IP Services Flashcards

1
Q

What is a host file?

A

Computer file used by an OS to map hostnames to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a host file serve as to allow the overriding of DNS lookup?

A

A simple form of local DNS resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is a host file commonly used?

A

Testing website deployment and blocking access to unwanted sites through redirection of domain names to incorrect or loopback IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Does the system check the external DNS server first?

A

No, it checks the host file before querying the external DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are time synchronization protocols essential within the network?

A

Provide consistent and accurate time across all devices

Time synchronization is crucial for coordinating activities and ensuring the integrity of time-sensitive operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where does time synchronization protocols play a critical role?

A

Network operations, logging, security, and proper sequence of events in distributed systems

These areas require precise timing to function correctly and efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the oldest and most common time protocol?

A

NTP

NTP stands for Network Time Protocol, which has been widely adopted for time synchronization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What sort of system does NTP use to minimize the impacts of variable network latency?

A

Hierarchical system

This system allows NTP to manage time synchronization across multiple levels of servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the extension of NTP designed to provide security and improvements?

A

NTS (Network Time Security)

NTS enhances NTP by adding security features to protect against various vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does NTS add to NTP?

A

Encryption and authentication

These features help secure the time synchronization process against tampering and unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Precision Time Protocol (PTP) used for?

A

Precise time synchronization within nanoseconds

PTP is often used in applications requiring high precision, such as telecommunications and financial transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the Address (A) Record allow users to access websites using human-readable domain names instead of numerical IP addresses?

A

The Address (A) Record maps a domain name with the corresponding IPv4 address

This allows users to enter a domain name instead of having to remember the numerical IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which record is the most commonly used record type in DNS settings?

A

Address (A) Record

This record is essential for mapping domain names to IPv4 addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is the AAAA Record similar to an Address (A) Record?

A

Maps a domain name to an IPv6 address

This enables the use of IPv6 addresses, which are necessary due to the exhaustion of IPv4 addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When is the CNAME Record used?

A

When multiple domain names resolve to the same IP address

This is useful for directing different domain names to the same server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the CNAME Record map to?

A

An alias name to a canonical domain name

This allows users to use different aliases for the same server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are MX Records responsible for?

A

Specifying the mail servers for receiving email messages on behalf of a domain

This is crucial for email delivery and routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do TXT Records hold for sources outside of the domain?

A

Text information

TXT Records can include various types of text data relevant to the domain.

19
Q

How can TXT Records be used?

A

Verifying domain ownership and implementing email security

They can also hold SPF or DKIM data for email validation.

20
Q

What are the security measures used for securing emails?

A

SPF and DKIM

These protocols help in authenticating the sender’s domain and protecting against email spoofing.

21
Q

What does the NS Record identify?

A

DNS server responsible for a specific domain

It plays a critical role in DNS delegation and management.

22
Q

How can NS Records be useful?

A

Delegating subdomains and managing multiple DNS servers

This allows for organized DNS management across different servers.

23
Q

How does a PTR Record differ from an A or AAAA Record?

A

Maps an IP address to a domain name

This is used for reverse DNS lookups.

24
Q

How are PTR Records primarily used?

A

Reverse DNS lookup, network troubleshooting, and security checks

They are essential for verifying the identity of servers.

25
Q

What is name resolution?

A

Converting human-readable domain names into IP addresses

26
Q

What is a recursive DNS query?

A

Involves a DNS server taking on the responsibility of retrieving data from other DNS servers to resolve the name fully

27
Q

What are DNS zone types?

A

Portions of the domain name space in the DNS which are managed by a specific entity or administrator

28
Q

What does a forward zone resolve?

A

Domain names to IP addresses

29
Q

What kind of records does the forward zone contain?

A

A, AAAA, and MX

30
Q

What does the reverse zone handle?

A

Maps IP addresses back to domain names

31
Q

What zone type is used for reverse DNS lookup?

A

Reverse zone

32
Q

What is the reverse zone often needed for?

A

Network troubleshooting and security verification

33
Q

Does the Authoritative DNS zone need to query other sources?

A

No it has the final authority over its own records

34
Q

Where has the information been obtained from with the non-authoritative zone?

A

From another server

35
Q

What kind of data is usually sourced from the non-authoritative DNS zone?

A

Cached from other previous queries

36
Q

What is the primary zone?

A

Main zone file where DNS records are stored and managed

37
Q

What does the primary zone allow?

A

Changes to DNS records directly

38
Q

What are secondary zones used for?

A

Fault tolerance, redundancy, and reduce loads/backup

39
Q

Can you make changes to DNS records in the secondary zone?

A

No, they are read-only copies of the primary zone

40
Q

What does the DNS Security Extension (DNSSEC) do?

A

Provides authentication of DNS data

41
Q

What does DNSSEC use to validate DNS responses come from an authentic source?

A

Digital Signatures

42
Q

What is one example of a DNS-based attack?

A

Cache poisoning

43
Q

What protocols are designed to encrypt DNS queries?

A

DoH (DNS over HTTPS) and DoT (DNS over TLS)

44
Q

What kind of attacks does DoH and DoT ensure security against?

A

Eavesdropping and Man-in-the-middle attacks (On-path attack)