS system has its own
network. If one DNS server does not know how to translate a
particular domain name, it asks another one, and so on,
until the correct IP address is returned.
Is This Answer Correct ? | 3 Yes | 3 No |
Answer / ca ramesh chandra giri
Correct Answer is C. IP addresses for the Internet.
Reason
Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.
Is This Answer Correct ? | 0 Yes | 1 No |
An installed Ethernet cable run in an unshielded twisted pair (UTP) network is more than 100 meters long. Which of the following could be caused by the length of the cable? A. Electromagnetic interference (EMI) B. Cross talk C. Dispersion D.Attenuation
Which of the following would be considered a business risk? A. Former employees B. Part-time and temporary personnel C. Loss of competitive edge D. Hackers
Digital signatures require the: A. signer to have a public key and the receiver to have a private key. B. signer to have a private key and the receiver to have a public key. C. signer and receiver to have a public key. D. signer and receiver to have a private key.
Analysis of which of the following would MOST likely enable the IS auditor to determine if a non-approved program attempted to access sensitive data? A. Abnormal job termination reports B. Operator problem reports C. System logs D. Operator work schedules
Which of the following is the operating system mode in which all instructions can be executed? A. Problem B. Interrupt C. Supervisor D. Standard processing
An IS auditor recommends that an initial validation control be programmed into a credit card transaction capture application. The initial validation process would MOST likely: A. check to ensure the type of transaction is valid for that card type. B. verify the format of the number entered then locate it on the database. C. ensure that the transaction entered is within the cardholder's credit limit. D. confirm that the card is not shown as lost or stolen on the master file.
To affix a digital signature to a message, the sender must first create a message digest by applying a cryptographic hashing algorithm against: A. the entire message and thereafter enciphering the message digest using the sender's private key. B. any arbitrary part of the message and thereafter enciphering the message digest using the sender's private key. C. the entire message and thereafter enciphering the message using the sender's private key. D. the entire message and thereafter enciphering the message along with the message digest using the sender's private key.
Which of the following line media would provide the BEST security for a telecommunication network? A. Broad band network digital transmission B. Baseband network C. Dial-up D. Dedicated lines
Linux is an __________ operating system
IT governance ensures that an organization aligns its IT strategy with: A. Enterprise objectives. B. IT objectives. C. Audit objectives. D. Finance objectives.
Which of the following is a strength of the program evaluation review technique (PERT) over other techniques? PERT: A. considers different scenarios for planning and control projects. B. allows the user to input program and system parameters. C. tests system maintenance processes accurately. D. estimates costs of system projects.
Which of the following should be included in an organization's IS security policy? A. A list of key IT resources to be secured B. The basis for access authorization C. Identity of sensitive security features D. Relevant software security features