GUIDE 2026 FULL QUESTIONS AND
SOLUTIONS GRADED A+
◍ What are the differences between Postage and PKI based schemes in
message verification?.
Answer: Postage: make all e-mails contain an electronic postage stampPKI:
uses PKI to authenticate and authorize mail
◍ What are stratum 0 time sources?.
Answer: Satellites, GPS receivers, Atomic clocks
◍ How to configure HTTPS site configuration?.
Answer: 1. acquire and assign certs for each site2. if site should only allow
secure connections, you should create redirect page from http:// to https://3.
HTTPS easiest with separate IP address for each site
◍ how did computers sync with time pre 2003 SP1?.
Answer: SNTP
◍ How does Cookie-Based Persistence work?.
Answer: - Only works with HTTP/HTTPS web apps- A browser cookie is
added that the ADC uses to indicate the "keep connection requests" going to
the proper server- Requires cookies be available within the browser-
Resolves the client outbound NAT issues- Easier because we can just look
at cookie instead of IP
◍ False.
Answer: T/F: When using a relay host (forwarder), e-mail bounces can come
from the origin host, the relay host, or the destination host.
◍ stratum 3 servers peer with other stratum 3 servers within an organization
, (t/f).
Answer: true
◍ how are IP addresses stored in those tables?.
Answer: reverse order broken on octet
◍ each second level domain must have at least ____ authoritative DNS
servers.
Answer: 2
◍ E-mail is a real-time communication technique..
Answer: False (store and forward communication technique)
◍ Recursive.
Answer: approach to forward name resolution, an end node (resolver) sends
a request to the name server is obligated to supply an IP address for a DNS
name
◍ what is an example of host.subdomain.top_level_domain?.
Answer: cs.purdue.edu
◍ Packet filters.
Answer: a software solution that limits network connectivity based on
packet characteristics (source/destination/packet characteristics), can control
both ingress and egress traffic
◍ POP3.
Answer: - uses TCP for reliable connection- initiated by the client
◍ Dynamic load balancers.
Answer: the load balancer has a separate control channel with the web
servers (used to keep track of current utilization), the requesting node makes
an official request to the load balancer and the load balancer passes the
connection to the least loaded server (the load balancer may decline the
connection if there is no server with available capacity to server the
connection)
◍ stratum 1 servers.
, Answer: typically used only to service other time servers
◍ What is the purpose of Message Verification in email?.
Answer: To ensure that only valid messages are sent and reduce spam and
malicious emails
◍ True.
Answer: T/F: A valid e-mail address contains a user name and a DNS entry.
◍ how does TTL length affect work load on authoritative server?.
Answer: reduces the load
◍ iterative name query.
Answer: - burden is on the client to resolve the query- DNS client allows the
DNS server to return the best answer it can give based on its cache or zone
data- client then queries the DNS server for which it obtained a referral and
continues the process
◍ NTP Pools: Definition.
Answer: Group of time servers available for public use
◍ Standard Proxy Server: Web Proxy Auto-Discovery Protocol.
Answer: Designed to automatically find a PAC script
◍ SNTP is single transactional and sets time once (t/f).
Answer: true
◍ how many approaches are there to name resolution?.
Answer: 2
◍ What are the benefits of a transparent proxy server?.
Answer: - requires no client configuration- captures traffic from all clients
(even guests)
◍ DNS flagging effectively balances load across multiple web servers..
Answer: False
◍ Authoritative and non-authoritative servers.
Answer: two types of DNS servers