You have just brought online a new secondary DNS server and notice your network-monitoring software reports a significant increase in network traffic. Which two hosts on your network are likely to be causing the increased traffic and why?
a. The root and primary DNS servers, because the primary server is requesting zone transfers from the root server
b. The web server and primary DNS server, because the web server is requesting zone transfers from the primary DNS server
c. The caching and primary DNS servers, because the caching server is requesting zone transfers from the primary server
d. The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server
Answer: d. The secondary and primary DNS servers, because the secondary server is requesting zone transfers from the primary server
You might also like to view...
Which of the following statements related to JPA is false?
a. The Java Persistence API (JPA) maps Java classes to relational database tables and objects of those classes to rows in the tables. This is known as ob-ject-relational mapping. b. You can use the NetBeans IDE’s object-relational mapping tools to select a database and autogenerate classes that use JPA to interact with that database. Your programs can then use those classes to query the database, insert new records, update existing records and delete records. c. Unlike JDBC, you will have to create mappings between your Java code and database tables, and you’ll be able to perform complex database manipulations directly in Java. d. JPA can be used with any database management system that supports JDBC.
A(n) _______________ shows the cabling runs, defining the type of connections (Gigabit Ethernet, T1, and so on), as well as every router, switch, server, CSU/DSU, cable modem, and WAP, including make, model, and firmware upgrade.
Fill in the blank(s) with the appropriate word(s).
When the -- operator appears after a variable, it is called a prefix decrement operator.
Answer the following statement true (T) or false (F)
List and explain the five techniques used by social engineers in their attempts to gain information from unsuspecting people.
What will be an ideal response?