Top-Rated Free Essay
Preview

Domain Name System and Host Save Question

Satisfactory Essays
268 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Domain Name System and Host Save Question
Question 1 (1 point)

In NAT, the ________ creates new external source IP addresses and port numbers.
Question 1 options:

A) firewall B) source host

C) router D) destination host

Save
Question 2 (1 point)

Servers are normally given ________ IP addresses.
Question 2 options:

A) well-known B) static C) dynamic D)
None of these

Save
Question 3 (1 point)

Clients can send a DHCP request message to multiple DHCP servers.
Question 3 options:

True

False
Save
Question 4 (1 point)

Which is less expensive to implement?
Question 4 options:

A)
SSL/TLS.

B)
IPsec.

C)
Both cost about the same to implement.

Save
Question 5 (1 point)

In tunnel mode, IPsec provides protection ________.
Question 5 options:

A) all the way between the two hosts

B) only between the IPsec servers

C)
Both all the way between the two hosts and only between the IPsec servers

D)
Neither all the way between the two hosts nor only between the IPsec servers

Save
Question 6 (1 point)

".com" is a ________.
Question 6 options:

A) root domain

B) top-level domain

C) second-level domain

D)
None of these

Save
Question 7 (1 point)

In SNMP, the ________ creates traps.
Question 7 options:

A) manager B) agent C)
Both manager and agent

D)
Neither manager nor agent

Save
Question 8 (1 point)

A company receives its domain name from ________.
Question 8 options:

A) the IETF

B) its ISP

C) a domain registrar

D)
None of these

Save
Question 9 (1 point)

Which of the following are usually given dynamic IP addresses?
Question 9 options:

A)
Clients.

B)
Servers.

C)
Both Clients and Servers

D)
Neither Clients nor Servers

Save
Question 10 (1 point)

IPsec is used for ________ VPNs.
Question 10 options:

A) remote-access B) site-to-site C)
Both remote-access and site-to-site

D)
Neither remote-access nor site-to-site

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    LAN to LAN tunnels, MPLS network and VPN site to site I would chose the MPLS network its more reliable.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sdsa300 Unit 1

    • 178 Words
    • 1 Page

    Most would say VPN is the low-cost way to establish remote connections between offices and to securely provide connections to a mobile workforce. The central office should be equipped with a VPN concentrator that is configured to maintain the number of connections to be serviced for the mobile sales force. In order to provide complete network access to the mobile workforce the use of IPSec with L2TP, ESP, AH, using SHA-256, RSA2048 and AES256 is recommended over a UDP transport. Each branch office and the central office will require a point of presence to the Internet along with a local loop that provides enough bandwidth to accommodate the office demands. In order to keep cost to a minimum, it is recommended that SDSL be used at each branch…

    • 178 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IT302 Assignment 5.1

    • 308 Words
    • 2 Pages

    g. What is the ability to respond to multiple IPs or names as if the server were multiple servers called?…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 18

    • 490 Words
    • 3 Pages

    In this exercise, you will create a connection that enables the workstation to connect to your server using virtual private networking.…

    • 490 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The Remote Access will provide the Virtual Private Networks with services that the users can use to access the corporate networks over the Internet as it they were directly connected. This remote access will enable the remote…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    a. IP Stateful firewall inspection takes place in layer 4, when traffic attempts to traverse the firewall a requested a source port and a destination port pair become part of the session allowing the source to receive information. Stateful inspection firewalls solve the vulnerability of permitting all the high numbered…

    • 928 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Server Configuraton Notes

    • 823 Words
    • 4 Pages

    Overview In this exercise, install the roles and features you will need to complete the exercises in this lab.…

    • 823 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IP addressing scenario

    • 333 Words
    • 1 Page

    When is it worth setting up a DHCP server for your office and how many computers would you say is the minimum amount that really justifies the work of setting up the server? Let’s first explore what DHCP is so we can understand what it does and can accurately answer the question at hand.…

    • 333 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    DNS Basic Use Cases

    • 1051 Words
    • 5 Pages

    DNSX caches authoritative zones in memory via zone transfers and notifies. This is as a faster alternative to load-balancing and is the preferred method of authoritative offloading when the DNS admin has access to zone transfers.…

    • 1051 Words
    • 5 Pages
    Good Essays
  • Good Essays

    by Max Charieff Clearly describe the purpose and architecture of the Domain Name Service (DNS). Your answer should:    Discuss the structure of the name space, and how this is reflected in the organisation of the domain name database. Describe the functionalities of the various types of DNS server, and Illustrate at least one example of an iterative query and at least one example of a recursive query.…

    • 392 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    You may re-use this information (excluding logos) free of charge in any format or medium, under…

    • 2609 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    Abstract: The Internet is developing rapidly in recent years, but it also brings us many problems like network violence. It seems that the real name system is an ideal method to solve the problems and maintain the social stability. However, the failure of network real-name system in South Korea shows that the real-name system limits the freedom of speech and increases the risk of leaking personal information.…

    • 1218 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Ip Configuring

    • 327 Words
    • 2 Pages

    1. access-list remark == NAT Network == - This command remarks a already made access list for permit deny access.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IP Addressing

    • 301 Words
    • 2 Pages

    When designing the data closet should be located in a non-centralized location but still have easy access for services and upgrades or repairs. I would consider using a class b network set up which would easily allow 145 users, computers or equipment to connect but still provide additional addresses and networks as the company expands within the next two years.…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    DNS lookup

    • 483 Words
    • 2 Pages

    Through a large-scale study involving more than 10,000 hosts across nearly 100 countries, Fabián Bustamante, associate professor of electrical engineering and computer science at Northwestern's McCormick School of Engineering and Applied Science, and his team found that one cause of slow web performance is a growing trend toward public Domain Name Systems (DNS), a form of database that translates Internet domain and host names into Internet Protocol (IP) addresses.…

    • 483 Words
    • 2 Pages
    Good Essays