A valid reverse lookup zone consists of the network ID's octets in reverse order, with what at the end of the name?
A. .arpa
B. in-addr.arpa
C. rlz.arpa
D. in-addr.ptr
Answer: B
Computer Science & Information Technology
You might also like to view...
_________ attacks include impersonating another user, altering messages in transit between client and server and altering information on a Web site.
A) ?Active ? B) ?Passive ? C) ?Shell ? D) ?Psuedo
Computer Science & Information Technology
LinkedIn's ____ is an online forum for asking and answering questions posed by members.
A. Ask your Question section B. Answers section C. Questions section D. My Q&A section
Computer Science & Information Technology