Lesson 6
Lesson 6
The remaining ports (up to 65,535) are designated for private or dynamic
use. As well as the server application needing a port, each client application
must assign its own port number to track its requests. Client ports are also
referred to as ephemeral ports or source ports.
The port number is used in conjunction with the source IP address to form
a socket. Each socket is bound to a software process. Only one process can
operate a socket at any one time. A connection is formed when a client
socket requests a service from the server socket. A connection is uniquely
identified by the combination of server port plus IP address and client port
plus IP address. A server socket can therefore support multiple connections
from a number of client sockets.
Description
TCP takes data from the Application layer as a stream of bytes and divides it
up into segments, each of which is given a header. The TCP segments
become the payload of the underlying IP datagrams. The use of sequencing,
acknowledgments, and retransmissions means that TCP requires numerous
header fields to maintain state information. The main fields in the header of
a TCP segment are the following:
Field Explanation
Urgent Pointer If urgent data is being sent, this specifies the end of
that data in the segment.
Description
Observing the three-way handshake with the Wireshark protocol analyzer.
(Screenshot courtesy of Wireshark.)
1. The client sends a segment with the TCP flag SYN set to the server with
a randomly generated sequence number. The client enters the SYN-
SENT state.
3. The client responds with an ACK segment. The client assumes the
connection is ESTABLISHED.
4. The server opens a connection with the client and enters the
ESTABLISHED state.
There are also functions for resetting a connection and (in some
implementations) keeping a connection alive if no actual data is being
transmitted (hosts are configured to time out unused connections). To close a
connection, also referred to as teardown, the following basic steps are
performed:
1. The client sends a FIN segment to the server and enters the FIN-WAIT1
state.
2. The server responds with an ACK segment and enters the CLOSE-WAIT
state.
3. The client receives the ACK segment and enters the FIN-WAIT2 state.
The server sends its own FIN segment to the client and goes to the
LAST-ACK state.
4. The client responds with an ACK and enters the TIME-WAIT state. After
a defined period, the client closes its connection.
5. The server closes the connection when it receives the ACK from the
client.
Some implementations may use one less step by combining the FIN and ACK
responses into a single segment operation.
Description
Observing TCP connections with the netstat tool. (Screenshot used with
permission from Microsoft.)
A host can also end a session abruptly using a reset (RST) segment. This
would not be typical behavior and might need to be investigated. A server or
security appliance might refuse connections using RST, a client or server
application might be faulty, or there could be some sort of suspicious
scanning activity ongoing.
UDP is suitable for applications that send small amounts of data in each
packet and do not require acknowledgment of receipt. It is used by
Application layer protocols that need to send multicast or broadcast traffic. It
may also be used for applications that transfer time-sensitive data but do not
require complete reliability, such as voice or video. Using small packets
means that if a few are lost or arrive out of order, they only manifest as
minor glitches in playback quality. The reduced overhead means that overall
delivery is faster.
Field Explanation
The header size is 8 bytes, compared to 20 bytes (or more) for TCP.
6.1.5netstat
The netstat command allows you to check the state of ports on the local
host. You can use netstat to check for service misconfigurations, such as a
host running a web or FTP server that a user installed without authorization.
You may also be able to identify suspicious remote connections to services
on the local host or from the host to remote IP addresses.
Description
Linux netstat output showing active and listening TCP and UDP connections.
The Linux netstat command is part of the deprecated net-tools package. The
preferred package iproute2 contains a number of different commands to
replace netstat functionality. Most of the port scanning functions are
performed by ss, while interface statistics are reported by nstat.
Score: 86%
Task Summary
Your answer:192.168.0.45
Correct answer:192.168.0.45
Your answer:0x002
Correct answer:0x002
Q3Which computer (ip address) is the sender of the [ACK, SYN] packet?
Your answer:192.168.0.16
Correct answer:192.168.0.16
Q4What is the destination port for the [ACK, SYN] packet in Wireshark?
Your answer:5049
Correct answer:5049
Correct answer:192.168.0.45
Your answer:2
Correct answer:2
Explanation
e. Wait about 5 seconds, then select the red square to stop the
Wireshark capture.
2. Apply a filter for tcp traffic from the computer at 192.168.0.45 and
examine a [SYN] packet.
Score: 100%
Task Summary
Required Actions
Uninstall VNC
Explanation
IP Comput
Address er
192.168.0.
Exec
30
192.168.0.
ITAdmin
31
192.168.0.
Gst-Lap
32
192.168.0.
Office1
33
192.168.0.
Office2
34
192.168.0.
IT-Laptop
46
192.168.0.
Support
47
c. Select Scan.
d. From the results, find the computer with port 5900 open.
e. Type dnf list vnc and press Enter to find the package name.
3. Type netstat -l and press Enter to confirm that the port has been
closed on the machine.
print
close modal
Score: 93%
Question 1.
Correct
answer
Correct Answer:
By the combination of server port and IP address and client port and IP
address
Explanation
By the server port and IP address only or the client port and IP address only
are incorrect because both the server and client port and IP addresses are
needed to uniquely identify a connection.
MAC addresses identify devices at the Data Link layer, not connections at the
Transport layer.
References
Question 2.
Correct
answer
Correct Answer:
Explanation
Port numbers, when used with IP addresses, play a crucial role in ensuring
that data packets are directed to the correct service or application on a host,
facilitating the multiplexing of network communications.
Port numbers are essential for identifying services and applications in TCP/IP
networking.
Port numbers are not used for encryption but for directing traffic to specific
services or applications.
References
resources\text\t_transport_n09\
q_transport_port_number_use_n09.question.xml
Question 3.
Correct
answer
Correct Answer:
Explanation
A socket does not encrypt data; it's used for identifying connections.
A socket does not act as a firewall; it's used for identifying and managing
connections.
References
resources\text\t_transport_n09\
q_transport_socket_purpose_n09.question.xml
Question 4.
Correct
What does TCP use to divide data from the Application layer?
answer
Packets
Bits
Frames
Correct Answer:
Segments
Explanation
TCP divides the continuous stream of bytes received from the Application
Layer into manageable pieces called segments. Each segment is then given
a header that includes control information.
Frames are used in the Data Link Layer to encapsulate packets for
transmission over physical media. TCP operates at the Transport Layer and
uses segments to encapsulate data.
Packets are the primary unit of data used in the Network Layer. TCP divides
application data into segments, which are encapsulated within IP packets for
transmission.
Bits are the smallest unit of digital data but do not specifically refer to the
method TCP uses to divide application data. TCP segments are composed of
many bits but are a higher-level concept.
References
resources\text\t_tcp_n09\q_tcp_segments_n09.question.xml
Question 5.
Correct
What layer of the OSI model does the Transmission Control Protocol (TCP)
operate at?
answer
Network Layer
Application Layer
Correct Answer:
Transport Layer
Explanation
The Network Layer is primarily concerned with the routing of packets across
different networks. TCP operates at a higher layer, focusing on the
communication between end systems rather than the routing of packets.
The Data Link Layer is responsible for node-to-node data transfer and error
checking of data between two directly connected nodes. TCP operates at a
higher layer, providing host-to-host communication services.
References
resources\text\t_tcp_n09\q_tcp_transport_layer_n09.question.xml
Question 6.
Correct
What might cause a host to send a reset (RST) segment during a TCP
session?
answer
Correct Answer:
A reset (RST) segment is sent to abruptly end a TCP session, which can be
due to various reasons, such as security measures or application faults.
Establishing a new TCP connection uses the SYN flag, not RST.
Receiving an ACK for an unexpected segment might cause confusion, but the
typical response would not be to send an RST segment; the host might
simply ignore the ACK or resend segments as needed.
References
resources\text\t_handshake_n09\q_handshake_rst_purpose_n09.question.xml
Question 7.
Correct
Which TCP flag is used by both the client and server to indicate that they
want to close the connection?
answer
ACK
RST
Correct Answer:
FIN
SYN
Explanation
The FIN flag is used by both the client and server to indicate their intention
to close the connection, initiating the TCP connection teardown process.
The ACK flag is used to acknowledge the receipt of segments, not to indicate
the desire to close the connection.
The SYN flag is used to initiate a connection, not to close it.
The RST flag is used to abruptly reset a connection, not for the orderly
closure of a connection.
References
resources\text\t_handshake_n09\q_handshake_tcp_flag_fin_n09.question.xml
Question 8.
Correct
Which TCP flag is set by the client to initiate the three-way handshake?
answer
Correct Answer:
SYN
RST
FIN
ACK
Explanation
The SYN flag is used by the client to initiate the TCP three-way handshake,
signaling the server that it wants to establish a connection.
The ACK flag is used to acknowledge the receipt of packets, including the
SYN and SYN/ACK packets during the handshake, but it is not used to initiate
the handshake.
The FIN flag is used to initiate the closing of a TCP connection, not to start it.
The RST flag is used to abruptly reset a connection, not to initiate the three-
way handshake.
References
resources\text\t_handshake_n09\q_handshake_three-
way_initiate_syn_n09.question.xml
Question 9.
Correct
answer
Correct Answer:
Explanation
UDP does not guarantee delivery, making it unsuitable for applications that
cannot tolerate data loss.
UDP is better suited for applications that send small amounts of data due to
its simplicity and lower overhead.
UDP does not provide built-in error checking and correction mechanisms,
which are features of TCP.
References
resources\text\t_datagram_n09\
q_datagram_small_amounts_of_data_n09.question.xml
Question 10.
Correct
answer
-n
-p
-a
Correct Answer:
-4 or -6
Explanation
On Linux, the -4 and -6 switches with netstat are used to filter the output for
IPv4 and IPv6 addresses respectively, allowing for targeted analysis of
network connections based on IP version.
The -a switch displays all connections and listening ports, without filtering by
IP version.
The -n switch shows numerical addresses but does not filter by IP version.
On Linux, the -p switch shows the PID and process name associated with
each connection, not IP version filtering.
References
o 6.1.5 netstat
resources\text\t_netstat_n09\q_netstat_4_or_6_switch_n09.question.xml
Question 11.
Correct
Which command would you use to show listening and established Internet
connections (TCP and UDP) only?
answer
netstat -o
Correct Answer:
netstat -tua
netstat -e
netstat -s
Explanation
The command netstat -tua is specifically designed to show both listening and
established Internet connections (TCP and UDP), providing a focused view of
network activity.
The -s switch reports detailed statistics for each protocol, not specifically
listening and established connections.
On Windows, the -o switch shows the PID that has opened each port, not the
type of connections.
References
o 6.1.5 netstat
resources\text\t_netstat_n09\q_netstat_netstat_tua_n09.question.xml
Question 12.
Correct
Which command can you use to check the state of ports on your computer?
answer
arp
ipconfig
Correct Answer:
netstat
ping
Explanation
Hosts use arp to discover a device's MAC address from its IP address.
References
o 6.1.5 netstat
resources\text\t_netstat_n09\q_netstat_state_of_ports_n09.question.xml
Question 13.
Correct
Which of the following ports are you MOST likely to open on the firewall?
answer
80
119
110
Correct Answer:
123
Explanation
TCP/IP port 123 is assigned to Network Time Protocol (NTP). NTP is used to
communicate time synchronization information between systems on a
network.
HyperText Transfer Protocol (HTTP) uses TCP/IP port 80. HTTP is the protocol
used to send requests to a web server and retrieve web pages from the web
server.
TCP/IP port 119 is used by the Network News Transfer Protocol (NNTP). NNTP
is used to access and retrieve messages from newsgroups.
TCP/IP port 110 is used by Post Office Protocol version 3 (POP3). POP3 is used
to download email from mail servers.
References
resources\text\t_common_tcp_n09\q_common_tcp_123_n09.question.xml
Question 14.
Correct
answer
UDP 161
Correct Answer:
TCP 143
Correct Answer:
TCP 25
TCP 123
Explanation
TCP 143 is Internet Message Access Protocol (IMAP) traffic which would also
be email traffic, and the administrator should include it as well.
User Datagram Protocol (UDP) 161 is used for simple network management
protocol (SNMP). UDP 161 is considered to be a common port, but is NOT
used for email traffic.
TCP 123 is not a common protocol. UDP 123 is Network Time Protocol/Simple
NTP. This allows hosts to sync and set a common time, which is especially
important for security.
References
resources\text\t_common_tcp_n09\q_common_tcp_25_143_n09.question.xml
Question 15.
Incorrect
Which protocols and port numbers are used by DHCP? (Select two.)
answer
TCP 69
TCP 123
UDP 123
Correct Answer:
UDP 67
Incorrect answer:
UDP 69
Correct Answer:
TCP 67
Explanation
Dynamic Host Configuration Protocol (DHCP) uses port 67 for both TCP and
UDP.
TFTP uses UDP port 69, and NTP uses UDP port 123.
References
resources\text\t_common_tcp_n09\q_common_tcp_dhcp_n09.question.xml
Description
4. Assuming the offer is still available, the server will respond with a
DHCPACK packet. The client broadcasts an ARP message to check that
the address is unused. If so, it will start to use the address and options;
if not, it declines the address and requests a new one.
The IP address is leased by the server for a limited period only. A client can
attempt to renew or rebind the lease before it expires. If the lease cannot be
renewed, the client must release the IP address and start the discovery
process again.
Sometimes, the DHCP lease process is called the DORA process: Discover,
Offer, Request, and Ack(nowledge).
The multifunction device shown only supports a single scope. The DHCP
server must be placed in the same subnet as its clients. More advanced
DHCP servers might be configured to manage multiple scopes. Where a
server provides IP configuration for multiple subnets/scopes, it must choose
the pool to service each request based on the subnet from which the request
originated.
The client can renew the lease when at least half the lease's period has
elapsed (T1 timer) so that it keeps the same IP addressing information. If the
original DHCP server does not respond to the request to renew the lease, the
client attempts to rebind the same lease configuration with any available
DHCP server. By default, this happens after 87.5% of the lease duration is up
(T2 timer). If this fails, the client releases the IP address and continues to
broadcast to discover a server.
A long lease time means the client does not have to renew the lease often,
but the DHCP server's available pool of IP addresses is not replenished
frequently. Where IP addresses are in short supply, a short lease period
enables the DHCP server to allocate addresses previously assigned to hosts
that are now not active on the network.
DHCP Options
The IP address(es) of DNS servers that can act as resolvers for name
queries.
Score: 100%
Task Summary
Required Actions
Configure the laptop in the support office to obtain IP and DNS addresses
automatically from the DHCP server
Explanation
Complete this lab as follows:
b. Expand CorpDHCP.CorpNet.local.
d. Select Ethernet.
Score: 67%
Task Summary
Required Actions
Configure the 006 DNS Servers options on the server as 192.168.0.11 and
192.168.10.11
Configure the 015 DNS Domain Name option on the server as CorpNet.local
Explanation
i. From the top pane, scroll down and select 015 DNS Domain
Name.
Score: 100%
Task Summary
Required Actions
Explanation
g. Select Add.
These addresses are from one of the address ranges reserved for private
addressing (169.254.0.0/16). The first and last subnets are supposed to be
unused.
IPv4 has a system for generating link local addresses, but these are not
routable outside the local network. Consequently, IPv4 depends heavily on
the Dynamic Host Configuration Protocol (DHCP) for address
autoconfiguration. IPv6 uses a more flexible system of address
autoconfiguration called stateless address autoconfiguration (SLAAC):
The host generates a link local address and uses Neighbor Discovery
(ND) messages to test that it is unique.
ICMPv6
IPv6 uses an updated version of ICMP. The key new features are the
following:
By contrast, stateful mode means that a host can also obtain a routable IP
address from a DHCPv6 scope. In either mode, a DHCPv6 server can be used
to supply options information, such as DNS server addresses, DNS
suffix/domain lists, time servers, and so on.
Description
Configuring the scope requires you to define the network prefix and then any
IP addresses that are to be excluded from being offered. All other addresses
that are not explicitly excluded can be offered. The host must still listen for a
router advertisement to obtain the network prefix and configure a default
gateway. There is no mechanism in DHCPv6 for setting the default route.
close modal
Question 1.
Correct
What does the client do to ensure the offered IP address is not already in
use?
answer
Correct Answer:
Explanation
References
resources\text\t_dhcp_overview_n09\
q_dhcp_overview_arp_message_broadcast_n09.question.xml
Question 2.
Correct
answer
Correct Answer:
DHCP server
Gateway
Router
DNS server
Explanation
Use a DNS server to provide name resolution (for example, to get the IP
address associated with a logical hostname).
References
resources\text\t_dhcp_overview_n09\
q_dhcp_overview_example_n09.question.xml
Question 3.
Correct
answer
DHCPOFFER
Correct Answer:
DHCPDISCOVER
DHCPACK
DHCPREQUEST
Explanation
The first step in the DHCP lease process is the DHCPDISCOVER message,
where the client broadcasts to find a DHCP server.
References
Question 4.
Correct
Why must a DHCP server be placed in the same subnet as its clients?
answer
Correct Answer:
Explanation
While important, reducing network latency is not the primary reason for
placing a DHCP server in the same subnet.
References
resources\text\t_dhcp_config_n09\
q_dhcp_config_same_subnet_n09.question.xml
Question 5.
Correct
answer
Correct Answer:
Explanation
A scope is essential for defining the range of IP addresses that the DHCP
server can assign within a specific subnet, along with other configuration
options.
A tool for monitoring network traffic does not relate to DHCP scopes, which
are about IP address allocation.
A set of rules for filtering packets is more akin to firewall functionality, not
DHCP scope configuration.
The physical range a wireless DHCP server can cover refers to the signal
coverage of a wireless access point, not a DHCP scope.
References
resources\text\t_dhcp_config_n09\
q_dhcp_config_scope_role_n09.question.xml
Question 6.
Correct
answer
Correct Answer:
Explanation
While DHCP servers can serve multiple subnets, this is achieved through
relay agents, not through the configuration of a single range.
References
resources\text\t_dhcp_config_n09\
q_dhcp_config_subnet_masks_n09.question.xml
Question 7.
Correct
Which DHCP option specifies the IP address of the router?
answer
DNS servers
Correct Answer:
Default gateway
DNS suffix
NTP servers
Explanation
The default gateway option in DHCP specifies the router's IP address, guiding
clients on how to send traffic to destinations outside their local network.
DNS servers specify the IP addresses of DNS servers, not the default
gateway.
The DNS suffix provides the domain name for DNS resolution, unrelated to
routing.
NTP servers specify servers for time synchronization, not network routing.
References
resources\text\t_dhcp_options_n09\
q_dhcp_options_default_gateway_n09.question.xml
Question 8.
Correct
answer
Decreases network security
Correct Answer:
Explanation
A long lease time reduces the frequency at which IP addresses are returned
to the pool for reallocation, potentially leading to shortages in environments
with limited IP addresses.
A long lease time means renewals are less frequent, not more.
References
resources\text\t_dhcp_options_n09\
q_dhcp_options_long_lease_time_n09.question.xml
Question 9.
Correct
answer
Correct Answer:
Explanation
The T1 timer is set to 50% of the lease time. When it expires, it signals the
client to start the process of renewing its lease to maintain its current IP
configuration. This ensures network stability and continuity.
The maximum lease time is defined by the lease duration itself, not the T1
timer.
The lease expiration is determined by the lease duration, not the T1 timer.
The T1 timer is related to lease renewal, not the frequency of server updates.
References
resources\text\t_dhcp_options_n09\
q_dhcp_options_t1_timer_n09.question.xml
Question 10.
Correct
answer
Correct Answer:
Create reservations.
Configure scopes.
Explanation
References
resources\text\t_dhcp_reserves_n09\
q_dhcp_reserves_example_n09.question.xml
close modal
Candidate: Catalina Adams (mar2492014)
Score: 100%
Question 1.
Correct
What happens if a Windows host does not receive a response from a DHCP
server within a given time frame?
answer
Correct Answer:
Explanation
If a Windows host does not receive a DHCP offer within a certain time frame,
it will automatically select an IP address from the APIPA range (169.254.1.1
to 169.254.254.254). This allows the host to continue communicating on the
local network despite the absence of DHCP server communication.
The host does not shut down; it seeks an alternative method to configure its
IP address.
While users can manually enter an IP address, this is not the automatic
response when a DHCP server cannot be contacted.
References
resources\text\t_apipa_n09\q_apipa_dhcp_response_n09.question.xml
Question 2.
Correct
answer
Correct Answer:
Explanation
RAs are not involved in encrypting data packets; they are used for network
configuration.
RAs do not assign static IP addresses; they provide information for automatic
configuration.
References
resources\text\t_apipa6_n09\q_apipa6_ra_role_n09.question.xml
Question 3.
Correct
answer
Prefix discovery
Correct Answer:
Redirection
Address autoconfiguration
Explanation
References
o 4.5.5 IPv6 Link Local Addressing
resources\text\t_apipa6_n09\q_apipa6_redirection_purpose_n09.question.xml
Question 4.
Correct
answer
DHCPv6
Manual configuration
ARP
Correct Answer:
SLAAC
Explanation
ARP is used in IPv4 for address resolution and does not apply to IPv6 link-
local address generation.
References
resources\text\t_apipa6_n09\q_apipa6_slaac_definition_n09.question.xml
Question 5.
Correct
answer
Correct Answer:
Explanation
The SLAAC process, not the DHCPv6 server, locates the default gateway.
Host addresses with suitable network prefixes are generated by the SLAAC
process, not the DHCPv6 server.
IPv6 does not support broadcast; it uses multicast for DHCP server discovery.
References
resources\text\t_dhcpv6_n09\q_dhcpv6_primary_role_n09.question.xml
The DHCP relay intercepts broadcast DHCP frames, applies a unicast address
for the appropriate DHCP server, and forwards them over the interface for
the subnet containing the server. The DHCP server can identify the original IP
subnet from the packet and offer a lease from the appropriate scope. The
DHCP relay also performs the reverse process of directing responses from the
server to the appropriate client subnet.
Description
interface eth1
ip helper-address 10.1.0.200
interface eth2
ip helper-address 10.1.0.200
6.4.2DHCP Issues
A Windows host that is configured to use dynamic addressing but that fails to
obtain a lease will revert to an automatic IP address (APIPA) configuration
and select an address in the 169.254.0.0/16 range. Linux might use link local
addressing, set the address to unknown (0.0.0.0), or leave the interface
unconfigured.
Possible reasons for a client to fail to obtain a lease include the following:
The DHCP server is offline. If your DHCP servers go offline, users will
continue to connect to the network for a period and thereafter start to
lose contact with network services and servers as they come to try to
renew a lease.
The router between the client and DHCP server doesn't support BOOTP
forwarding. Either install RFC 1542-compliant routers or add another
type of DHCP relay agent to each subnet or VLAN.
If you reconfigure your DHCP servers and their scopes, you will need to plan
for the fact that not all clients' IP configurations will be updated when the
server scopes are edited and could be left with an expired IP, default
gateway, or DNS server address. You can mitigate this by lowering the lease
duration in advance of changes, forcing all clients to renew, or running
parallel settings for a period.
close modal
Score: 100%
Question 1.
Correct
answer
Correct Answer:
Explanation
RFC 1542 compliance means a router can act as a DHCP relay agent,
forwarding DHCP requests and responses between clients and servers in
different subnets, which is crucial for network efficiency and scalability.
References
resources\text\t_dhcp_relay_n09\
q_dhcp_relay_1542_compliant_n09.question.xml
Question 2.
Correct
answer
Correct Answer:
Explanation
Security is a concern in network design, but the primary reason for not
forwarding broadcast traffic is to prevent congestion.
References
resources\text\t_dhcp_relay_n09\q_dhcp_relay_routers_n09.question.xml
Question 3.
Correct
answer
Correct Answer:
Explanation
The correct answer is to directly communicate with the DHCP server without
broadcasting. By converting broadcast DHCP requests into unicast frames
directed to the DHCP server's IP address, DHCP relays facilitate efficient
communication between clients and servers across different subnets.
DHCP frames are not assigned IP addresses; they are forwarded to obtain
them from a DHCP server.
References
Question 4.
Correct
answer
Correct Answer:
Explanation
Frequent IP address changes are more likely due to short lease times or
network configuration issues, not necessarily a malicious attack.
References
resources\text\t_dhcp_issues_n09\
q_dhcp_issues_address_exhaustion_n09.question.xml
Question 5.
Correct
answer
Correct Answer:
Explanation
Lowering the lease duration before making changes to DHCP server scopes
forces all clients to renew their leases more frequently. This ensures that
clients' IP configurations are updated more quickly once the changes are
made, minimizing potential connectivity issues.
Increasing the lease duration would delay clients from obtaining updated IP
configurations after the server scopes are edited.
Disabling the DHCP server temporarily would prevent all clients from
obtaining or renewing IP leases, causing network connectivity issues.
While informing users about changes is good practice, it does not technically
facilitate the update of clients' IP configurations in response to DHCP scope
changes.
References
resources\text\t_dhcp_issues_n09\
q_dhcp_issues_lower_lease_duration_n09.question.xml
When you are configuring name records, an FQDN must include the trailing
period to represent the root, but this can be omitted in most other use cases.
Numerous hosts may exist within a single domain. For example: nut, bolt,
and washer might all be hosts within the widget.example. domain. Given
that, FQDNs must follow certain rules:
The total length of an FQDN cannot exceed 253 characters, with each
label (part of the name defined by a period) no more than 63
characters (excluding the periods).
A DNS label should use letter, digit, and hyphen characters only. A
label should not start with a hyphen. Punctuation characters such as
the period (.) or forward slash (/) should not be used.
6.5.2DNS Hierarchy
Immediately below the root lie the top-level domains (TLDs). There are
several types of top-level domains, but the most prevalent are generic (such
as .com, .org, .net, .info, .biz), sponsored (such as .gov, .edu), and country
code (such as .uk, .ca, .de). DNS is operated by ICANN (icann.org), which also
manages the generic TLDs. Country codes are generally managed by an
organization appointed by the relevant government.
Information about a domain is found by tracing records from the root down
through the hierarchy. The root DNS servers have complete information
about the top-level domain servers. In turn, these servers have information
relating to servers for the second level domains. No name server has
complete information about all domains. Records within the DNS tell them
where an authoritative name server for the missing information is found.
Description
An FQDN reflects this hierarchy, from most specific on the left (the host's
resource record with its name:IP address mapping) to least specific on the
right (the TLD followed by the root). An example is pc.corp.515support.com.
The signal for the name resolution process to commence occurs when a user
presents an FQDN (often within a web address) to an application program,
such as a web browser. The client application, referred to as a stub resolver,
checks its local cache for the mapping. If no mapping is cached, it forwards
the query to its local name server. The IP addresses of one or more name
servers that can act as resolvers are usually set in the TCP/IP configuration.
The resolution process then takes place as follows:
Description
DNS name servers maintain the DNS namespace in zones. A single zone
namespace might host records for multiple domains. Conversely,
subdomains within a domain might be managed as multiple zones, possibly
hosted on multiple servers.
A DNS zone will contain numerous resource records. These records allow a
DNS name server to resolve queries for names and services hosted in the
domain into IP addresses. Resource records can be created and updated
manually (statically), or they can be generated dynamically from information
received from client and server computers on the network.
Name server (NS) records identify authoritative DNS name servers for the
zone. As well as the primary name server, most zones are configured with
secondary name servers for redundancy and load balancing. Secondary
name servers hold read-only copies of resource records but can still be
authoritative for the zone.
Resource records configured on a BIND DNS server.
Description
Both types of host records (A and AAAA) plus a CNAME record in Windows
Server DNS. (Screenshot courtesy of Microsoft.)
DNS uses the UDP transport protocol over port 53 by default, and UDP has a
maximum packet size of 512 bytes. Due to the larger address sizes of IPv6,
AAAA records can exceed this limit. This can result in UDP packets being
fragmented into several smaller packets. This can result in these packets
being blocked by firewalls if they are not configured to expect them. Network
administrators should check that their DNS servers can accept these
transmissions and that intermediary components are not blocking them.
A canonical name (CNAME) (or alias) record is used to configure an alias for
an existing address record (A or AAAA). For example, the IP address of a web
server with the host record lamp could also be resolved by the alias www.
CNAME records are also often used to make DNS administration easier. For
example, an alias can be redirected to a completely different host
temporarily during system maintenance.
A mail exchange (MX) record is used to identify an email server for the
domain. In a typical network, multiple servers are installed to provide
redundancy, and each one will be represented with an MX record. Each
server record is given a preference value with the lowest numbered entry
preferred. The host identified in an MX record must have an associated A or
AAAA record. An MX record must not point to a CNAME record.
While most DNS records are used to resolve a name into an IP address, a
Service (SRV) record contains the service name and port on which a
particular application is hosted. SRV records are often used to locate VoIP or
media servers. SRV records are also an essential part of the infrastructure
supporting Microsoft’s Active Directory; they are used by clients to locate
domain controllers, for instance. As with MX, SRV records can be configured
with a priority value.
Description
A TXT record is used to store any free-form text that may be needed to
support other network services. A single domain name may have many TXT
records, but most commonly they are used as part of Sender Policy
Framework (SPF) and DomainKeys Identified Mail (DKIM). An SPF record is
used to list the IP addresses or names of servers that are permitted to send
email from a particular domain and is used to combat the sending of spam.
DKIM records are used to decide whether you should allow received email
from a given source, preventing spam and mail spoofing. DKIM can use
encrypted signatures to prove that a message really originated from the
domain it claims.
6.5.7Pointer Records
A DNS server may have two types of zones: forward lookup and reverse
lookup. Forward lookup zones contain the resource records listed previously.
For example, given a name record, a forward lookup returns an IP address;
an MX record returns a host record associated with the domain's mail
services. Conversely, a reverse DNS query returns the host name
associated with a given IP address. This information is stored in a reverse
lookup zone as a pointer (PTR) record.
Description
Reverse DNS querying uses a special domain named by the first three octets
of IP addresses in the zone in reverse order and appended with in-addr.arpa.
The name server is configured with a reverse lookup zone. This zone contains
PTR records consisting of the final octet of each host record. For example,
the reverse lookup for a host record containing the IP address 198.51.100.1
is:
1.100.51.198.in-addr.arpa
IPv6 uses the ip6.arpa domain; each of the 32 hex characters in the IPv6
address is expressed in reverse order as a subdomain. For example, the IPv6
address:
2001:0db8:0000:0000:0bcd:abcd:ef12:1234
4.3.2.1.2.1.f.e.d.c.b.a.d.c.b.0.0.0.0.0.0.0.0.0.8.b.d.0.1.0.0.2.ip6.arpa
DNS is essential to the function of the Internet. Windows Active Directory and
most Linux networks also require a DNS service to be running and correctly
configured. It is important to realize that there are different kinds of DNS
servers however, fulfilling different roles in network architecture.
Primary means that the zone records held on the server are editable. A
zone can be hosted by multiple primary servers for redundancy. As the
zone records are editable on all primaries, changes must be carefully
replicated and synchronized. It is critically important to update the
serial number for each change.
Secondary means that the server holds a read-only copy of the zone.
This is maintained through a process of replication known as a zone
transfer from a primary name server. A secondary zone would
typically be provided on two or more separate servers to provide fault
tolerance and load balancing. Again, the serial number is a critical part
of the zone transfer process.
A name server that holds complete records for a domain can be defined as
authoritative. This means that a record in the zone identifies the server as a
name server for that namespace. Both primary and secondary name servers
are authoritative.
DNS Caching
As well as making sure that resource records for the managed domain(s) are
accurate, administrators should ensure that DNS services are highly
available and secure, to prevent DNS spoofing, where an attacker is able to
supply false name resolutions to clients.
corp.515support.com
corp.515support.com
would be served from internal name servers. This would allow a client PC (
pc1.corp.515support.com
crm.corp.515support.com
). The name servers hosting these internal subdomain records must not be
accessible from the Internet.
External DNS zones refer to records that Internet clients must be able to
access. For example, the company might run web and email services on the
domain
515support.com
www.515support.com
or send email to an
@515support.com
It is possible for the same DNS server instance to perform in both name
server and resolver roles, but more typically these functions are separated to
different servers for security reasons.
6.5.10DNS Security
The public Zone Signing Key is itself signed with a separate Key Signing Key.
Separate keys are used so that if there is some sort of compromise of the
Zone Signing Key, the domain can continue to operate securely by revoking
the compromised key and issuing a new one.
Description
Windows Server DNS services with DNSSEC enabled. (Screenshot used with
permission from Microsoft.)
The Key Signing Key for a particular domain is validated by the parent
domain or host ISP. The top-level domain trusts are validated by the Regional
Internet Registries, and the DNS root servers are self-validated, using a type
of M-of-N control group key signing. This establishes a chain of trust from the
root servers down to any particular subdomain.
As well as protecting against malicious attacks, DoH and DoT provide better
privacy. Plain text queries can be read by anyone operating a network
appliance in the path between the client and resolver. Encrypting the queries
and responses prevents this type of snooping. Conversely, administrators of
a corporate network need to ensure that clients use authorized resolvers and
will often prefer to monitor DNS traffic.
Score: 100%
Task Summary
Required Actions
Explanation
While completing this lab, use the following DNS information:
e. Select Save.
Score: 100%
Task Summary
Required Actions
Explanation
i. Verify that Create a new file with this file name is selected and
then click Next.
f. Select OK.
a. Expand CORPDC3 (the server that will host the new zone).
c. Select Next.
d. Select Secondary zone as the zone type and then select Next.
b. Expand CORPDC.
d. Select Next.
h. Keep the default reverse lookup zone settings and select Next.
j. Select Next.
k. Keep the default dynamic update settings and then select Next.
l. Select Finish.
i. Select Done.
Score: 100%
Task Summary
Required Actions
Explanation
2. For the sales.private zone, create the ALIAS (CNAME) record with
a blank name pointing to CorpWeb.CorpNet.local.
f. Select OK.
3. For the sales.private zone, create the intranet ALIAS (CNAME) record
pointed to CorpWeb.CorpNet.local.
c. Select OK.
4. For the sales.private zone, create the www ALIAS (CNAME) record
pointed to CorpWeb.CorpNet.local.
c. Select OK.
When a host receives a client request to access a name and it does not have
the IP mapping cached, it asks a name server configured as a resolver to
perform the lookup and return the IP address. As name resolution is a critical
service, most hosts are configured with primary and secondary name server
resolvers for redundancy. The server addresses are entered as IPv4 and IPv6
addresses. In a majority of cases, these addresses are likely to be
autoconfigured via DHCP.
If a single client is unable to resolve names, the issue is likely to lie with that
client's configuration. In Windows, you can view the name servers configured
as resolvers using ipconfig /all. In Linux, the DNS server addresses are
recorded in /etc/resolv.conf. Typically, a package such as NetworkManager or
systemd-networkd would add the entries. Entries added directly will be
overwritten at reboot.
If a host cannot resolve names, check that the correct name server
addresses have been configured and that you can ping them. If there are
configuration errors, either correct them (if the interface is statically
configured) or investigate the automatic addressing server. If there are
connectivity errors, check the network path between the host and its name
servers.
If multiple clients are affected, the issue is likely to lie with the server service
(or the way a subnet accesses the server service). Check that the server
configured as a DNS resolver is online and available (that you can ping the
server from the client). Bear in mind that DHCP might be configuring DNS
server settings incorrectly. Check the server options or scope options
configuration on the DHCP server as well.
While we are focusing on name resolution via DNS here, note that a host can
use multiple methods, especially on Windows workgroup networks. Link Local
Multicast Name Resolution (LLMNR) and Multicast DNS (mDNS) are modified
forms of DNS that allow clients to perform name resolution on a local link
without needing a server.
Hosts have a system DNS configuration, but apps such as browsers might
use separately configured name servers.
If some DNS queries work from the client, but others don't, then the problem
is more complex. When you perform a successful connectivity test by IP
address, and have verified that the host's DNS resolvers are working, and the
target host or service still does not respond to pinging it by name, you need
to check for a fault within the name resolution process.
1. Check local name caches. One complication here is that there are
different types of cache and separate caches for individual
applications, such as web browsers. On Windows, you can
use ipconfig /displaydns and ipconfig /flushdns to monitor and clear the
system's DNS cache.
2. Check HOSTS. The HOSTS file is a static list of host name to IP address
mappings. The local resolver is likely to try to use any HOSTS file
mappings first (or the mappings might be cached automatically). The
default location under Windows is %SystemRoot%\system32\drivers\
etc\, while under Linux it is usually placed in the /etc directory. In most
cases, HOSTS should not contain any entries (other than the loopback
address). Any static entries in HOSTS could be the cause of a name
resolution issue. The file can also be used for troubleshooting.
Any text preceded by the # symbol in a HOSTS file is a comment and will
not be processed. To verify a name resolution problem, edit the HOSTS file
and place the correct name and IP address record in the file for the test host.
When you ping that name, if that is successful, it suggests a name resolution
service problem.
3. Verify DNS records using the nslookup or dig tools. There might be
some discrepancy between the records returned by the resolver
compared to the records configured on the authoritative DNS server
that maintains the zone.
Use the nslookup or dig utilities to check what records are returned by the
resolver. If trying to connect to an Internet resource, compare these records
to those returned by public resolvers (such as Google's servers at 8.8.8.8).
Consider whether clients have cached a record that has been changed
recently. Reconfiguration of DNS records should be planned and implemented
carefully to avoid caching problems.
6.6.3nslookup
You might start investigating a name resolution issue by verifying the name
configured on a host. In Windows, you can use the command ipconfig /all to
display the FQDN of the local host. In Linux, you can use the
command hostname --fqdn.
On a local network, each host is normally configured with a DNS suffix. For
example, PC1 might be configured as part of a Windows network with the
suffix ad.example.local. If this suffix is not set correctly, some name queries
could fail.
You can troubleshoot DNS name resolution with the nslookup command:
If nslookup is run without any arguments (or by specifying the server only
with nslookup – DNSServer), the tool is started in interactive mode. You can
perform specific query types and output the result to a text file for analysis.
Description
close modal
Score: 100%
Question 1.
Correct
Question 2.
Correct
answer
com
realty
Correct Answer:
forbes
sales
Explanation
References
o 6.6.3 nslookup
o 6.6.4 dig
resources\text\t_dns_overview_n09\
q_dns_overview_hostname_example_n09.question.xml
Question 3.
Correct
answer
Correct Answer:
Explanation
No single server contains complete information about all domains; the DNS is
distributed.
Root servers contain information about all types of TLDs, not just country
codes.
Root servers contain information about TLD servers, which in turn know
about second-level domains.
References
o 6.6.3 nslookup
o 6.6.4 dig
resources\text\t_dns_structure_n09\
q_dns_structure_root_server_info_n09.question.xml
Question 4.
Correct
answer
Directly modify the user's hosts file to include the IP address for
www.examplecorp.com.
Instruct the user to bypass their local DNS server by changing their DNS
settings to a public DNS service.
Correct Answer:
Check to see if the user's computer can resolve other domain names.
Explanation
Checking if the user's computer can resolve other domain names is the first
step and helps determine if the issue is isolated to www.examplecorp.com or
if it's a broader DNS resolution problem. If other domain names resolve
correctly, the issue might be specific to the www.examplecorp.com domain,
possibly indicating a problem with the authoritative DNS server for that
domain or a propagation issue.
While changing to a public DNS service might resolve the issue, it's a more
invasive first step compared to simply checking if other domain names can
be resolved. It's better to start with less disruptive troubleshooting steps.
References
o 6.6.3 nslookup
o 6.6.4 dig
resources\text\t_dns_resolution_n09\
q_dns_resolution_resolve_domain_names_scenario_n09.question.xml
Question 5.
Correct
answer
Correct Answer:
Explanation
The SOA record identifies the primary authoritative name server that
maintains complete resource records for the zone, including modifications.
The SOA record specifies the primary, not secondary, name servers.
The SOA record does not specifically identify dynamic resource records.
References
resources\text\t_dns_resource_n09\
q_dns_resource_soa_record_identifry_n09.question.xml
Question 6.
Correct
answer
Correct Answer:
References
resources\text\t_dns_cname_n09\
q_dns_cname_address_a_purpose_n09.question.xml
Question 7.
Correct
answer
Correct Answer:
Explanation
Round robin DNS is used for load balancing, not specifically for increasing
security.
Round robin DNS does not necessarily decrease DNS lookup times; its
primary purpose is load balancing.
Creating a backup DNS server is not the purpose of round robin DNS; it's
about load distribution.
References
resources\text\t_dns_cname_n09\
q_dns_cname_round_robin_n09.question.xml
Question 8.
Correct
answer
Correct Answer:
Explanation
The correct answer is that it specifies the preferred server in a list of servers.
The priority value in MX records helps in determining the order in which
email servers should be tried, with lower values being tried first.
Priority values are numerical and used for ordering, not for storing text.
References
o 6.6.3 nslookup
o 6.6.4 dig
resources\text\t_dns_mx_n09\q_dns_mx_priority_value_n09.question.xml
Question 9.
Correct
answer
Correct Answer:
Encryption
A priority value of 10
Explanation
References
o 6.6.3 nslookup
o 6.6.4 dig
resources\text\t_dns_mx_n09\
q_dns_mx_record_requirement_n09.question.xml
Question 10.
Correct
answer
ipv6.arpa
Correct Answer:
ip6.arpa
reverse.ipv6
in-addr.arpa
Explanation
For IPv6 addresses, reverse DNS queries use the ip6.arpa domain. Each hex
character of the IPv6 address is reversed and used as a subdomain in this
domain.
ipv6.arpa is not the correct domain for reverse DNS querying of IPv6
addresses.
reverse.ipv6 is not a valid domain used in DNS for reverse querying of IPv6
addresses.
References
resources\text\t_dns_pointer_n09\
q_dns_pointer_ipv6_domain_n09.question.xml
Question 11.
Correct
answer
Explanation
Secondary DNS servers hold a read-only copy of the zone for fault tolerance
and load balancing, which is maintained through replication from a primary
name server. This setup provides fault tolerance and load balancing.
Secondary DNS servers do not edit records, serve as the primary source, or
exclusively provide authoritative answers.
References
resources\text\t_dns_config_n09\
q_dns_config_secondary_server_purpose_n09.question.xml
Question 12.
Correct
answer
Correct Answer:
Explanation
The correct answer is to provide name resolution services for Internet clients
needing to access public services. External DNS zones are designed to
manage and provide the DNS records that Internet clients require to access
an organization's public-facing services, such as websites and email servers.
This enables users on the Internet to locate these services using domain
names.
While security is a critical aspect of DNS management, the primary function
of external DNS zones is not to secure internal resources but to make certain
services accessible to the Internet. Security measures are implemented to
protect the DNS infrastructure, but they are not the primary function of
external DNS zones.
This describes the function of internal DNS zones, not external DNS zones.
Internal DNS zones are used within a private network to resolve domain
names of internal resources, not for facilitating access to public services by
Internet clients.
References
resources\text\t_dns_internal_n09\
q_dns_internal_external_server_purpose_n09.question.xml
Question 13.
Correct
answer
Correct Answer:
A resolver is responsible for handling DNS queries from clients. If the resolver
does not have the answer in its cache, it performs recursive queries up the
DNS hierarchy to find the authoritative server for the requested domain,
thereby providing the correct IP address to the client.
Separating internal from external DNS zones is a network design and security
consideration, not a function of a resolver.
References
resources\text\t_dns_internal_n09\
q_dns_internal_resolver_role_n09.question.xml
Question 14.
Correct
answer
Correct Answer:
Explanation
If the Zone Signing Key is compromised, it can be revoked and a new one
issued, allowing the domain to continue to operate securely. This is a key
feature of DNSSEC's design for resilience.
Only the compromised ZSK needs to be replaced, not necessarily the KSK.
References
resources\text\t_dns_security_n09\
q_dns_security_compromised_key_n09.question.xml
Question 15.
Correct
Which protocol uses Transport Layer Security (TLS) to secure DNS queries?
answer
Correct Answer:
Explanation
The correct answer is DNS over Transport Layer Security (DoT). DoT uses TLS
to validate the resolver name server's digital certificate and encrypt DNS
traffic, providing security against tampering by threat actors.
DNS over SSL (DoS) is not a recognized standard for securing DNS queries.
Secure DNS (SDNS) is a broad term and not a specific protocol like DoT.
References
resources\text\t_dns_security_n09\
q_dns_security_dns_over_dot_n09.question.xml
The network at your company is configured to use DHCP. The help desk
received a report about a desktop in Office 2 having connection issues. Your
task is to evaluate and resolve the problem.
Score: 100%
Task Summary
Your answer:No
Correct answer:No
Q2How is the ip address currently allocated?
Your answer:Manual
Correct answer:Manual
Office1 computer.
Office2 computer.
o Answer question 2.
Office2 computer.
Exec computer.
o Answer question 4.
Office1 computer.
Exec computer.
o Notice that the folder icon for the Subnet1 Scope displays a red
arrow, indicating it is not active.
In this lab, you analyze and correct the configuration problems. Do the
following:
o Answer question 4.
Start Lab
In this lab, your task is to explore, diagnose, and fix the reported TCP/IP
configuration problems.
Select the Hide Notes icon in the toolbar to hide or display notes and labels
as needed.
3. Ping the ISP to verify connectivity through the router and the internet.
d. Answer Question 1.
4. Use the ipconfig and tracert commands to find the devices used to
access the ISP.
a. From the PowerShell prompt, type ipconfig /all and press Enter.
d. Answer Question 2.
f. Answer Question 3.
5. From Exec, check the status of the link and network activity lights.
DHCP Enabled: No
The subnet mask is not the default subnet mask for the
Class C IP address range being used. With 255.255.255.240
as a subnet mask, the network would only include
addresses from 192.168.0.48 to 192.168.0.63.
f. Notice that the network icon in the Notification Area now shows a
computer, indicating a connection to the internet.
The DHCP Server line is not shown. This means that the
workstation was unable to contact the DHCP server.
Since DHCP is enabled, the rest of the information should have come from
the DHCP server. From this, you can conclude that there's an issue with the
DHCP server.
10. From CorpDHCP, launch the DHCP console and activate the
scope.
a. Right-click CorpDHCP and select Launch Windows.
b. From the Server Manager menu bar, select Tools > DHCP.
11. From Office1, check to see if activating DHCP fixed the issue.
c. From the Terminal prompt, type ipconfig /all and press Enter.
Notice that the line for the default gateway, DNS server, and
DHCP server (along with the new IP address) is now within the
DHCP scope for the local network.
12. From CorpDHCP, reconfigure the settings for the DHCP scope.
g. Select OK.
13. From Office1, check to see if fixing the DHCP scope resolved the
issue.
c. From the Terminal prompt, type ipconfig /all and press Enter.
Notice that the line for the default gateway is now set to
192.168.0.5.
d. Select Ethernet.
g. From the Terminal prompt, type ipconfig /all and press Enter.
Notice that the Ethernet card now uses DHCP (DHCP Enable:
Yes).
Original
No
Yes
192.168.0.5
No
From PowerShell, type ipconfig and then press Enter to check the
Ethernet configuration.
Answer Question 4.
Minimize the Lab Questions dialog.
On Office2, use the ipconfig /all command to check the Ethernet
configuration.
Use the ipconfig /all command to verify the changes made and then
verify that the problem is solved.
Select the Hide Notes icon in the toolbar to hide or display notes
and labels as needed.
In this lab, your task is to troubleshoot and fix the issue using the
following procedures:
Verify that the ITAdmin and Office2 computers can access the
internet.
IP
Device
Address
CorpServ 192.168.0
er .10
192.168.0
ITAdmin
.31
192.168.0
Office2
.34
198.28.2.
ISP
254
-a
Displays all connections and listening ports.
-n
Displays addresses and port numbers in numerical form.
-e
Displays Ethernet statistics.
-o
Displays the owning process ID associated with each connection.
-r
Displays the routing table.
-p
Shows connections for a specific protocol.
-s
Displays per-protocol statistics.
Event Viewer
Computer IP
Name Address
192.168.0
CorpServer
.10
198.28.2.
ISP
254
(Unknown
ITAdmin
)
(Unknown
Exec
)
Select the Hide Notes icon in the toolbar to hide or display notes
and labels as needed.
o Answer Question 1.
o Answer Question 2.
Verify that the Exec and ITAdmin computers can access the
Internet.
Use nslookup to query the DNS for the CorpWeb server using its fully
qualified domain name (CorpWeb.CorpNet.local).
Use nslookup to query the CorpDC3 DNS server for CorpWeb. Use the
fully qualified domain name for both CorpDC3 and CorpWeb.
o How would you verify that the problem has been fixed?
Query the default DNS server for the primary IP address of the
corpnet.xyz domain.
Query the default DNS server for the corpnet.xyz mail server and
determine its IP address.
Explanation
d. Answer Question 1.
2. Use nslookup to find the mail server for corpnet.xyz and its IP
address:
c. Answer Question 2.
b. Answer Question 3.
close modal
Score: 100%
Question 1.
Correct
A user reports that they cannot browse to a specific website on the Internet.
From the user's computer, a computer tech finds that a ping test to the web
server succeeds. A traceroute test shows 17 hops to the destination web
server.
What is the MOST likely cause of the problem?
answer
Duplicate IP addresses
Correct Answer:
Explanation
In this scenario, a ping test to the website succeeds, while accessing the
website through the browser does not work. Users type hostnames in the
browser to go to websites, but hostnames must be translated into IP
addresses by a DNS server. Either the workstation is using the wrong address
for the DNS server, the DNS server is not available, or the DNS server does
not have an entry for the website.
Because the ping and traceroute tests work, you know that the IP address,
subnet mask, and default gateway values are correct.
References
o 6.6.3 nslookup
o 6.6.4 dig
resources\text\t_trouble_dns_n09\q_trouble_dns_incorrect_n09.question.xml
Question 2.
Correct
What is typically indicated when a host can ping a server by its IP address
but not by its name?
answer
Correct Answer:
Explanation
When a host can ping a server by its IP address but not by its name, it
indicates an issue with DNS configuration. DNS is responsible for translating
human-readable domain names into IP addresses. If DNS is not correctly
configured, the host cannot resolve the name to an IP address, though direct
IP connectivity remains unaffected.
The server being offline would prevent both name and IP address pinging.
An incorrect subnet mask would affect all network communications, not just
name resolution.
References
o 6.6.3 nslookup
o 6.6.4 dig
Question 3.
Correct
answer
Correct Answer:
Explanation
If a single client is unable to resolve names, the issue likely lies with that
client's DNS server configuration. Ensuring the correct DNS server addresses
are configured is crucial.
The DHCP server configuration would affect multiple clients, not just one.
The physical network connection of the server would affect all clients, not
just one.
The subnet mask of the client would affect general network connectivity, not
specifically DNS resolution.
References
o 6.6.3 nslookup
o 6.6.4 dig
resources\text\t_trouble_dns_n09\
q_trouble_dns_server_configuration_check_n09.question.xml
Question 4.
Correct
What does editing the HOSTS file to add a correct name and IP address
record test for?
answer
Correct Answer:
Editing the HOSTS file to manually add a correct name and IP address record
for a test host and then successfully pinging that name suggests a problem
with the name resolution service, as the manual entry bypasses the usual
DNS resolution process.
Editing the HOSTS file to add a correct name and IP address record does not
test the speed of the DNS server.
Editing the HOSTS file to add a correct name and IP address record tests the
DNS resolution process, not the accuracy of web browser caches.
Editing the HOSTS file to add a correct name and IP address record
specifically tests name resolution, not the general reliability of the network
connection.
References
o 6.6.3 nslookup
resources\text\t_trouble_name_n09\
q_trouble_name_hosts_edit_testing_n09.question.xml
Question 5.
Correct
answer
Correct Answer:
Explanation
The correct answer is to identify if the resolution issue is due to cached data.
Checking local name caches is important because cached data can
sometimes cause name resolution issues. If a name was resolved incorrectly
in the past and that incorrect resolution is cached, it could lead to the current
resolution issue.
The primary purpose is not to clear the web browser but to check for cached
DNS data.
References
o 6.6.4 dig
resources\text\t_trouble_name_n09\
q_trouble_name_local_name_cache_n09.question.xml
Question 6.
Correct
Which command can be used on Windows to display the FQDN of the local
host?
answer
resolve-hostname
nslookup -type=fqdn
hostname --fqdn
Correct Answer:
ipconfig /all
Explanation
hostname --fqdn is a command used in Linux to display the FQDN of the host,
not Windows.
nslookup -type=fqdn is not a valid command for displaying the FQDN of the
local host. nslookup is used for querying DNS servers.
References
o 4.4.1 ipconfig
resources\text\t_nslookup_n09\q_nslookup_local_host_fqdn_n09.question.xml
Question 7.
Correct
answer
Correct Answer:
Explanation
References
o 6.6.3 nslookup
resources\text\t_nslookup_n09\q_nslookup_no_arguments_n09.question.xml
Question 8.
Correct
During an audit of external DNS records, you need to verify the mail servers
configured for your public domain example.com.
answer
nslookup example.com
Correct Answer:
Explanation
The -type=a option queries for A records, which map hostnames to IPv4
addresses, not mail servers.
Running nslookup without specifying a type will primarily return A and AAAA
records, which are not directly relevant to finding mail server configurations.
The -type=ns option queries for name server records, which identify DNS
servers for the domain, not mail servers.
References
o 6.6.3 nslookup
resources\text\t_nslookup_n09\
q_nslookup_type_mx_scenario_n09.question.xml
Question 9.
Correct
answer
Correct Answer:
Explanation
To direct a dig query to a specific DNS server, you use the @ symbol followed
by the server's fully qualified domain name (FQDN) or IP address in the
command.
The DNS server's IP address is not placed at the beginning of the command
but after the @ symbol.
While you can configure your system's default resolver, dig allows you to
specify a DNS server directly in the command without altering system
settings.
References
o 6.6.4 dig
resources\text\t_dig_n09\q_dig_at_symbol_n09.question.xml
Question 10.
Correct
answer
Correct Answer:
Explanation
The correct answer is to query DNS servers. dig stands for Domain
Information Groper and is specifically designed for querying DNS servers to
obtain domain name or IP address mappings and other DNS records.
dig does not configure DNS servers; it is used for querying them.
While dig ships with the BIND DNS server software, its role is not to manage
the server configurations but to perform DNS lookups.
References
o 6.6.4 dig
resources\text\t_dig_n09\q_dig_primary_purpose_n09.question.xml
print
close modal
Score: 93%
Question 1.
Correct
answer
Correct Answer:
Explanation
The correct answer is that the DHCP server is offline or unreachable. When
clients are assigned IP addresses in the 169.254.0.0/16 range, it indicates
they are using APIPA because they failed to obtain an IP address from the
DHCP server. This typically happens when the DHCP server is offline or
unreachable.
References
resources\text\t_dhcp_issues_n09\
q_dhcp_issues_server_unavailable_scenario_01_n09.question.xml
Question 2.
Correct
answer
Correct Answer:
Explanation
The SLAAC process, not the DHCPv6 server, locates the default gateway.
Host addresses with suitable network prefixes are generated by the SLAAC
process, not the DHCPv6 server.
IPv6 does not support broadcast; it uses multicast for DHCP server discovery.
References
resources\text\t_dhcpv6_n09\q_dhcpv6_primary_role_n09.question.xml
Question 3.
Incorrect
Which type of DNS record is essential for clients to locate domain controllers
within Active Directory?
answer
Correct Answer:
SRV Record
Incorrect answer:
MX Record
A Record
TXT Record
Explanation
References
resources\text\t_dns_mx_n09\
q_dns_mx_srv_record_scenario_02_n09.question.xml
Question 4.
Correct
answer
Correct Answer:
Connectionless
Guaranteed delivery
Connection-oriented
Explanation
UDP does not guarantee the delivery of packets, unlike TCP which provides
mechanisms for ensuring data delivery.
UDP does not use flow control mechanisms. Flow control is a feature of
connection-oriented protocols like TCP to manage data transmission rates.
References
resources\text\t_datagram_n09\
q_datagram_connectionless_n09.question.xml
Question 5.
Correct
answer
DHCPv6
Manual configuration
ARP
Correct Answer:
SLAAC
Explanation
ARP is used in IPv4 for address resolution and does not apply to IPv6 link-
local address generation.
References
Question 6.
Correct
What new class of error messaging does ICMPv6 introduce that is not present
in ICMPv4?
answer
Destination unreachable
Time exceeded
Echo request
Correct Answer:
Explanation
References
resources\text\t_apipa6_n09\q_apipa6_packet_too_big_n09.question.xml
Question 7.
Correct
answer
Correct Answer:
Explanation
No single server contains complete information about all domains; the DNS is
distributed.
Root servers contain information about all types of TLDs, not just country
codes.
Root servers contain information about TLD servers, which in turn know
about second-level domains.
References
o 6.6.3 nslookup
o 6.6.4 dig
resources\text\t_dns_structure_n09\
q_dns_structure_root_server_info_n09.question.xml
Question 8.
Correct
Which of the following could be a reason for the client to send a RST packet?
answer
Correct Answer:
The client has detected an error condition and wants to abruptly terminate
the connection.
The client is confirming the successful receipt of a FIN packet from the
server.
Explanation
Confirming the successful receipt of a FIN packet from the server is done
with an ACK packet, not a RST packet. The RST packet does not play a role in
the normal connection teardown process.
The three-way handshake process is initiated with a SYN packet, not a RST
packet. Sending a RST packet does not restart the handshake process but
instead abruptly terminates the connection.
References
resources\text\t_handshake_n09\
q_handshake_error_condition_scenario_n09.question.xml
Question 9.
Correct
answer
Correct Answer:
Explanation
The port on which a server listens (TCP or UDP port 53) does not determine
whether it is authoritative. Both authoritative and non-authoritative servers
can listen on these ports. The distinction lies in the type of records the server
holds, not the communication protocol it uses.
References
resources\text\t_dns_config_n09\
q_dns_config_authoritative_dns_server_n09.question.xml
Question 10.
Correct
answer
Correct Answer:
Explanation
Ephemeral ports are temporary and not used for permanent assignments.
Forwarding packets is not the role of ephemeral ports but of routers and
switches.
References
resources\text\t_transport_n09\
q_transport_ephemeral_ports_n09.question.xml
Question 11.
Correct
answer
Correct Answer:
Explanation
RS messages are not used for encrypting traffic; they are used for network
configuration.
References
Question 12.
Correct
answer
Correct Answer:
FF02::1:2
FE80::2
FF02::2
FE80::1:2
Explanation
FF02::2 is the multicast address for all routers on the local link; FF02::1 is for
all hosts on the link.
References
resources\text\t_dhcpv6_n09\
q_dhcpv6_contact_dhcp_server_n09.question.xml
Question 13.
Correct
In the TCP connection teardown process, what is the first step initiated by the
client?
answer
Correct Answer:
Sends a FIN segment
Explanation
The first step in the TCP connection teardown process initiated by the client
is sending a FIN segment, signaling the desire to close the connection.
Sending a RST segment is used for abruptly resetting a connection, not for
the orderly teardown process.
References
resources\text\t_handshake_n09\
q_handshake_fin_segment_n09.question.xml
Question 14.
Correct
Which of the following steps should the technician take first to diagnose the
problem?
answer
Directly modify the user's hosts file to include the IP address for
www.examplecorp.com.
Instruct the user to bypass their local DNS server by changing their DNS
settings to a public DNS service.
Correct Answer:
Check to see if the user's computer can resolve other domain names.
Explanation
Checking if the user's computer can resolve other domain names is the first
step and helps determine if the issue is isolated to www.examplecorp.com or
if it's a broader DNS resolution problem. If other domain names resolve
correctly, the issue might be specific to the www.examplecorp.com domain,
possibly indicating a problem with the authoritative DNS server for that
domain or a propagation issue.
While changing to a public DNS service might resolve the issue, it's a more
invasive first step compared to simply checking if other domain names can
be resolved. It's better to start with less disruptive troubleshooting steps.
References
o 6.6.3 nslookup
o 6.6.4 dig
resources\text\t_dns_resolution_n09\
q_dns_resolution_resolve_domain_names_scenario_n09.question.xml
Question 15.
Correct
During an audit of external DNS records, you need to verify the mail servers
configured for your public domain example.com.
answer
nslookup example.com
Correct Answer:
The -type=a option queries for A records, which map hostnames to IPv4
addresses, not mail servers.
Running nslookup without specifying a type will primarily return A and AAAA
records, which are not directly relevant to finding mail server configurations.
The -type=ns option queries for name server records, which identify DNS
servers for the domain, not mail servers.
References
o 6.6.3 nslookup
resources\text\t_nslookup_n09\
q_nslookup_type_mx_scenario_n09.question.xml
Question 16.
Correct
You used the dig command in a Linux terminal window to produce the
following output:
;;ANSWER SECTION:
westsim111.com. 7h33m IN A 76.141.43.129
;;AUTHORITY SECTION:
westsim111.com. 7h33m IN NS dns1.deriatct111.com.
westsim111.com. 7h33m IN NS dns2.deriatct222.com.
;;Total query time: 78 msec
;;FROM: localhost.localdomain to SERVER:default -- 202.64.49.150
;;WHEN: Tue Feb 16 23:21:24 2005
;;MSG SIZE sent: 30 rcvd:103
What is the IP address of the DNS server that performed this name
resolution?
answer
16.23.21.24
192.168.1.100
76.141.43.129
Correct Answer:
202.64.49.150
Explanation
When you use the dig command to perform a manual DNS lookup, a range of
information is provided to you. The IP address of the DNS server that
performed the name resolution is shown at the bottom area of the output on
the end of the ;;FROM line.
The IP address shown in the answer section denotes the resolved IP address
for the domain or host that the resolution was requested for. In this case,
that address is 76.141.43.129.
References
o 6.6.4 dig
resources\text\t_dig_n09\q_dig_dns_server_address_n09.question.xml
Question 17.
Correct
What is the default behavior of dig when no specific DNS server is mentioned
in the command?
answer
Correct Answer:
Explanation
If dig is run without specifying a DNS server, it will use the system's default
resolver to perform the query.
dig does not specifically query the local host's DNS settings unless the local
host is set as the default resolver.
dig does not select a random DNS server; it uses the default resolver
configured on the system.
dig does not fail to execute in the absence of a specified DNS server; it
simply uses the default resolver.
References
o 6.6.4 dig
resources\text\t_dig_n09\q_dig_default_resolver_n09.question.xml
Question 18.
Correct
answer
Correct Answer:
Explanation
UDP forwarding under the IP helper functionality allows for the forwarding of
specific UDP-based broadcast traffic, such as DHCP and NTP, enhancing
network service delivery across subnets.
UDP forwarding is not limited to DHCP requests; it can include other UDP-
based services.
The primary purpose of UDP forwarding is not to encrypt traffic but to ensure
it reaches the appropriate services across subnets.
References
resources\text\t_dhcp_relay_n09\
q_dhcp_relay_udp_forwarding_n09.question.xml
Question 19.
Correct
What layer of the OSI model does the Transmission Control Protocol (TCP)
operate at?
answer
Network Layer
Application Layer
Correct Answer:
Transport Layer
Explanation
The Transport Layer is responsible for providing end-to-end communication
services and reliable data transfer, which includes the functionalities of TCP
such as connection-oriented communication and acknowledgments.
The Network Layer is primarily concerned with the routing of packets across
different networks. TCP operates at a higher layer, focusing on the
communication between end systems rather than the routing of packets.
The Data Link Layer is responsible for node-to-node data transfer and error
checking of data between two directly connected nodes. TCP operates at a
higher layer, providing host-to-host communication services.
References
resources\text\t_tcp_n09\q_tcp_transport_layer_n09.question.xml
Question 20.
Correct
Which of the following would a device use to receive NTP configuration from
a NTP server that's located on a different network?
answer
Static Routing
VLAN Tagging
ARP Broadcasting
Correct Answer:
IP Helper
Explanation
Static Routing is a method to manually specify the network path data should
take to reach a particular destination. While static routing can direct traffic
from one network to another, it does not specifically address the forwarding
of broadcast traffic like NTP requests. Static routes are used to establish
known, fixed paths for network traffic but do not convert broadcast requests
into unicast traffic to cross network boundaries.
References
resources\text\t_dhcp_relay_n09\q_dhcp_relay_ip_helper_n09.question.xml
Question 21.
Incorrect
What is the mechanism for a client to choose between multiple DHCP
servers?
answer
Correct Answer:
Incorrect answer:
Explanation
DHCP clients accept the first offer they receive from any DHCP server. There
is no built-in mechanism for clients to choose between multiple DHCP
servers.
The client can manually select the preferred DHCP server is incorrect. DHCP
does not provide a mechanism for manual server selection by clients.
The MAC address is used for identification, not for selecting between multiple
DHCP servers.
While it is technically true that the first server to respond is used, this is not
a selection mechanism but a consequence of the DHCP protocol's operation.
References
resources\text\t_dhcp_config_n09\
q_dhcp_config_client_dhcp_selection_n09.question.xml
Question 22.
Correct
answer
UPS issues
Duplicate MACs
DHCP
Correct Answer:
DNS
Explanation
Dynamic Host Configuration Protocol (DHCP) is not likely the issue since the
project manager could resolve IP addresses. Host name issues usually point
to Domain Name System (DNS) issues.
Duplicate MAC addresses are unlikely to arise unless the network uses locally
administered addressing.
References
o 6.6.3 nslookup
o 6.6.4 dig
resources\text\t_trouble_name_n09\
q_trouble_name_no_ping_available_n09.question.xml
Question 23.
Correct
answer
DNS servers
Default gateway
NTP servers
Correct Answer:
DNS suffix
Explanation
The DNS suffix option allows the DHCP server to specify the domain name
that clients should use for DNS resolution, which is crucial for network name
resolution and domain joining.
The default gateway specifies the router's IP address, not the DNS suffix.
DNS servers provide the IP addresses of DNS servers, not the DNS suffix.
References
resources\text\t_dhcp_options_n09\
q_dhcp_options_dns_suffix_n09.question.xml
Question 24.
Correct
The network administrator discovers that the DHCP lease time is set very
low, causing IP addresses to be released and renewed too frequently. The
administrator decides to adjust the DHCP configuration to alleviate this issue.
answer
Correct Answer:
Explanation
Increasing the lease time is correct because increasing the lease time will
allow client devices to retain their IP addresses for a longer period, reducing
the frequency of renewals and improving network stability.
Decreasing the T1 timer would cause the client to attempt to renew its lease
even earlier, potentially exacerbating the issue of frequent renewals.
Decreasing the T2 timer would lead to earlier attempts to rebind to any
available DHCP server if the original server does not respond, which does not
address the issue of frequent lease renewals.
Adding more DHCP options does not directly affect the frequency of IP
address renewals. The number of DHCP options configured is unrelated to
lease time settings.
References
resources\text\t_dhcp_options_n09\
q_dhcp_options_lease_time_scenario_n09.question.xml
Question 25.
Correct
answer
IP range
Default gateway
Exclusion
Correct Answer:
Reservation
Explanation
Reservations are static IP addresses that are not dynamically assigned by the
DHCP server. Reservations are assigned by the DHCP server using the
device's MAC address. Whenever the device with the specified MAC address
connects to the network, the DHCP server assigns it the reserved static IP
configuration.
Exclusions are IP addresses that the DHCP server does not assign.
The IP range defines the range of IP addresses that the DHCP server can
assign.
The default gateway defines where data packets that are leaving the network
should go.
References
resources\text\t_dhcp_reserves_n09\
q_dhcp_reserves_description_n09.question.xml
Question 26.
Correct
answer
Correct Answer:
dhclient
ipconfig
dhcp-release
networkmanager
Explanation
dhclient is the standard utility in Linux for managing DHCP leases, including
obtaining and releasing IP addresses.
ipconfig is a Windows command and not used in Linux for DHCP
management.
References
resources\text\t_dhcp_options_n09\
q_dhcp_options_dhclinet_n09.question.xml
Question 27.
Correct
What action should the network administrator take to mitigate these issues?
answer
Correct Answer:
Create a new scope with enough addresses and reduce the lease period.
Explanation
The correct answer is to create a new scope with enough addresses and
reduce the lease period. Creating a new scope with more addresses and
reducing the lease period can help mitigate issues by ensuring there are
enough IP addresses for all devices and that addresses are quickly recycled
when devices disconnect from the network.
Disabling DHCP and using static IP addresses for all devices would be
impractical, especially with many temporary devices connecting and
disconnecting.
Increasing the DHCP lease time would exacerbate the problem by holding
onto IP addresses for longer periods, potentially leading to more IP conflicts
and exhaustion issues.
Implementing MAC address filtering does not address the root cause of the
issue, which is DHCP scope exhaustion and the need for efficient IP address
management.
References
resources\text\t_dhcp_issues_n09\
q_dhcp_issues_new_scope_scenario_n09.question.xml
Question 28.
Correct
Which protocol uses Transport Layer Security (TLS) to secure DNS queries?
answer
Correct Answer:
Explanation
The correct answer is DNS over Transport Layer Security (DoT). DoT uses TLS
to validate the resolver name server's digital certificate and encrypt DNS
traffic, providing security against tampering by threat actors.
DNS over SSL (DoS) is not a recognized standard for securing DNS queries.
Secure DNS (SDNS) is a broad term and not a specific protocol like DoT.
References
resources\text\t_dns_security_n09\
q_dns_security_dns_over_dot_n09.question.xml
Question 29.
Correct
Where can you view the name servers configured as resolvers in a Windows
environment?
answer
/etc/resolv.conf
Network settings
Correct Answer:
ipconfig /all
/etc/hosts
Explanation
The correct answer is the ipconfig /all command. The command ipconfig
/all in Windows displays all current TCP/IP network configuration values,
including the DNS servers configured as resolvers.
While network settings might show DNS information, the question specifically
asks about viewing this via a command or file.
/etc/hosts is a file used for static host name to IP mappings, not for viewing
DNS resolver configurations.
resources\text\t_trouble_dns_n09\
q_trouble_dns_ipconfig_all_n09.question.xml
Question 30.
Correct
answer
Correct Answer:
Explanation
References
resources\text\t_dhcp_issues_n09\
q_dhcp_issues_address_exhaustion_n09.question.xml
Score: 100%
Task Summary
Your answer:198.28.1.1
Correct answer:198.28.1.1
Q2What is the IP address of the server that receives mail for corpnet.xyz?
Your answer:198.28.1.3
Correct answer:198.28.1.3
Q3Does the external DNS server match the internal DNS server regarding the
corpnet.xyz mail server?
Your answer:Yes
Correct answer:Yes
d. Answer Question 1.
2. Use nslookup to find the mail server for corpnet.xyz and its IP
address:
c. Answer Question 2.
b. Answer Question 3.
Score: 100%
Task Summary
Required Actions
1. Use nslookup to query the DNS for the CorpWeb server using its fully
qualified domain name.
a. Type nslookup
CorpWeb.CorpNet.local CorpDC3.CorpNet.local and
press Enter.
The CorpDC3 DNS server responds that it can't find CorpWeb.
CorpDC3 does not have a DNS record for CorpWeb.
How would you verify that the problem has been fixed?
After implementing the above solution, you could verify that the
problem was fixed by repeating step 2. The CorpDC3 DNS server
should respond with name resolution information for CorpWeb.
Score: 100%
Task Summary
Lab Questions
e. Answer Question 1.
f. Close PowerShell.
h. Select OK.
d. Answer Question 2.
Score: 100%
Task Summary
Required Actions
Explanation
Reservation IP MAC
Name Address Address
192.168.0.1 aa:61:82:df:04:
LaserJet4240-1
01 54
192.168.0.1 ce:fd:48:90:06:
LaserJet4240-2
02 23
192.168.0.1 c8:ba:99:cd:80:
KonicaColor
03 12
192.168.0.1 f1:a9:3e:f7:7d:
AcctPrinter
04 3b
192.168.0.1 df:a9:99:cd:80:
SalesPrinter
05 61
l. Select Close.