The following questions are intended to reinforce key information presented in this lesson. If you are unable to answer a question, review the lesson materials and try the question again. You can find answers to the questions in the "Questions and Answers" section at the end of this chapter.
1. You are the network administrator for Lucerne Publishing. The Lucerne Publishing network consists of a single domain, lucernepublishing.com, that is protected from the Internet by a firewall. The firewall runs on a computer named NS1 that is directly connected to the Internet. NS1 also runs the DNS Server service, and its firewall allows DNS traffic to pass between the Internet and the DNS Server service on NS1 but not between the Internet and the internal network. The DNS Server service on NS1 is configured to use round robin. Behind the firewall, two computers are running Windows Server 2003—NS2 and NS3—a primary and secondary DNS server, respectively, for the lucernepublishing.com zone.
Users on the company network report that, although they use host names to connect to computers on the local private network, they cannot use host names to connect to Internet destinations such as www.microsoft.com.
Which of the following actions requires the least amount of administrative effort to enable network users to connect to Internet host names?
a. Disable recursion on NS2 and NS3.
b. Enable netmask ordering on NS1.
c. Configure NS2 and NS3 to use NS1 as a forwarder.
d. Disable round robin on NS1.
2. You are the administrator for a large network consisting of 10 domains. You have configured a standard primary zone for the mfg.lucernepublishing.com domain on a DNS server computer named Server1. You have also configured a UNIX server, named Server2, to host a secondary zone for the same domain. The UNIX server is running BIND 8.2.1.
You notice that zone transfers between the primary and secondary servers seem to generate more traffic than expected, putting a strain on network resources.
What can you do to decrease the network burden of zone transfers between the primary and secondary servers?
a. Clear the BIND Secondaries check box on Server1.
b. Configure a boot file on Server1 to initialize BIND-compatible settings.
c. Select the BIND Secondaries check box on Server1.
d. Configure a boot file on Server2 to enable fast zone transfers.
3. What is the function of round robin? Which feature takes priority, round robin or netmask ordering?
4. You are the chief network administrator for the Proseware company network, which has four branch offices. Each branch office has its own LAN, which is connected to the Internet using a T1 line. Through virtual private network (VPN) connectivity over the Internet, a single intranet is maintained and replicated over Web servers at each branch office. The four Web servers have unique IP addresses but share a single FQDN, intranet.proseware.com, as shown in Figure 5-31.
Within the Proseware network, a DNS client computer with the IP address 192.168.33.5 submits a query to a DNS server for the name intranet.proseware.com. Assuming that the Netmask Ordering option is enabled on the DNS server, which IP address is returned to the DNS client? (Hint: Determine which of the four Web servers shares the same subnet ID as that of the querying client computer.)
Was this article helpful?