what conditions does a secondary name server request a zone transfer from a primary name server?
Under what conditions does a secondary name server request a zone transfer from a primary
name server?
What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through the firewall i
What ports should be blocked on the firewall to prevent NetBIOS traffic from not coming through
the firewall if your network is comprised of Windows NT, 2000, and XP?(Choose all that apply.
What is a NULL scan?
What is a NULL scan?
What is the proper response for a NULL scan if the port is open?
What is the proper response for a NULL scan if the port is open?
Which of the following statements about a zone transfer correct?
Which of the following statements about a zone transfer correct?(Choose three.
How long will the secondary servers attempt to contact the primary server before it considers that zone is dea
You have the SOA presented below in your Zone. Your secondary servers have not been able to
contact your primary server to synchronize information. How long will the secondary servers
attempt to contact the primary server before it considers that zone is dead and stops responding to
queries?
collegae.edu.SOA, cikkye.edu ipad.college.edu. (200302028 3600 3600 604800 3600)
What do you think Tess King is trying to accomplish?
Tess King is using the nslookup command to craft queries to list all DNS information (such as
Name Servers, host names, MX records, CNAME records, glue records (delegation for child
Domains), zone serial number, TimeToLive (TTL) records, etc) for a Domain. What do you think
Tess King is trying to accomplish? Select the best answer.
which of the following Resource Records (RRs)?
A zone file consists of which of the following Resource Records (RRs)?
How do you prevent DNS spoofing?
Let’s imagine three companies (A, B and C), all competing in a challenging global environment.
Company A and B are working together in developing a product that will generate a major
competitive advantage for them. Company A has a secure DNS server while company B has a
DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B,
company C gains access to outgoing e-mails from company B. How do you prevent DNS
spoofing? (Select the Best Answer.)
Which DNS resource record can indicate how long any "DNS poisoning" could last?
Which DNS resource record can indicate how long any “DNS poisoning” could last?