What is the purpose of this code?
How long will the secondary servers attempt to contact the primary server before it considers that zone is dea
You have the SOA presented below in your Zone. Your secondary servers have not been able to
contact your primary server to synchronize information. How long will the secondary servers
attempt to contact the primary server before it considers that zone is dead and stops responding to
queries?
collegae.edu.SOA, cikkye.edu ipad.college.edu. (200302028 3600 3600 604800 3600)
What sequence of packets is sent during the initial TCP three-way handshake?
What sequence of packets is sent during the initial TCP three-way handshake?
What do you think Tess King is trying to accomplish?
Tess King is using the nslookup command to craft queries to list all DNS information (such as
Name Servers, host names, MX records, CNAME records, glue records (delegation for child
Domains), zone serial number, TimeToLive (TTL) records, etc) for a Domain. What do you think
Tess King is trying to accomplish? Select the best answer.
Which port number Steve should scan?
Steve scans the network for SNMP enabled devices. Which port number Steve should scan?
which of the following Resource Records (RRs)?
A zone file consists of which of the following Resource Records (RRs)?
Is there any way you can retrieve information from a website that is outdated?
You are footprinting an organization and gathering competitive intelligence. You visit the
company’s website for contact information and telephone numbers but do not find them listed
there. You know they had the entire staff directory listed on their website 12 months ago but now it
is not there. Is there any way you can retrieve information from a website that is outdated?
How do you prevent DNS spoofing?
Let’s imagine three companies (A, B and C), all competing in a challenging global environment.
Company A and B are working together in developing a product that will generate a major
competitive advantage for them. Company A has a secure DNS server while company B has a
DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B,
company C gains access to outgoing e-mails from company B. How do you prevent DNS
spoofing? (Select the Best Answer.)
What built-in Windows feature could you have implemented to protect the sensitive information on these laptops
You are the CIO for Avantes Finance International, a global finance company based in Geneva.
You are responsible for network functions and logical security throughout the entire corporation.
Your company has over 250 servers running Windows Server, 5000 workstations running
Windows Vista, and 200 mobile users working from laptops on Windows 7.
Last week, 10 of your company’s laptops were stolen from salesmen while at a conference in
Amsterdam. These laptops contained proprietary company information. While doing damage
assessment on the possible public relations nightmare this may become, a news story leaks about
the stolen laptops and also that sensitive information from those computers was posted to a blog
online.
What built-in Windows feature could you have implemented to protect the sensitive information on
these laptops?
Which DNS resource record can indicate how long any "DNS poisoning" could last?
Which DNS resource record can indicate how long any “DNS poisoning” could last?