IP Services Flashcards

(44 cards)

1
Q

What is a host file?

A

Computer file used by an OS to map hostnames to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does a host file serve as to allow the overriding of DNS lookup?

A

A simple form of local DNS resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is a host file commonly used?

A

Testing website deployment and blocking access to unwanted sites through redirection of domain names to incorrect or loopback IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Does the system check the external DNS server first?

A

No, it checks the host file before querying the external DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are time synchronization protocols essential within the network?

A

Provide consistent and accurate time across all devices

Time synchronization is crucial for coordinating activities and ensuring the integrity of time-sensitive operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where does time synchronization protocols play a critical role?

A

Network operations, logging, security, and proper sequence of events in distributed systems

These areas require precise timing to function correctly and efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the oldest and most common time protocol?

A

NTP

NTP stands for Network Time Protocol, which has been widely adopted for time synchronization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What sort of system does NTP use to minimize the impacts of variable network latency?

A

Hierarchical system

This system allows NTP to manage time synchronization across multiple levels of servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the extension of NTP designed to provide security and improvements?

A

NTS (Network Time Security)

NTS enhances NTP by adding security features to protect against various vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does NTS add to NTP?

A

Encryption and authentication

These features help secure the time synchronization process against tampering and unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Precision Time Protocol (PTP) used for?

A

Precise time synchronization within nanoseconds

PTP is often used in applications requiring high precision, such as telecommunications and financial transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the Address (A) Record allow users to access websites using human-readable domain names instead of numerical IP addresses?

A

The Address (A) Record maps a domain name with the corresponding IPv4 address

This allows users to enter a domain name instead of having to remember the numerical IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which record is the most commonly used record type in DNS settings?

A

Address (A) Record

This record is essential for mapping domain names to IPv4 addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is the AAAA Record similar to an Address (A) Record?

A

Maps a domain name to an IPv6 address

This enables the use of IPv6 addresses, which are necessary due to the exhaustion of IPv4 addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When is the CNAME Record used?

A

When multiple domain names resolve to the same IP address

This is useful for directing different domain names to the same server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the CNAME Record map to?

A

An alias name to a canonical domain name

This allows users to use different aliases for the same server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are MX Records responsible for?

A

Specifying the mail servers for receiving email messages on behalf of a domain

This is crucial for email delivery and routing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What do TXT Records hold for sources outside of the domain?

A

Text information

TXT Records can include various types of text data relevant to the domain.

19
Q

How can TXT Records be used?

A

Verifying domain ownership and implementing email security

They can also hold SPF or DKIM data for email validation.

20
Q

What are the security measures used for securing emails?

A

SPF and DKIM

These protocols help in authenticating the sender’s domain and protecting against email spoofing.

21
Q

What does the NS Record identify?

A

DNS server responsible for a specific domain

It plays a critical role in DNS delegation and management.

22
Q

How can NS Records be useful?

A

Delegating subdomains and managing multiple DNS servers

This allows for organized DNS management across different servers.

23
Q

How does a PTR Record differ from an A or AAAA Record?

A

Maps an IP address to a domain name

This is used for reverse DNS lookups.

24
Q

How are PTR Records primarily used?

A

Reverse DNS lookup, network troubleshooting, and security checks

They are essential for verifying the identity of servers.

25
What is name resolution?
Converting human-readable domain names into IP addresses
26
What is a recursive DNS query?
Involves a DNS server taking on the responsibility of retrieving data from other DNS servers to resolve the name fully
27
What are DNS zone types?
Portions of the domain name space in the DNS which are managed by a specific entity or administrator
28
What does a forward zone resolve?
Domain names to IP addresses
29
What kind of records does the forward zone contain?
A, AAAA, and MX
30
What does the reverse zone handle?
Maps IP addresses back to domain names
31
What zone type is used for reverse DNS lookup?
Reverse zone
32
What is the reverse zone often needed for?
Network troubleshooting and security verification
33
Does the Authoritative DNS zone need to query other sources?
No it has the final authority over its own records
34
Where has the information been obtained from with the non-authoritative zone?
From another server
35
What kind of data is usually sourced from the non-authoritative DNS zone?
Cached from other previous queries
36
What is the primary zone?
Main zone file where DNS records are stored and managed
37
What does the primary zone allow?
Changes to DNS records directly
38
What are secondary zones used for?
Fault tolerance, redundancy, and reduce loads/backup
39
Can you make changes to DNS records in the secondary zone?
No, they are read-only copies of the primary zone
40
What does the DNS Security Extension (DNSSEC) do?
Provides authentication of DNS data
41
What does DNSSEC use to validate DNS responses come from an authentic source?
Digital Signatures
42
What is one example of a DNS-based attack?
Cache poisoning
43
What protocols are designed to encrypt DNS queries?
DoH (DNS over HTTPS) and DoT (DNS over TLS)
44
What kind of attacks does DoH and DoT ensure security against?
Eavesdropping and Man-in-the-middle attacks (On-path attack)