CompTIA Core 1 A+ CertMaster 2.6 Compare and contrast common network configuration concepts
DNS resource records allow name servers to resolve queries for names and services hosted in the domain. In an IPv4 network, what record type maps IPv4 to host names? A AAAA TXT MX
A In an IPv4 network, the A record maps host names to IPv4 addresses. A DNS server that is responsible for managing a zone will contain numerous resource records, such as A, AAAA, CNAME, and MX records.
A network technician is responsible for an extensive enterprise network. The network has hundreds of hosts on the same broadcast domain, reducing performance. The technician needs to find a solution to improve security and mitigate excessive broadcast traffic. What is the solution? Virtual private network (VPN) DomainKeys Identified Mail (DKIM) Virtual LAN (VLAN) Sender Policy Framework (SPF)
Virtual LAN (VLAN) Placing hundreds of hosts in the same broadcast domain reduces performance. Dividing switch ports into managed groups called virtual LANs (VLANs) will mitigate performance issues
What type of network connection protocol tunnels traffic to provide a secure connection utilizing encryption and authentication technology? Virtual private network (VPN) Simple Network Management Protocol (SNMP) Data leak/loss prevention (DLP) Virtual LAN (VLAN)
Virtual private network (VPN) Virtual private networks (VPNs) use a tunnel to navigate traffic for the same private network over an untrusted network, typically the internet, using encryption and authentication to protect from unauthorized access.
When reviewing the mail exchange (MX) record for IPv4 and IPv6, the host names identified in an MX record must have what other type of record associated with them? (Select all that apply.) DomainKeys Identified Mail (DKIM) Master boot record (MBR) A AAAA
A AAAA A mail exchange (MX) record identifies an email server, and the host names specified in an MX record must have an associated A record for IPv4 networks. A mail exchange (MX) record identifies an email server, and the host names identified in an MX record must have an associated AAAA record for IPv6 networks.
The Domain-based Authentication, Reporting, and Conformance (DMARC) framework utilizes the Sender Policy Framework (SPF) or the DomainKeys Identified Mail (DKIM), or both, to provide what? Stored free-form text A framework for managing and monitoring network devices Network log capture and aggregation A more robust policy mechanism for senders
A more robust policy mechanism for senders DMARC will use SPF, DKIM, or both, to specify a more robust policy mechanism for senders that define how administrators should treat DMARC authentication failures.
Some network infrastructure components, such as servers, routers, and printers, can be easier to manage when their IP addresses are known. While static addressing is an option, managing it can sometimes be challenging. Outside of static addressing, what option will allow hosts to use the same IP address configurations? DHCP reservations Scope Network address translation (NAT) Global addresses
DHCP reservations It is sometimes helpful for some devices to use the same IP address in a network infrastructure. Without using static addressing, Dynamic Host Configuration Protocol (DHCP) reservations solve this problem.
An organization has tasked a system administrator with installing a spam gateway to verify the authenticity of mail servers and filter spoofed and malicious messages. What framework utilizes either the Sender Policy Framework (SPF), the DomainKeys Identified Mail (DKIM), or both to specify a robust mechanism for authentication failures? Simple Network Management Protocol (SNMP) Code division multiple access (CDMA) Network address translation (NAT) Domain-based Message Authentication, Reporting, and Conformance (DMARC)
Domain-based Message Authentication, Reporting, and Conformance (DMARC) The Domain-based Message Authentication, Reporting, and Conformance (DMARC) framework utilizes SPF and/or DKIM to specify a robust mechanism for authentication failures.
What type of TXT record uses cryptography to validate the source server of a given email to help recipient servers reject spoofed messages and spam? Mail exchangers (MX) Sender Policy Framework (SPF) DomainKeys Identified Mail (DKIM) AAAA record
DomainKeys Identified Mail (DKIM) DomainKeys Identified Mail (DKIM) is a TXT record verifying that a message comes from an authentic server. Using cryptography, DKIM can validate the source server of an email message.
Records used to identify an email server for the domain so that other servers can send messages to it are what type of record? A AAAA TXT Mail exchange (MX)
Mail exchange (MX) Mail exchange (MX) records identify an email server for the domain so that other servers can send messages to it.
A virtual LAN (VLAN) can improve security by monitoring and filtering network traffic. What is another benefit of implementing a VLAN? Traffic tunneling Email message server authentication Reduction in excessive network traffic Identification of authorized domain email hosts
Reduction in excessive network traffic A VLAN will improve security and reduce excessive broadcast traffic by dividing large networks into multiple segments.
What term refers to the range of addresses that a Dynamic Host Configuration Protocol (DHCP) server can offer to client hosts in a particular subnet? Lease Scope Reservation Static address
Scope The scope is the range of addresses that a Dynamic Host Configuration Protocol (DHCP) server can offer to client hosts in a particular subnet, excluding any statically configured addresses.
What do Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting, and Conformance (DMARC) provide for a domain? Virtual private network (VPN) Spam management Virtual local area network (VLAN) IP Leases
Spam management SPF, DKIM, and DMARC utilize DNS records that enable SPAM management through a SPAM gateway. The SPAM gateway applies filters to identify spoofed, misleading, malicious, or otherwise unwanted messages.
When planning to set up a virtual LAN (VLAN), the network administrator must prepare for each VLAN, configuring them with their own what? (Select all that apply.) Subnet address IP address range Virtual private network (VPN) Hypervisor
Subnet address IP address range Hosts placed in separate VLANs can no longer communicate directly, requiring the configuration of each VLAN with its own subnet address and IP address range. Hosts placed in separate VLANs can no longer communicate with one another directly. So the administrator must configure each VLAN with its own subnet address and IP address range.
In a network domain, the DNS server responsible for a zone will contain resource records. Why would a DNS server have AAAA and A resource records? To store free-form text records To identify an email server To enable Remote Desktop Protocol (RDP) To resolve IPv4 and IPv6 client queries
To resolve IPv4 and IPv6 client queries AAAA and A resource records allow DNS servers to manage client queries for IPv4 and IPv6 hosts. AAAA maps to IPv6 host addresses, while A records map to IPv4 host addresses.