Match each item with a statement below.

A. a DNS resource record that maps IPv4 addresses to hosts within a domain
B. a protocol that provides name resolution services on local networks for IPv4 and IPv6 Windows computers
C. a name resolution protocol used for peer-to-peer network environments and that provides secure and scalable resolution services
D. a type of server that is used only to cache already resolved domain names and addresses, as well as related error information
E. a DNS resource record used to define database aliases, primarily to make it quicker and easier to edit and manage DNS zone files
F. A DNS resource record that identifies the server or servers that are authoritative for the domain or subdomain to which the zone files or database correspond
G. the principle whereby one name server designates another name server to handle some or all of the zone files for the domain or subdomains under its purview
H. containing multiple network interfaces capable of attaching to multiple subnets
I. a DNS resource record that's used for inverse lookups to map numeric IP addresses to domain names


A. A record
B. Link-Local Multicast Name Resolution (LLMNR)
C. Peer Name Resolution Protocol (PNRP)
D. caching-only server
E. CNAME record
F. SOA record
G. delegation of authority
H. multihomed
I. pointer record

Computer Science & Information Technology

You might also like to view...

Write a program that allows the user to practice typing. When the user clicks a button, the program generates and displays a random sequence of letters in an Entry component. The user repeats the sequence in another Entry component. When the user enters an incorrect letter, the pro- gram displays an error message until the user types the correct letter. Use keyboard events.

What will be an ideal response?

Computer Science & Information Technology

Which of the following acts greatly broadened the FBI's authority to gather evidence from telephone conversations, e-mail, pagers, and other forms of electronic communication?

A) Computer Fraud and Abuse Act B) Pen/Trap Statute C) Electronic Communications Privacy Act D) USA PATRIOT Act

Computer Science & Information Technology

What is the fifth step in logical troubleshooting?

A) Verify full system functionality. B) Test the theory to determine the cause. C) Document findings, actions, and outcomes. D) Establish a plan of action.

Computer Science & Information Technology

The element should be placed before the ____ element.

A. B. C. D.

Computer Science & Information Technology