DNS Fundamentals Quiz

UndauntedRetinalite avatar
By UndauntedRetinalite

Quiz

Flashcards

20 Questions

Which attack involves changing DNS records on a DNS server or DNS cache server to redirect network traffic from a legitimate web server to a malicious website?

Which attack aims to overload the network with a high volume of traffic in order to exhaust computer resources?

Which protocol is vulnerable to IP Spoofing attack and Fragmentation attack?

Which attack aims to modify data or create a false stream, such as masquerade, replay, modification of messages, man-in-the-middle (MITM), and DoS/DDoS?

Which attack attempts to learn or make use of information from the system but does not affect system resources?

Which attack involves changing DNS records on a DNS server or DNS cache server to redirect network traffic from a legitimate web server to a malicious website?

Which attack aims to overload the network with a high volume of traffic in order to exhaust computer resources?

Which protocol is vulnerable to IP Spoofing attack and Fragmentation attack?

Which attack aims to modify data or create a false stream, such as masquerade, replay, modification of messages, man-in-the-middle (MITM), and DoS/DDoS?

Which attack attempts to learn or make use of information from the system but does not affect system resources?

Which of the following best describes the purpose of DNS?

What is DNS commonly used for?

What type of response is resolved from the authoritative DNS server for the queried domain name?

When using a PC from QUT's computer lab and entering http://library.qut.edu.au in the web browser, which DNS server does the DNS client service contact?

What is the purpose of caching query results on the local DNS server?

Which server does the DNS client query when trying to resolve a domain name with the .com top-level domain?

What does the DNS client receive when the query is resolved from the authoritative DNS server?

What is the purpose of the DNS zone?

Which of the following is a vulnerability/threat in the DNS scheme?

Which protocol is vulnerable to IP Spoofing attack and Fragmentation attack?

Description

Test your knowledge on DNS (Domain Name System) and its role in converting human readable names into IP addresses on a network. Learn how DNS functions as a directory service, similar to a phone book, and allows users to use computer names instead of IP addresses. Explore the applications that rely on DNS for name-to-address resolution.

Make Your Own Quiz

Transform your notes into a shareable quiz, with AI.

Get started for free

More Quizzes Like This