20 Questions
Which attack involves changing DNS records on a DNS server or DNS cache server to redirect network traffic from a legitimate web server to a malicious website?
DNS Cache-poisoning attack
Which attack aims to overload the network with a high volume of traffic in order to exhaust computer resources?
DNS flood attack
Which protocol is vulnerable to IP Spoofing attack and Fragmentation attack?
IP
Which attack aims to modify data or create a false stream, such as masquerade, replay, modification of messages, man-in-the-middle (MITM), and DoS/DDoS?
Active attack
Which attack attempts to learn or make use of information from the system but does not affect system resources?
Passive attack
Which attack involves changing DNS records on a DNS server or DNS cache server to redirect network traffic from a legitimate web server to a malicious website?
DNS Cache-poisoning attack
Which attack aims to overload the network with a high volume of traffic in order to exhaust computer resources?
DNS flood attack
Which protocol is vulnerable to IP Spoofing attack and Fragmentation attack?
IP
Which attack aims to modify data or create a false stream, such as masquerade, replay, modification of messages, man-in-the-middle (MITM), and DoS/DDoS?
Active attack
Which attack attempts to learn or make use of information from the system but does not affect system resources?
Passive attack
Which of the following best describes the purpose of DNS?
To convert human readable names into IP addresses
What is DNS commonly used for?
All of the above
What type of response is resolved from the authoritative DNS server for the queried domain name?
Authoritative response
When using a PC from QUT's computer lab and entering http://library.qut.edu.au in the web browser, which DNS server does the DNS client service contact?
QUT's DNS server
What is the purpose of caching query results on the local DNS server?
To improve DNS performance
Which server does the DNS client query when trying to resolve a domain name with the .com top-level domain?
Com TLD server
What does the DNS client receive when the query is resolved from the authoritative DNS server?
Authoritative response
What is the purpose of the DNS zone?
To store computer names and their IP addresses
Which of the following is a vulnerability/threat in the DNS scheme?
All of the above
Which protocol is vulnerable to IP Spoofing attack and Fragmentation attack?
ICMP
Test your knowledge on DNS (Domain Name System) and its role in converting human readable names into IP addresses on a network. Learn how DNS functions as a directory service, similar to a phone book, and allows users to use computer names instead of IP addresses. Explore the applications that rely on DNS for name-to-address resolution.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free