2.4 Network Services Flashcards

1
Q

DNS

A

Domain Name System
- convert domain names to IP addresses and vice versa
- businesses may have many different DNS servers that split the work load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DHCP

A

Dynamic Host Configuration Protocol
- automatically assign IP address and configure devices on IP networks
- available on most routers
- multiple DHCP servers provide redundancy should one become available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fileshare Server

A
  • centralized storage of documents, spreadsheets, pictures, etc.
  • any connected device has access
  • Windows communicates with SMB
  • macOS communicates with AFP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Print Servers

A
  • connect printer to the network
  • may require software in a connected computer
  • all other devices will send print jobs to this computer
  • others may have network adapter and software built into printer -> direct connection to ethernet or wireless network
  • printing protocols: SMB, IPP, LPD
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mail Servers

A
  • sends and receives mail
  • usually managed by ISP, cloud-based service, or the enterprise IT department
  • very important: 24/7 support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Syslog

A
  • standard for message logging
  • usually a central logging receiver
  • requires a lot of disk space
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Web Server

A
  • responds to browser requests
  • HTTP/HTTPS
  • web pages are stored on the server
  • static pages or built dynamically in real-time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication, Authorization, & Accounting (AAA)

A
  • security framework for controlling and tracking user access within a network
    Authentication:
  • identifying the user
  • username and password
  • biometrics or access badge
    Authorization:
  • user must be authorized to perform certain tasks
    Accounting:
  • measuring how many resources the user consumes
  • time and data used
    Very important: redundant servers are common
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spam Gateways

A
  • stops spam before it reaches the user
  • can be stored in the cloud
  • once the mail is scanned, it can be sent to the internal network and stored in the mail server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unified Threat Management (UTM)

A
  • aka Next-Generation Firewall
  • multiple security features or services are combined into a single device or service in the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Load Balancers

A
  • distributes traffic to multiple servers
  • efficient
  • large-scale implementations
  • TCP offload and SSL offload
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Proxy Server

A
  • additional security
  • client makes request to proxy -> proxy sends request to third-party server
  • proxy examines the response for any malicious threats -> sends response to client
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SCADA/ICS

A

Supervisory Control and Data Acquisition System/ Industrial Control System
- management of industrial processes
- real-time data collection and process control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Legacy/ embedded systems

A

Legacy systems:
- outdated systems that are still in use
Embedded systems:
- devices or softwares that has a specific function within a larger system
ex. Alarm system, time card system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IoT (Internet of Things) devices

A
  • nonstandard computing hardware that connect can connect to wireless networks
    Ex. Sensors, smart devices, smart doorbell, appliances
How well did you know this?
1
Not at all
2
3
4
5
Perfectly