A valid reverse lookup zone consists of the network ID's octets in reverse order, with what at the end of the name?

A. .arpa
B. in-addr.arpa
C. rlz.arpa
D. in-addr.ptr

Answer: B

Computer Science & Information Technology

You might also like to view...

_________ attacks include impersonating another user, altering messages in transit between client and server and altering information on a Web site.

A) ?Active ? B) ?Passive ? C) ?Shell ? D) ?Psuedo

Computer Science & Information Technology

LinkedIn's ____ is an online forum for asking and answering questions posed by members.

A. Ask your Question section B. Answers section C. Questions section D. My Q&A section

Computer Science & Information Technology