---Advertisement---
Application Layer Computer Networks Computer Science Engineering DNS OSI Model

DNS Interview/Exam Question-Answer Part 2

By smart_answer13

Published on:

---Advertisement---

Q.1 The domain name system is maintained by _______.

       A. A single server

       B. A single computer

       C. Distributed database system

       D. None of the above

Ans : Distributed database system


Q.2 How are the bits in an IPv6 address organized?

       A. reverse lookup

       B. canonical name (CNAME)

       A. name records

       B. into 8 16-bit groups

Ans : into 8 16-bit groups


Q.3 Which one of the following is not true?

       A. Multiple hostnames may correspond to a single IP address

       B. A single hostname may correspond to many IP addresses

       A. A single hostname may correspond to a single IP address

       B. None of the above

Ans : A single hostname may correspond to a single IP address


Q.4 What are the 3 strategies for updating DNS servers?

       A. dynamic, read-write, and read-only

       B. the Mail exchanger (MX) record

       C. a unique, internet-usable IP address

       D. in a highly-secure environment

Ans : dynamic, read-write, and read-only


Q.5 What is used to control DNS data replication scope?

       A. application directory partitions

       B. the Mail exchanger (MX) record

       C. in the Start of Authority (SOA) record

       D. in a highly-secure environment

Ans : application directory partitions


Q.6 What allows PNRP to support service naming?

       A. the fact that a PNRP name includes potential payloads such as service function

       B. a referral system that performs lookups based on data known by other systems

       C. the process that DNS uses to remove records that have become stale

       D. creating an alternate record or alias for an existing record

Ans : the fact that a PNRP name includes potential payloads such as service function


Q.7 How can PNRP names be protected from spoofing or poisoning?

       A. in perimeter networks

       B. in a highly-secure environment

       C. with digital signatures

       D. Pointer (PTR) records

Ans : with digital signatures


Q.8 What is used to control DNS data replication scope?

       A. the Mail exchanger (MX) record

       B. application directory partitions

       C. in a highly-secure environment

       D. in the Start of Authority (SOA) record

Ans : application directory partitions


Q.9 What is the most common record type in DNS?

       A. Host (A) records

       B. name records

       C. None of the above

       D. dnscmd.exe

Ans : Host (A) records


Q.10 For what purpose is the BIND root cache file used?

       A. To prime the name server with the root server’s addresses

       B. To provide zone files for authoritative servers

       C. To serve as a configuration file for the name server

       D. To serve as a zone file for the loopback address

Ans : To prime the name server with the root server’s addresses


DNS Interview

smart_answer13

---Advertisement---

Related Post

Operating System Processes MCQ (Interview-Exam) Question-Answer

Q.1 To access the services of operating system, the interface is provided by the ___________.        A. API        B. Assembly instructions     ...

Operating System MCQ Question-Answer Part 4

Q.1 What is an operating system?        A. System service provider to the application programs        B. Interface between the hardware and application programs ...

AH and ESP Protocols Interview/Exam Question-Answer

Q.1 Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?        A. SHA        B. Kerberos ...

UDP Interview/Exam Question-Answer

Q.1 Return value of the UDP port “Chargen” is _______.        A. String of integers        B. String of characters        C. ...

Leave a Comment