Free Essay

Unit 8 – Assignment 1: Dns Zone File

In: Computers and Technology

Submitted By rmakenna87
Words 300
Pages 2
Unit 8 – Assignment 1: DNS Zone File
Assignment Requirements
The Just Legal Company in Figmont, Nebraska has acquired a new Internet address – www.justafigmont.com. They want to set up a DNS server. What would a basic DNS file look like?
Describe the file.
A DNS Server is a hierarchical naming system for computers and resources connected to the internet. Basically each line is a text description that defines a single resource records
Domain Name Servers (DNS) are the They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.
Information from all the domain name servers across the Internet are gathered together and housed at the Central Registry. Host companies and Internet Service Providers interact with the Central Registry on a regular schedule to get updated DNS information.
When you type in a web address, e.g., www.jimsbikes.com, your Internet Service Provider views the DNS associated with the domain name, translates it into a machine friendly IP address (for example 216.168.224.70 is the IP for jimsbikes.com) and directs your Internet connection to the correct website.
The Domain Name System is a hierarchical naming system for computers and resources connected to the internet. Basically this is the Internet's equivalent of a phone book that lets you have name to number mappings on your computers.
The name decel.ecel.uwa.edu.au is the number 130.95.4.2 and vice versa. This is achieved through the DNS. The DNS is a heirarchy. There are a small number of root domain name servers that are responsible for tracking the top level domains and who is under them. The root domain servers between them know about all the people who have name servers that are authoritive for domains under the root.…...

Similar Documents

Premium Essay

Unit 8 Assignment 1: Internet/Web Access Management

...Unit 8 Assignment 1: Internet/Web Access Management 9-Iron Country Club needs and desires are to be able to remotely access resources where there as they would if they would if they were actually physically at their work place. The senior management and executives are the most with concerns and mostly during off-season so that they can be able to reach out to members and plan upcoming events and preparing for next season without having to come into the office. Remote access will be made available mostly to the senior management and executives as stated above. VPN services will be deployed or installed for 9. VPNs are a way for remote access employees to gain secure access to corporate networks. It is a secure connection over an unsecure network- and internet. Communication security in a VPN is through encryption. VPN software, appropriate protocols, and the same encryption methods are required for VPN encryption. A VPN establishes a private network over a public network such as the internet. Instead of dialing in one a telephone line, a VPN uses an internet connection that the system has already established. VPN also ensures that intranet connections within the organizations premises are also secure and VPN provides that security too. VPN requires a tunnel and 9-Iron Country Club will be deployed with the Internet protocol Security (IPSec) protocol to establish a secure network. Ina VPN, IPSec secures communication between the computer system and the corporate network....

Words: 464 - Pages: 2

Premium Essay

Unit 10 Assignment 1: Video Summary 8

...Unit 10 Assignment 1: Video Summary 8 Video 2.04 chkdsk (Check Disk) Topics * Disk Options * Drive properties Terms * Cross-linked Files: FAT Files that point to the same cluster. Cross-linked files are created as the computer is improperly shut down or an application abnormally aborts. For this video it reminded me that chkdsk used to be scandisk. Video 2.01 Windows Update Topics * Security Center * Control panel access * Internet explorer access route Video 2.10 Support Tools Topic * The Dependency Walker Terms * Dependency walker: troubleshoots faulty applications. For this video, I have learned the name of the process I have used to repair applications. Video 2.15 DirectX Diagnostic tool Topics * Run line access point / run line command * System tools access point Terms * Dxdiag: DirectX multimedia program run code. Video 4.01 Comparing LAN’s and WAN’s Topics * Stand-alone computer * Peer-to-peer Network * Client server Terms * LAN: Local Area Network * WAN: Wide Area Network * Work group: A peer-to peer network and all network computers. * Domain: A type of client-server network that requires at least on server prompted to have the role of domain controller. In the Video 4.01, I learned that Local Area Networks cover a short distance, and that Wide Area Networks can cover...

Words: 494 - Pages: 2

Premium Essay

Pt1420 Unit 8 Assignment 1: Homework

...instructions in a computer program which loops endlessly. Example of an infinite loop: Set k = 1 While k < = 5 Display k End While 7. A FOR loop looks like what other loop in a flowchart? A For loop looks like a count-controlled loop. 8. Why is it critical that accumulator variables are properly initialized? An accumulator is used to keep a running total of numbers. In a loop, a value is usually added to the current value of the accumulator. If it is not properly initialized, it will not contain the correct total. 9. What is the advantage of using a sentinel? The advantage of using a sentinel is that when you are processing a long list of values with a loop a sentinel marks the end of a list of items. There is no limit to how many times a loop can execute. 10. Why must the value chosen for use as a sentinel be carefully selected? The value of a sentinel needs to be carefully selected because it can’t be mistaken as a regular value in the list. Algorithm Workbench: 3. // Declare a counter variable. Declare Integer // Constant for the maximum value Constant Integer MAX_VALUE = 100 //Display the multiples of 10 from 0 through 100 For counter = 0 to MAX_VALUE Display counter End For   4. //Declare Integer number Declare an accumulator variable Declare Integer total = 0 Declare Integer counter For counter = 1 to 10 Display “Enter a number.” Input number Set total = total + number End......

Words: 303 - Pages: 2

Free Essay

Nt1330 Unit 2. Exercise 1. Dns Scenario

...Aaron Battaglia NT1330 UNIT 2. EXERCISE 1. DNS SCENARIO It is not required to put a DNS server in such a small location for only five users and snail like network connectivity doesn’t justify the amount of money it would cost to install a server(s) in that area. One exception would be if there is a great amount of file sharing, or other information that would need to be accessed daily by other spots on the network. This sometimes but rarely happens but we could have a situation where we put it in the in the server but we set it up as a secondary or Active Directory Integrated zone type. I recommend installing the servers in the location where you have 30 users and fast internet connection. You could do this also, try storing all the files from either location in the bigger office, and in the smaller location you could remote connect through Virtual Private Network. When we do this all the information from the smaller sight is stored off site. The sight with five users can be run with a cheap router and the server that has thirty users at the office will be set up as the primary zone; since this is utilizing the fast internet connection and has more users this is our MAIN BASE which you can call home. =) If you were to run Domain Name System on domain controllers there are Active Directory Integrated zones and Active Directory Integrated zones. In classical Domain Name Systems the zone data is stored in text files which sit on the Hard Drive; which of course is......

Words: 428 - Pages: 2

Premium Essay

Unit 1 Assignment 1

...Tina Nunez NT1330 Unit 1. Assignment 1 Windows 2008 Network Services Domain name system (DNS) is a naming service used on any device that can connect to the internet. It translates fully qualified domain names of websites into IP addresses for the device. There are DNS records such as address (A, AAAA) records, name server (NS) records and mail exchanger (MX) records stored in the DNS server. Regardless of how many hosts, the DNS is a system that is very important. Dynamic host configuration protocol (DHCP) is a networking protocol that allows the dynamic (automatic) distribution of IP addresses to hosts on a network. If DHCP is enabled, the hosts will each receive a leased IP address that is chosen by the DHCP server from a scope chosen by the network administrators. Sometimes the administrators can reserve IP addresses if needed. Depending on the amount of hosts, it could determine if the IT management wants to use DHCP. If the company is very small, it may not be worth the effort to set up a DHCP server. It can still work but static (manual) IP addresses would be simple to configure because there would be very few devices compared to a large company. Some of the vital devices will usually use static IP addresses anyway such as any servers. If there is a very large company, it would be extremely beneficial to use DHCP. All of the devices can automatically pick up an IP as soon as they connect to the network and the network administrators do not have to go to each and...

Words: 272 - Pages: 2

Premium Essay

Physics Unit 8 Assignment 1

...Unit 8 Assignment 1 20. Because the magnetic force which deflects the electrons is defined by F = q * v x B (v x B is the cross product of the 2 vectors), so: The force vector would always be perpendicular to both the v and B vectors. Since the force is perpendicular to the electron's velocity vector, and thus the path of the electrons, the work done by the field on the electrons is 0, because W = F*d*cos(theta), and theta=90 degrees, therefore cos(theta)=0, and W=0 If W = 0 then there is no change in the kinetic energy of the electrons, thus their speed remains constant; the acceleration provided by the magnetic field was used only to change the direction. 31. Well, it depends upon the Sensitivity setting of the metal detector. As it is clear, the threshold value of the metal detector's sensitivity can be adjusted to suit various needs. so it is obviously set to discard small variations caused by a very small pieces of metal. 34. Yes, There is nothing seperately as a DC motor or DC generator. It is simply a DC machine. It acts either as a motor or a generator depending on the input. If the input is mechanical energy, the output is electrical : this is generator action If the input is electrical, the output is mechanical torque: this is motoring action 48. when you step up the voltage with transformers you lose current. It is a trade off and motors are not 100% effective so you would have a power loss. Unit 2 Assignment 1 8. when your......

Words: 647 - Pages: 3

Free Essay

Nt2670 – Unit 1 Assignment

...to create a batch file to install the following roles: DHCP, DNS, Print Services and Hyper-V. Questions: 1. What does the /w switch do? Why is it used? The /W switch specifies the warning level of the MIDL compiler, and the level indicates what type of security warning level is present. The security levels range from 0-4. Zero meaning no warning and four being the highest level. 2. What switch is used to remove a role? /remove will remove all the roles specified on the computer. 3. What is the command to start the DHCP Server service? The netsh command will start the DHCP server. 4. What command is used to configure a DNS zone? The dnscmd command-line tool will be used to configure a new DNS zone. Lessons 1- fill in the blank 1. iSCS 2. Streaming Media Services and Windows Server Virtualization 3. Infrastructure 4. UDDI Services 5. Windows SharePoint Services 6. Multipath I/O 7. Single Instance Store 8. Web Server (IIS) 9. Desktop Experience 10. Key Management Service Lesson 1 – Multiple choices 1. B. Applications 2. D. LPD service role service 3. C. Print Services 4. D. None of the above 5. A 6. B 7. D 8. B 9. D 10. A Lesson 5 – fill in the blank 1. Windows process Activation Server 2. Protocol listener 3. Hypertext transfer protocol (http) 4. Virtual hosting 5. Virtual directory 6. Virtual hosting 7. FILE TRANSFER PROTOCOL (FTP) 8. Hypertext......

Words: 352 - Pages: 2

Premium Essay

Unit 2 Exercise 1 Dns Scenario

...It is not necessary to put a DNS server in such a small location. 5 users and slow network connectivity does not justify the expense of installing Servers in that location. Unless there is a large amount of File sharing, or other data that needs to be accessed daily by other locations on the network. If that is the case then yes put in the server but configure it as a secondary or ADI zone type. I suggest putting the servers in the other location where you have 30 Users and good connectivity. You can also store all the files from both locations in the larger office, the smaller location can remote in via “VPN”. By doing this all the information from the smaller sight is stored off site. The smaller sight can be run with a smaller cheaper router. The server in the larger more utilized office should be set up as the Primary Zone since it is utilizing a better connection and has more users this is essentially HOMEBASE! If you run DNS on domain controllers, you have the opportunity to use something called Active Directory Integrated zones, or ADI zones. In classical DNS, the zone information is stored in text files that sit on the hard drive. Yes, they’re protected by NTFS, but you don’t have the ability to impose per-record security. You may also want to create an ADI zone; the zone information (and all the associated resource records) are imported into the AD database, NTDS.DIT. The zones and zone records become objects in AD. This has a variety of benefits (and potentially......

Words: 320 - Pages: 2

Premium Essay

Unit 8 Assignment 1

...IS3350 Unit 8 Assignment 1 To: Verizon Date: 2 February, 2014 Subject: Data Breach Executive Summary Overview Verizon’s 2013 Data Breach Investigations Report (DBIR) provides truly global insights into the nature of data breaches that can help organizations of all sizes to better understand the threat and take the necessary steps to protect themselves. The breadth and depth of data represented in this year’s DBIR is unprecedented. It combines the efforts of 19 global organizations: law enforcement agencies, national incident-reporting entities, research institutions, and a number of private security firms — all working to study and combat data breaches. Analysis With 47,000+ Security incidents analyzed, 621 confirmed data breaches studied, and 19 international contributors, Verizon has ample amounts of data to compile and use to better their network. This data can also be analyzed to see what types of people are making these breaches and what motives they may have for doing so. In the 2013 DBIR, 69% of breaches were spotted by an external party and 76% of the network intrusions were due too weak or stolen passwords. Some of the other factors that have been realized was that 75% of the attacks are opportunistic and 19% of attacks are some form of espionage. There is also much evidence that many of these breaches could be tied to organized crime and gathering financial information. On a very basic level, just looking at the history of organized crime, money has......

Words: 344 - Pages: 2

Free Essay

Unit 1 Assignment 1

...Miosha Vogt ET2560 Unit 1 Assignment 1 Chapter 1: Pg. 43 Quick- Check Exercise 1. Machine language 2. Operating System 3. Translation, Linking, Loading, Execution 4. Source 8. Software, Hardware 9. Variables 10. Secondary storage Pg. 44 Review Questions 3. Two secondary storage devices is a disk drive and flash drive Two input devices is the keyboard and mouse Two output devices is the monitor and printer 5. Syntax error is grammar error of a programming language. 6. The loader copies the executed file into memory and initiates execution of instructions. 7. Memory cells are a grouping of small units called bytes Bytes are the amount of storage required to store a single character, composed of even smaller unit called bits. Bits are binary digits 0-10. 8. Three high languages are Fortran, C, and Java FORTRAN used in scientific programming. C is used in system programming. Java supports web programming and programming Android applications. 9. Ram is volatile and it temporarily stores programs while their being executed, delete when computer is turned off, Rom is not volatile the data stored there will not disappear when the computer is turned off. 2. Write an algorithm in pseudo-code to solve the following problem: Input a temperature in Fahrenheit, and output the temperature in Celsius and Kelvin. Formulas needed are: C = ( 59 ) (F – 32). K= ( 59 ) (F – 32) + 273.15 Algorithm:......

Words: 458 - Pages: 2

Premium Essay

Microeconomics Unit 8 Assignment

...AB224 Unit 8 Assignment Template: Name: - Course Number: - AB224 Section Number: - 3 Unit Number: - 8 Date: - August 3, 2014 ---------------------------------- General Instructions for all Assignments----------------------------------- 1. Unless specified differently by your course instructor, save this assignment template to your computer with the following file naming format: Course number_section number_LAST_FIRST_ unit number 2. At the top of the template, insert the appropriate information: Your Name, Course Number, Section Number and Date 3. Insert your answers below, or in the appropriate space provided for in the question. Your answers should follow the APA format with citations to your sources and, at the bottom of your last page, a list of references. Your answers should also be in Standard English with correct spelling, punctuation, grammar, and style (double spaced, in Times New Roman, 12-point, black font). Respond to questions in a thorough manner, providing specific examples of concepts, topics, definitions, and other elements asked for in the questions. 4. Provide a list of references at the end of the last page of your assignment. 5. Upload the completed assignment to the appropriate dropbox. 6. Any questions about the assignment, or format questions, should be directed to your course instructor. ------------------------------------------- Career Competencies ----------------------------------------- In this assignment,......

Words: 781 - Pages: 4

Premium Essay

Unit 8 Assignment: 1 Written Reflection on Our Interview

...Unit 8 Assignment:1 Written Reflection on Our Interview After conducting my interview, I can say that I walked away from this experience with many a lesson learned. The first lesson that I learned was that after choosing a person to interview, then asking that person, most will jump on the defensive and ask “about what”. This is due to the fact that most people are usually pressed for time. They initially want to know how long this process will take without ever stopping to realize that the length of most interviews is dependent upon how long it takes for the interviewee to answer the questions that are asked. Another reason is because most will be curious about the nature of the interview, meaning what questions will be asked. This response I received tells me that people in general do not like discussing certain subjects. Some of these subjects include race, religion, and politics. These two topics are considered to be in the “No Go Zone” of interviews based entirely on their nature to insight the greatest of arguments. Another lesson I learned while conducting my interview is that most people have never been interviewed in the first place. This fact will show when the person being interviewed starts to give one word answers to questions asked. This actually happened though I informed the person that the purpose for the interview I was conducting was to gain a better insight on the subject! Lastly, I learned that when conducting the...

Words: 329 - Pages: 2

Free Essay

Unit 8 Assignment 1 Video Summary 6

...Unit 8 Assignment 1 Video Summary 6 VIDEO #3.01 Topics: * Microsoft Operating Systems * Other Operating Systems Terms: * DOS – Disk Operating System is an acronym for several closely related operating systems that dominated the IBM PC compatible market between 1981 and 1995 * UNIX - is a family of multitasking, multiuser computer operating systems that derive from the original AT&T UNIX. * Command Line Interface - also known as command-line user interface, console user interface, and character user interface (CUI), is a means of interacting with a computer program where the user issues commands to the program in the form of successive lines of text (command lines). Summary: The video taught me that everything that was developed after series 9x of operating systems is built on the NT platform. Also the NT did not have a device manager or a hardware wizard as well as not supporting plug and play. I also learned that Linux was developed by a Finnish student named Linus Torvalds. This information is not really useful for me its old information that for me has no value unless I want to be a technology historian. Unit 8 Assignment 1 Video Summary 6 VIDEO #3.02 Topics: * Partitioning * Creating Partitions * Create/Delete Partitions Terms: * Partition - In personal computers, a partition is a logical division of a hard disk created so that you can have different operating systems on the same hard disk or to create the......

Words: 819 - Pages: 4

Premium Essay

Nt1330 Unit 8 Assignment 1

...Group Policy in a Mixed Client OS Environment Unit 8 Assignment 1 ITT Technical Institute Floyd Washington Jr. May 16, 2015 Group policy is a tool used for customizing, controlling, and securing Windows operating systems. It was introduced in Windows 2000 as part of the IntelliMirror technologies. Group policy can be applied at the local computer level or to OU’s, domains, or sites in an Active Directory environment. Group policy was supported by Windows XP Professional, but not XP Home Editions. Group Policy in Vista adds many settings which gives administrators more control over users and computers. In this essay I will discuss five of the newer features that was not in the older versions of windows. * The first policy that I will discuss is the Control Removable Media policy. Devices like thumb drives, flash memory card readers, and external USB hard disks made it easy for users to transfer data between two computers. Although convenient, the ease that removable media created brought about the rise in industry espionage. User could easily copy and share company secrets with competitors by copying the information on to a removable device and uploading it to another computer. Software was made available to block access to USB ports on sensitive terminals. * The second policy that I will discuss is the Control power management settings. Power management on a single computer can save energy and money. Enforcing a power management strategy can save a......

Words: 532 - Pages: 3

Free Essay

Dns Zone

...Unit 8 Assignment 1 DNS Zone File A Domain Name System (DNS) zone file is a text file that describes a DNS zone. A DNS zone is a subset, often a single domain, of the hierarchical domain name structure of the DNS. The zone file contains mappings between domain names and IP addresses and other resources, organized in the form of text representations of resource records (RR). A zone file may be either a DNS master file, authoritatively describing a zone, or it may be used to list the contents of a DNS cache. Resource records may occur in any order in a zone file. For formatting convenience, resource records may span several lines by enclosing in parentheses a set of parameters that spans several lines, but belongs to the same record. The file may contain comment text by preceding such text with a semicolon, either at the beginning of a line, or after the last field on any line, or on a blank line. Comments end at the end of a line. The zone file may contain any number of blank lines with or without comments. The zone file may also contain various directives that are marked with a keyword starting with the dollar sign character. The most notable is the $ORIGIN keyword, which specifies the starting point for the zone in the DNS hierarchy. If this keyword is omitted from a zone file, the origin is inferred by the server software from the reference to the zone file in its server configuration....

Words: 255 - Pages: 2