Chapter 12 - Advance Bind Features Flashcards

1
Q

List and describe the 4 named address match lists that are predefined in BIND.

A
  1. None – matches no hosts
  2. Any – matches all hosts
  3. Localhost – matches the ipv4 addresses of all local interfaces on the system
  4. Localnets – matches the subnet of the ipv4 nw for which the system has an interface
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How would you implement the predefined named address match lists (use localnets)?

A
allow‐query { localnets; };
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who does the allow-query setting restrict to query your DNS server?

A

allow‐query; from which hosts iterative queries will be serviced – default is on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who does the allow-query-on setting restrict to query your DNS server?

A

allow‐query‐on; which local addresses can accept iterative queries – default is all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who does the allow-query-cache setting restrict to query your DNS server?

A

allow‐query‐cache; which hosts can get answers form cache. no default value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who does the allow-recursion setting restrict to query your DNS server?

A

allow‐recursion; from which hosts recursive queries will be serviced – default localnets localhost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who does the allow-recursion-on setting restrict to query your DNS server?

A

allow‐recursion‐on; which local addresses can accept recursive queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who does the allow-update setting restrict to query your DNS server?

A

allow‐update; from which hosts are DDNS updates accepted – default is all

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who does the blackhole setting restrict to query your DNS server?

A

blackhole; address the server will not accept queries from or sent queries to – default is no

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What method of security can you use to restrict processes to a directory so that it will be seen as the root of the file system hierarchy and why would you use this method?

A

use a chroot env – if the bind daemon is compromised it will not have the ability to access or read other parts of the filesystem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What file and what command within the file will invoke a chroot environment?

A

/etc/sysconfig/named

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What RPM sets up the chroot environment?

A

bind-chrootenv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What version of BIND is required to support SRV records?

A

BIND v 8.2.2 or later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What command should be used to modify records in a zone that allows DDNS updates?

A

nsupdate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly