Join Lisa Bock for an in-depth discussion in this video Understanding DNSSEC, part of Foundations of IT Security: Network Security.
[Voiceover] Domain Name System is…an application layer system protocol.…It sits up here with the other applications…and is essential to any network.…DNS resolves host names to an IP address.…It uses port 53 over UDP or TCP.…In general, DNS uses UDP because we want our responses fast,…however, for a full zone transfer TCP is used.…Normal queries and responses occur when…a client send a query to a DNS server for an IP address.…
The server then responds with information…but it can ask other servers for the information.…DNS failures will prevent hosts from communicating…or locating each other.…There are many types of DNS records as we see here.…Let's point out a couple of examples.…Here's an A record, which is a 32-bit IPv4 address.…A quad A is for IPv6 and a MX record is mail exchange.…The history of DNS started back when ARPANET began.…
Early on it was evident that using a name…to remind us of a site rather than…a numeric address was better.…ARPANET's infrastructure was still based…on a numeric address so each site had…
Note: This training maps to a number of the exam topics on the Microsoft Technology Associate (MTA) Security Fundamentals exam (98-367). See https://www.microsoft.com/learning/en-us/exam-98-367.aspx for more information.
- Implementing secure content management (SCM)
- Implementing unified threat management (UTM)
- Introducing VLANs
- NAT addressing
- Network sniffing
- Understanding common attack methods, such as password attacks
- Protecting clients with antivirus software
- Implementing physical security