Under the Domain Name Service (DNS) protocol, in the address someone@name1.name2.name3.name4, the host name is ____.
A. someone
B. name1
C. name2
D. name3
Answer: B
You might also like to view...
Ethernet users on opposite sides of a bridge are in separate
a. internets b. intranets c. collision domains d. switches
Consider the following string: AABABABABBAB and pattern to be matched: ABBAB After how many shifts will the pattern be found, using the bad character and good suffix rules?
a. 2nd shift will give a match b. 1st shift will give a match c. 3rd shift will give a match d. 4th shift will give a match
Match the phishing attacks to their characteristics
Phishing Attacks Characteristics 6. Spoofing a. changing a Web site IP repeatedly without affecting the domain name 7. Floating windows b. redirecting users' network traffic to undesired sites 8. Botnets c. using company trademarks and logos in emails for online scams 9. Redirectors d. giving money to strangers who promise a larger sum in return 10. 419 fraud e. developing Javascript replicas that are variations of legitimate URLs
What are you likely to find in a DNS zone?
A. MAC address-IP address pairs B. hostname-IP address pairs C. FQDN-MAC address pairs D. IP address-scope pairs