In a client-server architecture, a domain name service (DNS)
is MOST important because it provides the:
A. address of the domain server.
B. resolution service for the name/address.
C. IP addresses for the Internet.
D. domain name system.
Answers were Sorted based on User's Feedback
Answer / rajesh
B. DNS is utilized primarily on the Internet for resolution of
the name/address of the web site. It is an Internet service
that translates domain names into IP addresses. As names are
alphabetic, they are easier to remember. However, the
Internet is based on IP addresses. Every time a domain name
is used, a DNS service must translate the name into the
corresponding IP address. The DNS system has its own
network. If one DNS server does not know how to translate a
particular domain name, it asks another one, and so on,
until the correct IP address is returned.
| Is This Answer Correct ? | 10 Yes | 1 No |
Answer / guest
Answer: C
DNS is utilized primarily on the Internet for resolution of
the name/address of the web site. It is an Internet service
that translates domain names into IP addresses. As names are
alphabetic, they are easier to remember. However, the
Internet is based on IP addresses. Every time a domain name
is used, a DNS service must translate the name into the
corresponding IP address. The DNS system has its own
network. If one DNS server does not know how to translate a
particular domain name, it asks another one, and so on,
until the correct IP address is returned.
| Is This Answer Correct ? | 3 Yes | 3 No |
Answer / ca ramesh chandra giri
Correct Answer is C. IP addresses for the Internet.
Reason
Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses.
| Is This Answer Correct ? | 0 Yes | 1 No |
Which of the following audit tools is MOST useful to an IS auditor when an audit trail is required? A. Integrated test facility (ITF) B. Continuous and intermittent simulation (CIS) C. Audit hooks D. Snapshots
Which of the following is a form of an Internet attack? A. Searching for software design errors B. Guessing user passwords based on their personal information C. Breaking the deadman's door to gain entry D. Planting a trojan horse
Which of the following IS functions may be performed by the same individual, without compromising on control or violating segregation of duties? A. Job control analyst and applications programmer B. Mainframe operator and system programmer C. Change/problem and quality control administrator D. Applications and system programmer
Which of the following would be the LEAST helpful in restoring service from an incident currently underway? A. Developing a database repository of past incidents and actions to facilitate future corrective actions B. Declaring the incident, which not only helps to carry out corrective measures, but also improves the awareness level C. Developing a detailed operations plan that outlines specific actions to be taken to recover from an incident D. Establishing multidisciplinary teams consisting of executive management, security staff, information systems staff, legal counsel, public relations, etc., to carry out the response.
Which of the following is a role of an IS steering committee? A. Initiate computer applications. B. Ensure efficient use of data processing resources. C. Prepare and monitor system implementation plans. D. Review the performance of the systems department.
The responsibility for designing, implementing and maintaining a system of internal control lies with: A. the IS auditor. B. management. C. the external auditor. D. the programming staff.
Which of the following would be the LEAST important aspect of a business continuity plan? A. Redundant facilities B. Relocation procedures C. Adequate insurance coverage D. Current and available business continuity manual
An organization has been an Internet user for several years and the business plan now calls for initiating e-commerce via web-based transactions. Which of the following will LEAST impact transactions in e-commerce? A. Encryption is required B. Timed authentication is required C. Firewall architecture hides the internal network D. Traffic is exchanged through the firewall at the application layer only
An IS auditor observed that some data entry operators leave their computers in the midst of data entry without logging off. Which of the following controls should be suggested to prevent unauthorized access? A. Encryption B. Switch off the computer when leaving C. Password control D. Screen saver password
Which of the following business recovery strategies would require the least expenditure of funds? A. Warm site facility B. Empty shell facility C. Hot site subscription D. Reciprocal agreement
Which of the following components of a business continuity plan is PRIMARILY the responsibility of an organization?s IS department? A. Developing the business continuity plan B. Selecting and approving the strategy for business continuity plan C. Declaring a disaster D. Restoring the IS systems and data after a disaster
Which of the following processes describes risk assessment? Risk assessment is: A. subjective. B. objective. C. mathematical. D. statistical.