IP Services Flashcards

1
Q

In what type of environments is dynamic addressing useful?

A

In environments with frequently changing network devices

Dynamic addressing allows devices to join and leave networks without manual configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can dynamic addressing reduce?

A

Configuration errors and administrative overhead

Reducing manual IP address assignment minimizes mistakes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between DHCP and DHCP server?

A

The server assigns the IP information needed, but DHCP is a network management protocol used on IP networks

DHCP stands for Dynamic Host Configuration Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the DHCP scope?

A

A defined range of IP addresses used to assign to clients

Scopes help manage the allocation of IP addresses effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are DHCP scopes useful?

A

Organize and manage IP address distribution

Scopes help prevent IP address conflicts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is lease time for DHCP servers?

A

Duration for which a DHCP server grants a device the right to use a specific IP address

Lease time can be adjusted based on network needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the device do when a lease time becomes expired?

A

Renew current IP or get a new one

The renewal process allows continued network access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can lease times help manage in an IP network?

A

Availability of IP addresses

Effective lease time management ensures optimal usage of available IPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does reservation mean with DHCP?

A

Specific IP address within a scope that is reserved for use by a device

Reservations ensure that critical devices always have the same IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What IP does a device get when an address is reserved for a specific device?

A

The same IP consistently

This is important for devices that need constant connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are some of the capabilities that DHCP options allow?

A

Passing configurations such as DNS and NTP

DHCP options enhance the configuration capabilities of devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are DHCP relays?

A

Network functions that forwards DHCP requests to a DHCP server on another network

Relays help in managing DHCP across different network segments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are DHCP relay agents used for?

A

Extending the reach of DHCP servers across multiple subnets

Relay agents facilitate communication between clients and servers in different subnets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can devices on different subnets obtain IP addresses without a direct DHCP server?

A

DHCP relay

This allows centralized management of IP address allocation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are exclusion ranges of a DHCP scope?

A

Subsets not used for dynamic assignment

Exclusion ranges help to reserve IPs for specific devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What can exclusion range IP addresses be reserved for?

A

Manual assignment for devices that require a fixed IP address

This is useful for printers, servers, and other critical devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Stateless Address Autoconfiguration (SLAAC)?

A

Feature in IPv6 that allows devices to automatically configure its own IP address

SLAAC simplifies network configuration for devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Does SLAAC in IPv6 require manual configuration or DHCP?

A

No, a device can generate its own IPv6 based on router advertisements it receives and its own MAC address

This enables devices to self-configure without external assistance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What capability does SLAAC provide for ease of deployment of IPv6 networks?

A

Plug-and-play connectivity

This feature allows devices to join networks effortlessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a host file?

A

Computer file used by an OS to map hostnames to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does a host file serve as to allow the overriding of DNS lookup?

A

A simple form of local DNS resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How is a host file commonly used?

A

Testing website deployment and blocking access to unwanted sites through redirection of domain names to incorrect or loopback IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Does the system check the external DNS server first?

A

No, it checks the host file before querying the external DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why are time synchronization protocols essential within the network?

A

Provide consistent and accurate time across all devices

Time synchronization is critical for operations that depend on time accuracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Where does time synchronization protocols play a critical role?

A

Network operations, logging, security, and proper sequence of events in distributed systems

Ensures that events are correctly ordered and logged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the oldest and most common time protocol?

A

NTP

NTP stands for Network Time Protocol.

27
Q

What sort of system does NTP use to minimize the impacts of variable network latency?

A

Hierarchical system

This system helps manage time distribution across different levels.

28
Q

What is the extension of NTP designed to provide security and improvements?

A

NTS (Network Time Security)

NTS enhances NTP with additional security features.

29
Q

What does NTS add to NTP?

A

Encryption and authentication

These features help protect time synchronization from tampering.

30
Q

What is Precision Time Protocol (PTP) used for?

A

Precise time synchronization within nanoseconds

PTP is often used in environments requiring high accuracy, such as telecommunications.

31
Q

How does the Address (A) Record allow users to access websites using human-readable domain names instead of numerical IP addresses?

A

The Address (A) Record maps a domain name with the corresponding IPv4 address

This enables users to type in a domain name instead of remembering a numerical IP address.

32
Q

Which record is the most commonly used record type in DNS settings?

A

Address (A) Record

It is fundamental for domain name resolution.

33
Q

How is the AAAA Record similar to an Address (A) Record?

A

Maps a domain name to an IPv6 address

This allows the use of longer IPv6 addresses.

34
Q

When is the CNAME Record used?

A

When multiple domain names resolve to the same IP address

This is useful for domain aliases.

35
Q

What does the CNAME Record map to?

A

An alias name to a canonical domain name

This helps in redirecting traffic from one domain to another.

36
Q

What are MX Records responsible for?

A

Specifying the mail servers for receiving email messages on behalf of a domain

Essential for email routing.

37
Q

What do TXT Records hold for sources outside of the domain?

A

Text information

This can include various types of data, including verification details.

38
Q

How can TXT Records be used?

A

Verifying domain ownership and implementing email security

Commonly used for SPF and DKIM records.

39
Q

What are the security measures used for securing emails?

A

SPF and DKIM

These protocols help prevent email spoofing.

40
Q

What does the NS Record identify?

A

DNS server responsible for a specific domain

Crucial for domain delegation.

41
Q

How can NS Records be useful?

A

Delegating subdomains and managing multiple DNS servers

This allows for better organization of DNS records.

42
Q

How does a PTR Record differ from an A or AAAA Record?

A

Maps an IP address to a domain name

This is useful for reverse lookups.

43
Q

How are PTR Records primarily used?

A

Reverse DNS lookup, network troubleshooting, and security checks

Important for verifying the identity of an IP address.

44
Q

What is name resolution?

A

Converting human-readable domain names into IP addresses

Name resolution is essential for accessing websites and services on the internet.

45
Q

What is a recursive DNS query?

A

Involves a DNS server taking on the responsibility of retrieving data from other DNS servers to resolve the name fully

This type of query ensures that the client receives a complete answer to its request.

46
Q

What are DNS zone types?

A

Portions of the domain name space in the DNS which are managed by a specific entity or administrator

Different zone types help organize and delegate control over various parts of the DNS.

47
Q

What does a forward zone resolve?

A

Domain names to IP addresses

Forward zones are essential for translating user-friendly domain names into machine-readable IP addresses.

48
Q

What kind of records does the forward zone contain?

A

A, AAAA, and MX

These records help direct traffic to the correct servers and services.

49
Q

What does the reverse zone handle?

A

Maps IP addresses back to domain names

This process is crucial for identifying the domain associated with a specific IP address.

50
Q

What zone type is used for reverse DNS lookup?

A

Reverse zone

Reverse lookups are often used for verification and troubleshooting.

51
Q

What is the reverse zone often needed for?

A

Network troubleshooting and security verification

It helps in identifying potential issues or unauthorized access.

52
Q

Does the Authoritative DNS zone need to query other sources?

A

No it has the final authority over its own records

Authoritative zones provide definitive answers without needing to refer to other servers.

53
Q

Where has the information been obtained from with the non-authoritative zone?

A

From another server

Non-authoritative zones typically contain cached data from previous queries.

54
Q

What kind of data is usually sourced from the non-authoritative DNS zone?

A

Cached from other previous queries

This data may not always be up-to-date or reliable.

55
Q

What is the primary zone?

A

Main zone file where DNS records are stored and managed

The primary zone is crucial for maintaining the integrity of DNS records.

56
Q

What does the primary zone allow?

A

Changes to DNS records directly

Administrators can modify records as needed in the primary zone.

57
Q

What are secondary zones used for?

A

Fault tolerance, redundancy, and reduce loads/backup

Secondary zones help ensure availability and reliability of DNS services.

58
Q

Can you make changes to DNS records in the secondary zone?

A

No, they are read-only copies of the primary zone

Secondary zones replicate the data but cannot be modified directly.

59
Q

What does the DNS Security Extension (DNSSEC) do?

A

Enhances DNS security by providing authentication of DNS data

DNSSEC is vital for ensuring the integrity and authenticity of DNS responses.

60
Q

What does DNSSEC use to validate DNS responses come from an authentic source?

A

Digital Signatures

Digital signatures help prevent spoofing and other forms of attack.

61
Q

What is one example of a DNS-based attack?

A

Cache poisoning

Cache poisoning involves corrupting the cached responses of a DNS resolver.

62
Q

What protocols are designed to encrypt DNS queries?

A

DoH (DNS over HTTPS) and DoT (DNS over TLS)

These protocols enhance privacy and security of DNS queries.

63
Q

What kind of attacks does DoH and DoT ensure security against?

A

Eavesdropping and Man-in-the-middle attacks (On-path attack)

These protocols protect against unauthorized interception of DNS traffic.