DNS Fundamentals Quiz
20 Questions
9 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which attack involves changing DNS records on a DNS server or DNS cache server to redirect network traffic from a legitimate web server to a malicious website?

  • IP Spoofing attack
  • ARP Cache-poisoning attack
  • DNS flood attack
  • DNS Cache-poisoning attack (correct)
  • Which attack aims to overload the network with a high volume of traffic in order to exhaust computer resources?

  • DNS Cache-poisoning attack
  • ARP Cache-poisoning attack
  • IP Spoofing attack
  • DNS flood attack (correct)
  • Which protocol is vulnerable to IP Spoofing attack and Fragmentation attack?

  • TCP
  • ICMP
  • ARP
  • IP (correct)
  • Which attack aims to modify data or create a false stream, such as masquerade, replay, modification of messages, man-in-the-middle (MITM), and DoS/DDoS?

    <p>Active attack</p> Signup and view all the answers

    Which attack attempts to learn or make use of information from the system but does not affect system resources?

    <p>Passive attack</p> Signup and view all the answers

    Which attack involves changing DNS records on a DNS server or DNS cache server to redirect network traffic from a legitimate web server to a malicious website?

    <p>DNS Cache-poisoning attack</p> Signup and view all the answers

    Which attack aims to overload the network with a high volume of traffic in order to exhaust computer resources?

    <p>DNS flood attack</p> Signup and view all the answers

    Which protocol is vulnerable to IP Spoofing attack and Fragmentation attack?

    <p>IP</p> Signup and view all the answers

    Which attack aims to modify data or create a false stream, such as masquerade, replay, modification of messages, man-in-the-middle (MITM), and DoS/DDoS?

    <p>Active attack</p> Signup and view all the answers

    Which attack attempts to learn or make use of information from the system but does not affect system resources?

    <p>Passive attack</p> Signup and view all the answers

    Which of the following best describes the purpose of DNS?

    <p>To convert human readable names into IP addresses</p> Signup and view all the answers

    What is DNS commonly used for?

    <p>All of the above</p> Signup and view all the answers

    What type of response is resolved from the authoritative DNS server for the queried domain name?

    <p>Authoritative response</p> Signup and view all the answers

    When using a PC from QUT's computer lab and entering http://library.qut.edu.au in the web browser, which DNS server does the DNS client service contact?

    <p>QUT's DNS server</p> Signup and view all the answers

    What is the purpose of caching query results on the local DNS server?

    <p>To improve DNS performance</p> Signup and view all the answers

    Which server does the DNS client query when trying to resolve a domain name with the .com top-level domain?

    <p>Com TLD server</p> Signup and view all the answers

    What does the DNS client receive when the query is resolved from the authoritative DNS server?

    <p>Authoritative response</p> Signup and view all the answers

    What is the purpose of the DNS zone?

    <p>To store computer names and their IP addresses</p> Signup and view all the answers

    Which of the following is a vulnerability/threat in the DNS scheme?

    <p>All of the above</p> Signup and view all the answers

    Which protocol is vulnerable to IP Spoofing attack and Fragmentation attack?

    <p>ICMP</p> Signup and view all the answers

    Study Notes

    Types of Cyber Attacks

    • DNS Spoofing involves altering DNS records on a server or cache to divert traffic from a legitimate site to a malicious one.
    • Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks aim to overwhelm networks with excessive traffic, draining resources and disrupting services.
    • Protocols susceptible to IP Spoofing and Fragmentation attacks include various network protocols, particularly those that handle packets without proper source validation.
    • Data Modification Attacks encompass activities like masquerading, replaying messages, altering data, man-in-the-middle (MITM) methods, and DoS/DDoS strategies, all aimed at falsifying data streams.
    • Information Gathering Attacks seek to extract useful information from systems without impacting resource availability.

    Domain Name System (DNS) Overview

    • The primary purpose of DNS is to translate user-friendly domain names into IP addresses, enabling user access to online content.
    • DNS is commonly utilized for resolving domain names into their respective IP addresses for web services.
    • An authoritative DNS server provides comprehensive answers for queries related to its specific domain, returning resolved response data.
    • When accessing a URL, such as http://library.qut.edu.au, the DNS client contacts the local DNS server or the one assigned by the network.
    • Caching query results on local DNS servers improves efficiency by storing previous responses, reducing resolution time for repeated queries.
    • Queries for domain names under the .com top-level domain are typically resolved by the DNS client querying the central root DNS servers and subsequently reaching the authoritative server for .com.
    • Upon resolution from the authoritative DNS server, the DNS client receives the corresponding IP address for the queried domain.
    • DNS zones serve as distinct sections within the DNS namespace, allowing for the management of DNS records and delegation of authority over subdomains.

    DNS Vulnerabilities

    • The DNS system is susceptible to various threats and vulnerabilities, such as cache poisoning and DNS spoofing attacks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on DNS (Domain Name System) and its role in converting human readable names into IP addresses on a network. Learn how DNS functions as a directory service, similar to a phone book, and allows users to use computer names instead of IP addresses. Explore the applications that rely on DNS for name-to-address resolution.

    More Like This

    Use Quizgecko on...
    Browser
    Browser