ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 170 - XK0-005 discussion

Report
Export

A Linux administrator has set up a new DNS forwarder and is configuring all internal servers to use the new forwarder to look up external DNS requests. The administrator needs to modify the firewall on the server for the DNS forwarder to allow the internal servers to communicate to it and make the changes persistent between server reboots. Which of the following commands should be run on the DNS forwarder server to accomplish this task?

A.
ufw allow out dns
Answers
A.
ufw allow out dns
B.
systemctl reload firewalld
Answers
B.
systemctl reload firewalld
C.
iptables -A OUTPUT -p udp -ra udp -dport 53 -j ACCEPT
Answers
C.
iptables -A OUTPUT -p udp -ra udp -dport 53 -j ACCEPT
D.
flrewall-cmd --zone-public --add-port-53/udp --permanent
Answers
D.
flrewall-cmd --zone-public --add-port-53/udp --permanent
Suggested answer: D

Explanation:

The command that should be run on the DNS forwarder server to accomplish the task is firewall-cmd

--zone=public --add-port=53/udp --permanent. The firewall-cmd command is a tool for managing firewalld, which is a firewall service that provides dynamic and persistent network security on Linux systems. The firewalld uses zones and services to define the rules and policies for the network traffic.

The zones are logical groups of network interfaces and sources that have the same level of trust and security. The services are predefined sets of ports and protocols that are associated with certain applications or functions. The --zone=public option specifies the zone name that the rule applies to.

The public zone is the default zone that represents the untrusted network, such as the internet. The --add-port=53/udp option adds a port and protocol to the zone. The 53 is the port number that is used by the DNS service. The udp is the protocol that is used by the DNS service. The --permanent option makes the change persistent across reboots. The command firewall-cmd --zone=public --add-port=53/udp --permanent will modify the firewall on the server for the DNS forwarder to allow the internal servers to communicate to it and make the changes persistent between server reboots. This is the correct command to use to accomplish the task. The other options are incorrect because they either do not modify the firewall on the server for the DNS forwarder (ufw allow out dns or systemctl reload firewalld) or do not use the correct syntax for the command (iptables -A OUTPUT -p udp -ra udp -dport 53 -j ACCEPT instead of iptables -A OUTPUT -p udp -ra udp --dport 53 -j ACCEPT). Reference: CompTIA Linux+ (XK0-005) Certification Study Guide, Chapter 12: Managing Network Connections, page 392.

asked 02/10/2024
G C
48 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first