Advanced Exercises


8.

How would you set up a private domain name hierarchy that does not include any of the official InterNIC-assigned domain names?

9.

Which part of DNS is most vulnerable to an attack from a malicious user and why?

10.

It is often irritating to have to wait for DNS records to update around the world when you change DNS entries. You could prevent this delay by setting the TTL to a small number. Why is setting the TTL to a small number a bad idea?

11.

Outline a method by which DNS could be used to support encryption.




A Practical Guide to Red Hat Linux
A Practical Guide to Red HatВ® LinuxВ®: Fedoraв„ў Core and Red Hat Enterprise Linux (3rd Edition)
ISBN: 0132280272
EAN: 2147483647
Year: 2006
Pages: 383

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net