2.4 Network Services Flashcards

1
Q

What does DNS stand for?

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DNS servers are usually managed by…?

A

the ISP or IT department (it’s a critical resource)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS relies on one server. T or F?

A

False, the load is balanced across many different servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a DHCP server do?

A

automatic IP address configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DHCP servers can be found on what home device?

A

Common service available on most home routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Enterprise DHCP servers will be _____

A

redundant (running on central servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a file server?

A

a centralized storage of documents, spreadsheets, videos, pictures and other files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are file servers used by Microsoft and Apple? (2)

A
  1. SMB Server Message Block Microsoft
  2. AFP Apple Filing Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are print servers used for?

A

connects a printer to the network to provide printing services to all network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 2 ways that printer servers can appear as?

A
  1. Software in a computer (computer is connected to the printer)
  2. Built into the printer (has network adapter and software)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 3 standard printing protocols?

A
  1. Server Message Block
  2. IPP (Internet Printing Protocol)
  3. LPD (Line Printer Daemon)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the purpose of a mail server?

A

Stores incoming mail, sends outgoing mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who usually manages a mail server?

A

usually managed by the ISP or IT department

(one of the most important services, 24/7 support)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is syslog?

A

the standard for message logging

(needs A LOT of disk space)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are 6 Load balancer features?

A
  1. Configurable - manage across servers
  2. TCP offload - Protocol overhead
  3. SSL offload - Encryption/Decryption
  4. Caching - Fast Response
  5. Prioritization - QoS
  6. Content Switching - application-centric balancing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a proxy server?

A

An intermediate server

(proxy -> intermediary)

17
Q

How does a proxy server work? (3 steps)

A
  1. The client makes the request to the proxy
  2. Proxy performs the actual client request
  3. Proxy provides results back to the client
18
Q

What are 4 useful features of having a proxy server?

A
  1. Access control
  2. Caching
  3. URL filtering
  4. Content scanning
19
Q

What does SCADA stand for?

A

Supervisory Control and Data Acquisition System

20
Q

What does ICS stand for?

A

Industrial Control Systems

21
Q

What is SCADA/ICS used fo?

A

PC manages equipment (power, equipment, facilities, real-time information, requires segmentation)

22
Q

What does a Web server do?

A

Responds to browser requests

23
Q

Web pages are built using what?

A

HTML/HTML 5

24
Q

Where are web pages stored?

A

On the Web server

25
Q

What are 2 ways that web pages appear on the browser?

A

They are downloaded to the browser and appear as:
1. Static pages
2. Built dynamically in real-time

26
Q

Authentication servers are almost always an…

A

enterprise service (not required on a home network)

27
Q

What are authentication servers used for?

A

To authenticate the login to access resources (centralized management)

28
Q

Authentication servers are usually a set of….

A

redundant servers

(always available, important service)

29
Q

What is Spam?

A

Unsolicited emails, messages, etc

30
Q

Spam can come in what 3 forms?

A
  1. Commercial advertising
  2. Non-commercial proselytizing
  3. Phishing attempts
31
Q

What are spam gateways? What 2 forms does it appear as? (2)

A

Stop unsolicited email at te gateway before it reaches the user

(on-site or cloud-based)

32
Q

What do load balancers do?

A

Distributes the load (of multiple servers) and are invisible to the end-user

33
Q

What do large-scale load balancer implementations look like?

A

Web server farms, database farms

34
Q

What’s the advantage of using load balancers for outages?

A

Server outages have no effect

35
Q

What are 2 meanings for “Legacy” systems?

A
  1. Really old
  2. Really important
36
Q

What are embedded systems?

A

Purpose-built device, doesn’t usually have direct access to the operating system

37
Q

What are 3 examples of an embedded system?

A
  1. Alarm system
  2. Door security
  3. Time card system
38
Q

What are IoT devices? (Internet of Things)

A

Appliances, smart devices, air control, smart doorbells that use the Internet

39
Q

How do you prevent security breaches using IoT devices?

A

Segment the network from the rest