In a client-server architecture, a domain name service (DNS)
is MOST important because it provides the:
A. address of the domain server.
B. resolution service for the name/address.
C. IP addresses for the Internet.
D. domain name system.
Answers were Sorted based on User's Feedback
Answer / rajesh
B. DNS is utilized primarily on the Internet for resolution of
the name/address of the web site. It is an Internet service
that translates domain names into IP addresses. As names are
alphabetic, they are easier to remember. However, the
Internet is based on IP addresses. Every time a domain name
is used, a DNS service must translate the name into the
corresponding IP address. The DNS system has its own
network. If one DNS server does not know how to translate a
particular domain name, it asks another one, and so on,
until the correct IP address is returned.
Is This Answer Correct ? | 10 Yes | 1 No |
Answer / guest
Answer: C
DNS is utilized primarily on the Internet for resolution of
the name/address of the web site. It is an Internet service
that translates domain names into IP addresses. As names are
alphabetic, they are easier to remember. However, the
Internet is based on IP addresses. Every time a domain name
is used, a DNS service must translate the name into the
corresponding IP address. The DNS system has its own
network. If one DNS server does not know how to translate a
particular domain name, it asks another one, and so on,
until the correct IP address is returned.
Is This Answer Correct ? | 3 Yes | 3 No |
Answer / ca ramesh chandra giri
Correct Answer is C. IP addresses for the Internet.
Reason
Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.
Is This Answer Correct ? | 0 Yes | 1 No |
Which of the following is a benefit of a risk-based approach to audit planning? Audit: A. scheduling may be performed months in advance. B. budgets are more likely to be met by the IS audit staff. C. staff will be exposed to a variety of technologies. D. resources are allocated to the areas of highest concern.
In planning an audit, the MOST critical step is the identification of the:
When an organization's network is connected to an external network in an Internet client-server model not under that organization's control, security becomes a concern. In providing adequate security in this environment, which of the following assurance levels is LEAST important? A. Server and client authentication B. Data integrity C. Data recovery D. Data confidentiality
Which of the following is a feature of an intrusion detection system (IDS)? A. Gathering evidence on attack attempts B. Identifying weakness in the policy definition C. Blocking access to particular sites on the Internet D. Preventing certain users from accessing specific servers
Which of the following findings would an IS auditor be MOST concerned about when performing an audit of backup and recovery and the offsite storage vault? A. There are three individuals with a key to enter the area. B. Paper documents also are stored in the offsite vault. C. Data files, which are stored in the vault, are synchronized. D. The offsite vault is located in a separate facility.
To prevent unauthorized entry to the data maintained in a dial-up fast response system, an IS auditor should recommend: A. online terminals be placed in restricted areas. B. online terminals be equipped with key locks. C. ID cards be required to gain access to online terminals. D. online access be terminated after three unsuccessful attempts.
Which of the following describes a difference between unit testing and system testing? A. Unit testing is more comprehensive. B. Programmers are not involved in system testing. C. System testing relates to interfaces between programs. D. System testing proves user requirements are complete.
Responsibility and reporting lines cannot always be established when auditing automated systems since: A. diversified control makes ownership irrelevant. B. staff traditionally change jobs with greater frequency. C. ownership is difficult to establish where resources are shared. D. duties change frequently in the rapid development of technology.
Reconfiguring which of the following firewall types will prevent inward downloading of files through the file transfer protocol (FTP)? A. Circuit gateway B. Application gateway C. Packet filter D. Screening router
The role of IT auditor in complying with the Management Assessment of Internal Controls (Section 404 of the Sarbanes-Oxley Act) is: A. planning internal controls B. documenting internal controls C. designing internal controls D. implementing internal controls
An IS auditor recommends that an initial validation control be programmed into a credit card transaction capture application. The initial validation process would MOST likely: A. check to ensure the type of transaction is valid for that card type. B. verify the format of the number entered then locate it on the database. C. ensure that the transaction entered is within the cardholder's credit limit. D. confirm that the card is not shown as lost or stolen on the master file.
Losses can be minimized MOST effectively by using outside storage facilities to do which of the following? A. Provide current, critical information in backup files B. Ensure that current documentation is maintained at the backup facility C. Test backup hardware D. Train personnel in backup procedures