When a client computer sends a request to a Domain Name System (DNS) server, what type of packet is sent?

1 Answer

Answer :

DNS primarily uses the User Datagram Protocol (UDP) on port number 53 to serve requests. DNS queries consist of a single UDP request from the client followed by a single UDP reply from the server. When the length of the answer exceeds 512 bytes and both client and server support EDNS, larger UDP packets are used.

Related questions

Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3

Last Answer : a. 4,2,1,3

Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway

Last Answer : Answer: 4 

Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin

Last Answer : Watchdog packet

Description : A browser uses the DNS system to convert a domain name into an ip address. But once it has the the ip address how does it know where the server is located and reach the server to download the site?

Last Answer : The point of an ip address is that each one is unique. It’s not unlike an address on an envelope. How does the mail know where to go? There is only one possibility.

Description : DNS stands for: a) Domain Network Service b) Domain Necessarily Server c) Domain Name System d) None of These

Last Answer : c) Domain Name System

Description : The term DNS stands for (A) Domain Name System (B) Defense Nuclear System (C) Downloadable New Software (D) Dependent Name Server

Last Answer : (A) Domain Name System

Description : Which DNS client maps an address to a name or a name to an address especially when required by a host? a. Resolver b. Mapper c. Primary Server d. Secondary Server

Last Answer : a. Resolver

Description : Which DNS client maps an address to a name or a name to an address especially when required by a host? A. Resolver B. Mapper C. Primary Server D. Secondary Server

Last Answer : A. Resolver

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case delay in response to a request? (Note that the speed of light in air is 3,00,000 km/second). (A) 133.33 m sec (B) 266.67 m sec (C) 400.00 m sec (D) 533.33 m sec

Last Answer : (D) 533.33 m sec Explanation: The request has to go up and down, and the response has to go up and down. The total path length traversed is thus 160.000 km. The speed of light in air and vacuum is 300,000 km/sec, so the propagation delay alone is 160,000/300,000 sec or about 533 msec. 

Description : In which layer of OSI client send request to the server? a. Application layer b. Presentation layer c. Session layer d. Transport layer

Last Answer : c. Session layer

Description : The client code recognizes the SSL request and establishes a connection through TCP port ____ to the SSL code on the server A. 1023 B. 402 C. 443 D. 8080

Last Answer : C. 443

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : State whether true or false. i) Multithreading is useful for application that perform a number of essentially independent tasks that do not be serialized. ii) An example of multithreading is a database server that listens for ... B) i-True, ii-True C) i-False, ii-True D) i-False, ii-False

Last Answer : B) i-True, ii-True

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description :  _____ is a bi-directional, fully duplex communication model that uses a persistent connection between client and server. A. Request-Response B. Publish-Subscriber C. Push-Pull D. Exclusive Pair

Last Answer : D. Exclusive Pair 

Description : When recieving emails via a smart phone, are those emails sent by the same system that sends computer/lap top information?

Last Answer : The emails will go to all devices that you have set up to receive mail from that address. If you want mails that go only to your mobile device, have an email account designated for that purpose.

Description : What is Domain Name System (DNS)?

Last Answer : The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or other resources connected to the Internet or a private network. It translates domain names, which ... uses a series of queries and responses to determine the correct IP address for that domain.

Description : NEFT is an electronic fund transfer system that operates on a _________ basis which settles transactions in batches. A. Domain Net Settlement (DNS) B. Defined Net Settlement (DNS) C. Declared Net Settlement (DNS) D. Deferred Net Settlement (DNS)

Last Answer : D. Deferred Net Settlement (DNS) Explanation: NEFT is an electronic fund transfer system that operates on a Deferred Net Settlement (DNS) basis which settles transactions in batches. In DNS, the ... till the particular cut-off time. These transactions are netted (payable and receivables) in NEFT.

Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper

Last Answer : A)Domain Name System

Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper

Last Answer : A)Domain Name System

Description : DNS in internet technology stands for (A) Dynamic Name System (B) Domain Name System (C) Distributed Name System (D) None of these

Last Answer : (B) Domain Name System 

Description : 7.How does traceroute work? A. It uses an ICMP destination-unreachable message to elicit the name of a router. B. It sends a specially crafted IP packet to a router to locate the number of hops from ... the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Last Answer : D. It uses the TTL value in an ICMP message to determine the number of hops from the sender to the router.

Description : How do I access the "Total DNS" settings for my domain if I changed the name servers?

Last Answer : answer:Your domains are registered through Godaddy correct? When you manage your domain under Nameservers set your name servers back to Godaddy DNS servers (NS17.DOMAINCONTROL.COM, NS18.DOMAINCONTROL.COM) ... server you could, but you would get flooded with requests trying to resolve your domain.

Description : in the dns hierarchy, where is information about how to find the top-level domain servers held? -General Knowledge

Last Answer : You can find on the DNS root servers.

Description : DNS can obtain the of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : A zone is a contiguous portion of a ………….. of the DNS namespace whose database records exist and are managed in a……….. DNS database file. A. domain, particular B. Class, particular C. tree, local D. Domain, every

Last Answer : A. domain, particular

Description : DNS can obtain the ................. of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : DNS can obtain the ..................of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : What is a function of a DNS server?

Last Answer : DNS server's main function is to associate the domain name with the appropriate IP address. DNS servers convert domain names into IP addresses, which a computer understands, thereby taking control of which server a user can access via a specific domain.

Description : In a/an ………… of DNS resolver, the queried name server can return the best answer it currently has back to the DNS resolver. a. Recursive queries b. Iterative queries c. Reverse queries d. Inverse queries

Last Answer : b. Iterative queries

Description : The DNS server that received the initial ……... query checks it’s ………… is called…………... A. Recursive, zones B. simple, zones C. simple, class D. Recursive, class

Last Answer : A. Recursive, zones

Description : 8. Nslookup can be used to gather information regarding which of the following? A. Host names and IP addresses B. Whois information C. DNS server locations D. Name server types and operating systems

Last Answer : A. Host names and IP addresses

Description : In public key encryption system if A encrypts a message using his private key and sends it to B a. if B knows it is from A he can decrypt it using A's public key b. Even if B knows who sent the ... be decrypted at all as no one knows A's private key d. A should send his public key with the message

Last Answer : a. if B knows it is from A he can decrypt it using A’s public key 

Description : What do you do if a co-worker sends you a friend request on facebook that you want to reject?

Last Answer : answer:Ignore it and hope it goes away. If they ask… act dumb? Did you? I can’t recall seeing it. I never really use Facebook though. Or if I really don’t like them. I would just hit .. no thank you and send them on their way. Haven’t had to do either thank goodness.

Description : The Indian Parliament is competent to enact law on a State subject if – (1) emergency under Article 352 is in operation (2) all the state Assemblies of the country make such a request (3) the President sends such a message to Parliament (4) None of these

Last Answer : (1) emergency under Article 352 is in operation Explanation: When National emergency 7 under article 352 is in force, the Parliament can make laws on the 66 subjects of the State List (which ... governments can make laws). Also, all money bills are referred to the Parliament for its approval.

Description : The instruction fetch operation is initiated by loading the contents of program counter into the and sends _ request to memory: a. Memory register and read b. Memory register and write c. Data register and read d. Address register and read

Last Answer : d. Address register and read

Description : To read a file in HDFS, a user sends an _______ request to the NameNode toget the location of file blocks. a) access b) open c) authentication d) create

Last Answer : open

Description : The upper red arrow show that CPU sends out the control signals____ and _____ indicate the data is read from the memory: a. Memory request b. Read c. Both A and B d. None of these

Last Answer : c. Both A and B

Description : Why does my (new) Snap chat list of people keep moving even when the first person on the list hasn't sent me anything It is not in chronological order of who sends me things. Why is that?

Last Answer : Usually, its just the friend added first on top. If not, theirfirst or last names put them in non-chronological order and/or itis just that they have made a recent snap.

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly

Last Answer : all UDP packets are treated independently by transport layer

Description : The following items may be sent as printed papers through book packet a) Manuscripts of works or for newpaper b) Musical scores or sheets of music in manuscript. c) Papers obtained by means of a typewriter of any type d) films and sound recording e) a & b only

Last Answer : e) a & b only

Description : What is true about SSO? A. SSO has multiple authentication server B. SSO managing single accesses to other systems C. In SSO, User sends the ticket to intranet server. D. All of the above

Last Answer : In SSO, User sends the ticket to intranet server.

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : Inthe _________ method, a special packet called a ______ circulates through the ring. A) reservation: control frame B) polling: poll request C) token passing: token D) none of the above

Last Answer : token passing: token

Description : Whether the parcel bags and packet bags of the set are to be included in the transit bag or to be sent loose will be shown in a) The due mail list of the set b) The advance work paper of the set c) The sorting list of the set d) None of these

Last Answer : a) The due mail list of the set

Description : A bag is used to enclose several bags sent to the same office or section thereby affording protection to them called a) Packet Bag b) Insured Bag c) Transit Bag d) None of these

Last Answer : c) Transit Bag