Alternatively, you can configure your server's DNS to forward requests to your ISP's server, though you open yourself to cache poisoning attacks if your ISP's servers become subverted.
If no forwarders are configured, the DNS server will use root hints, which contain host information necessary to resolve names outside of the authoritative DNS domains. The process is slower, but safer.
Related Q&A from Richard Brain
Managing vulnerabilities involves a wide array of security testing, including both dynamic and static source code analysis. Learn how the two differ,...continue reading
Which browsers are secure enough for enterprise use, and which should be avoided at all costs? In this expert response, Richard Brain examines the ...continue reading
Google cloud applications aren't necessarily known for their security. In this expert response, learn what to watch out for when considering using ...continue reading