Question


a. anycast addressing f. security-aware resolver
b. DNSSEC g. spear phishing
c. network access points h. slit DNS architecture
d. pharming i. split brain DNS architecture
e. POP ISPs j. zone transfer
1/ a variation of phishing that intercepts traffic to a legitimate Web site and
redirects it to a phony replica site
2/ a network architecture that divides DNS services between two servers
3/ a network addressing scheme that allows DNS services to be decentralized among a group of servers, regardless of their location
4/ a computing system that is compliant with DNSSEC and that attempts to resolve a fully qualified domain name to an IP address
5/ a protocol designed to improve DNS security by using cryptography to ensure DNS integrity and authentication
6/ the communication of a zone file from the primary DNS server to secondary
DNS servers for updating
7/ ISP facilities that provide connectivity to the Internet for business, education, and home users
8/ a network architecture that uses a single DNS domain with a DNS server on the organization's DMZ for Internet services and a DNS server on the internal network for service to internal hosts
9/ a variation of phishing directed at specific users instead of using spam e-mail.
10/ highly secure public facilities where commercial Internet backbones and ISPs exchange routing and traffic data

Answer

This answer is hidden. It contains 31 characters.