Under the Domain Name Service (DNS) protocol, in the address someone@name1.name2.name3.name4, the host name is ____.

A. someone
B. name1
C. name2
D. name3


Answer: B

Computer Science & Information Technology

You might also like to view...

Ethernet users on opposite sides of a bridge are in separate

a. internets b. intranets c. collision domains d. switches

Computer Science & Information Technology

Consider the following string: AABABABABBAB and pattern to be matched: ABBAB After how many shifts will the pattern be found, using the bad character and good suffix rules?

a. 2nd shift will give a match b. 1st shift will give a match c. 3rd shift will give a match d. 4th shift will give a match

Computer Science & Information Technology

Match the phishing attacks to their characteristics

Phishing Attacks Characteristics 6. Spoofing a. changing a Web site IP repeatedly without affecting the domain name 7. Floating windows b. redirecting users' network traffic to undesired sites 8. Botnets c. using company trademarks and logos in emails for online scams 9. Redirectors d. giving money to strangers who promise a larger sum in return 10. 419 fraud e. developing Javascript replicas that are variations of legitimate URLs

Computer Science & Information Technology

What are you likely to find in a DNS zone?

A. MAC address-IP address pairs B. hostname-IP address pairs C. FQDN-MAC address pairs D. IP address-scope pairs

Computer Science & Information Technology