In a client-server architecture, a domain name service (DNS)
is MOST important because it provides the:
A. address of the domain server.
B. resolution service for the name/address.
C. IP addresses for the Internet.
D. domain name system.
Answers were Sorted based on User's Feedback
Answer / rajesh
B. DNS is utilized primarily on the Internet for resolution of
the name/address of the web site. It is an Internet service
that translates domain names into IP addresses. As names are
alphabetic, they are easier to remember. However, the
Internet is based on IP addresses. Every time a domain name
is used, a DNS service must translate the name into the
corresponding IP address. The DNS system has its own
network. If one DNS server does not know how to translate a
particular domain name, it asks another one, and so on,
until the correct IP address is returned.
Is This Answer Correct ? | 10 Yes | 1 No |
Answer / guest
Answer: C
DNS is utilized primarily on the Internet for resolution of
the name/address of the web site. It is an Internet service
that translates domain names into IP addresses. As names are
alphabetic, they are easier to remember. However, the
Internet is based on IP addresses. Every time a domain name
is used, a DNS service must translate the name into the
corresponding IP address. The DNS system has its own
network. If one DNS server does not know how to translate a
particular domain name, it asks another one, and so on,
until the correct IP address is returned.
Is This Answer Correct ? | 3 Yes | 3 No |
Answer / ca ramesh chandra giri
Correct Answer is C. IP addresses for the Internet.
Reason
Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.
Is This Answer Correct ? | 0 Yes | 1 No |
A disaster recovery plan (DRP) for an organization should: A. reduce the length of the recovery time and the cost of recovery. B. increase the length of the recovery time and the cost of recovery. C. reduce the duration of the recovery time and increase the cost of recovery. D. not affect the recovery time nor the cost of recovery.
Which of the following is a substantive test?
Which of the following statements relating to packet switching networks is CORRECT? A. Packets for a given message travel the same route. B. Passwords cannot be embedded within the packet. C. Packet lengths are variable and each packet contains the same amount of information. D. The cost charged for transmission is based on packet, not distance or route traveled.
1 Answers Karura Community Chapel,
An integrated test facility is considered a useful audit tool because it: A. is a cost-efficient approach to auditing application controls. B. enables the financial and IS auditors to integrate their audit tests. C. compares processing output with independently calculated data. D. provides the IS auditor with a tool to analyze a large range of information.
Which of the following is the MOST effective type of antivirus software? A. Scanners B. Active monitors C. Integrity checkers D. Vaccines
Which of the following can identify attacks and penetration attempts to a network? A. Firewall B. Packet filters C. Stateful inspection D. Intrusion detection system (IDs)
When auditing the requirements phase of a software acquisition, the IS auditor should: A. assess the feasibility of the project timetable. B. assess the vendor?s proposed quality processes. C. ensure that the best software package is acquired. D. review the completeness of the specifications.
An advantage of using sanitized live transactions in test data is that: A. all transaction types will be included. B. every error condition is likely to be tested. C. no special routines are required to assess the results. D. test transactions are representative of live processing.
Controls designed to ensure that unauthorized changes are not made to information residing in a computer file are known as: A. data security controls. B. implementation controls. C. program security controls. D. computer operations controls.
In planning an audit, the MOST critical step is the identification of the:
An IS auditor reviewing an organization's IT strategic plan should FIRST review: A. the existing IT environment. B. the business plan. C. the present IT budget. D. current technology trends.
An IS auditor involved as a team member in the detailed system design phase of a system under development would be MOST concerned with: A. internal control procedures. B. user acceptance test schedules. C. adequacy of the user training program. D. clerical processes for resubmission of rejected items.