New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC GCIA Exam - Topic 1 Question 23 Discussion

Actual exam question for GIAC's GCIA exam
Question #: 23
Topic #: 1
[All GCIA Questions]

Smith works as a Network Administrator for HCP Inc. He sets up a DNS server on the network and enables DNS service on all computers. However, DNS is not working properly. Which of the following commands should Smith use to verify the DNS configuration?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Geraldo
4 months ago
Yeah, tracert won't help with DNS issues.
upvoted 0 times
...
Emily
4 months ago
Wait, is nslookup really the best option?
upvoted 0 times
...
Tawna
4 months ago
I thought ping would work too, but I guess not.
upvoted 0 times
...
Lauran
4 months ago
I agree, nslookup is the go-to command!
upvoted 0 times
...
Quentin
5 months ago
Definitely nslookup for checking DNS.
upvoted 0 times
...
Frank
5 months ago
I’m a bit confused; I thought tracert was for tracing routes, not for DNS verification. Is nslookup definitely the best choice?
upvoted 0 times
...
Sarina
5 months ago
I feel like ping could be useful too, but it doesn't really check the DNS settings directly, does it?
upvoted 0 times
...
Alline
5 months ago
I remember practicing with similar questions, and nslookup always seemed to come up when verifying DNS issues.
upvoted 0 times
...
Laurene
5 months ago
I think nslookup is the right command to check DNS configurations, but I'm not completely sure.
upvoted 0 times
...
Sharee
5 months ago
Wait, what? Sanctions for not preserving data? I'm a bit lost on the legal details here. Gotta make sure I understand the key concepts before answering.
upvoted 0 times
...
Luisa
5 months ago
This seems like a straightforward question about the main equity categories in a statement of stockholders' equity. I'm pretty confident I can recall the key equity components.
upvoted 0 times
...
Virgie
5 months ago
I'm leaning towards sending the file to AMP for Endpoints. If the hash isn't malicious, that may save us from unnecessary alerts later.
upvoted 0 times
...

Save Cancel