Which of the following is a tool that can query a database that includes domain names, IP addresses, and points of contact, including names, postal addresses, and telephone numbers?

a. whois
b. ARIN
c. Back Orifice
d. RIPE


Answer: a

Computer Science & Information Technology

You might also like to view...

The statement "{P}S{Q}, {Q}T{R} => {P}S;T{R}" is an example of the rule of ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

(Level-Order Binary Tree Traversal) The program of Figs. 20.20–20.22 illustrated three re- cursive methods of traversing a binary tree—inorder, preorder and postorder traversals. This exer- cise presents the level-order traversal of a binary tree, in which the node values are printed level by level, starting at the root node level. The nodes on each level are printed from left to right. The

level- order traversal is not a recursive algorithm. It uses a queue object to control the output of the nodes. The algorithm is as follows: 1) Insert the root node in the queue 2) While there are nodes left in the queue, Get the next node in the queue Print the node’s value If the pointer to the left child of the node is not null Insert the left child node in the queue If the pointer to the right child of the node is not null Insert the right child node in the queue. Write member function levelOrder to perform a level-order traversal of a binary tree object. Modify the program of Figs. 20.20–20.22 to use this function. [Note: You will also need to modify and incorporate the queue-processing functions of Fig. 20.16 in this program.]

Computer Science & Information Technology

The Web was born in 1990, when it was launched, and the technology was very basic compared to what web users know today

Indicate whether the statement is true or false

Computer Science & Information Technology

You are the security administrator for your company. You are required to implement a solution that will provide the highest level of confidentiality possible to all data on the network. Two-factor token and biometric-based authentication is implemented for all users. Administrator-level accounts are tightly controlled and issued separately to each user needing administrative access. Auditing is

enabled to log all transactions. All hard drives are protected using full disk encryption. All resources have access control lists (ACLs) that can only be changed by an administrator. All server resources are virtualized. LUN masking is implemented to segregate storage area network (SAN) data. All switches are configured with port security. The network is protected with a firewall using ACLs, a NIPS device, and secured wireless access points. You need to improve the current architecture to provide the stated goal. What should you do? A. Implement transport encryption. B. Implement MAC filtering on all network devices. C. Implement data-at-rest encryption. D. Implement PKI authorization.

Computer Science & Information Technology