Certified Ethical Hacker – CEH – 312-50 – Question543

Let's imagine three companies (A, B and C), all competing in a challenging global environment. Company A and B are working together in developing a product that will generate a major competitive advantage for them. Company A has a secure DNS server while
company B has a DNS server vulnerable to spoofing. With a spoofing attack on the DNS server of company B, company C gains access to outgoing e-mails from company B. How do you prevent DNS spoofing?


A.
Install DNS logger and track vulnerable packets
B. Disable DNS timeouts
C. Install DNS Anti-spoofing
D. Disable DNS Zone Transfer

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question541

Tess King is using the nslookup command to craft queries to list all DNS information (such as Name Servers, host names, MX records, CNAME records, glue records (delegation for child Domains), zone serial number, TimeToLive (TTL) records, etc) for a Domain.

What do you think Tess King is trying to accomplish? Select the best answer.


A.
A zone harvesting
B. A zone transfer
C. A zone update
D. A zone estimate

Correct Answer: B

Certified Ethical Hacker – CEH – 312-50 – Question540

You have the SOA presented below in your Zone.
Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries?
collegae.edu.SOA, cikkye.edu ipad.college.edu. (200302028 3600 3600 604800 3600)


A.
One day
B. One hour
C. One week
D. One month

Correct Answer: C

Certified Ethical Hacker – CEH – 312-50 – Question539

Which of the following statements about a zone transfer is correct? (Choose three.)


A.
A zone transfer is accomplished with the DNS
B. A zone transfer is accomplished with the nslookup service
C. A zone transfer passes all zone information that a DNS server maintains
D. A zone transfer passes all zone information that a nslookup server maintains
E. A zone transfer can be prevented by blocking all inbound TCP port 53 connections
F. Zone transfers cannot occur on the Internet

Correct Answer: ACE

Certified Ethical Hacker – CEH – 312-50 – Question535

Under what conditions does a secondary name server request a zone transfer from a primary name server?


A.
When a primary SOA is higher that a secondary SOA
B. When a secondary SOA is higher that a primary SOA
C. When a primary name server has had its service restarted
D. When a secondary name server has had its service restarted
E. When the TTL falls to zero

Correct Answer: A