2.4 Network Services Flashcards
What is a system responsible for converting domain names to IP addresses?
Domain name system (DNS). The load is balanced across many servers. Usually managed by an IT department
What is the name of the server that assigns and configurates IP address names on your local device?
Dynamic host configuration protocol (DHCP). It’s very common and available on most home routers
What is the name for a centralized storage of documents, spreadsheets, videos, pictures, and other files?
File server. Your OS has a standard way of communicating with it (Windows uses SMB and Apple uses Apple Filing Protocol)
What kind of server does a computer use to connect to a printer?
Print server. This may be software in a computer that’s connected to a printer or hardware inside of the printer. Manages and assigns jobs in the printer job queue. Uses standard printing protocols like SMB, Internet Printing Protocol (IPP), and Line Printer Daemon (LPD)
What kind of server requires 100% uptime that helps store and send mail?
Mail server. Managed by IT or ISP
How can an admin check on runtime and performance of various protocols?
A syslog. Receives a consolidated log of messages through a security information and event manager (SIEM). Requires a lot of space, you’ll need a huge disk drive
What service responds to browser requests using protocols like HTTP and HTTPS?
Web server. They help display pages built with languages like HTML and HTML5
How does an enterprise use the same authentication protocol through all of the services?
Authentication server. Provides centralized management for login authorization. Used for enterprises, not required on home network because amount of logins is substantially smaller. Extremely important service, uses a set of redundant servers
What is one way an organization can dispose of spam messages?
Spam gateways. Can identify and block unsolicited email at the gateway before it reaches the user. On-site or cloud-based. Useful to store so that you can categorize future spam
What is the name of an all-in-one security appliance?
Unified threat management (UTM). Can be spam filters, URL / content inspection, act as routers and firewalls. Can act as intrusion detection systems (IDS) or intrusion prevention systems (IPS) that can block known attacks. Can also shape bandwidth so different applications can be prioritized. Can also be an endpoint for VPN
How can we ensure that all of our servers maintain uptime during traffic?
Load balancers. Responsible for checking in with all of servers connecting to it. Distributes load. Can offload certain protocols to take weight off of servers
What is the name of an intermediate server that provides security to the administration?
These sit in the middle of the conversation. They receive requests from the client, perform the request, and sends results back to the client. Allows for useful features like access control, caching, URL filtering, and content scanning
What is the name of a security system employed at enterprise scale organizations?
Supervisory control and data acquisition system (SCADA), a type of industrial control system (ICS). Responsible for control and management of industrial machines; think manufacturing or power companies
What is the name for systems that have been in use in the database for a long time?
Legacy systems. Usually run older hardware/software, can be harder to troubleshoot issues.
Embedded systems. These are purpose-built devices that don’t normally work with an OS, like an alarm system or door security.
What is the name for devices that are constantly connected to the internet?
Internet of things (IoT) devices like appliances and smart speakers. They can allow access to certain parts of an organization (smart doorbell) so they may require a segmented network to limit security breaches