2.5 Network Hosts / Server Roles Flashcards

Summarize the properties and purposes of services provided by networked hosts.

1
Q

Name the different types of server roles.

A

Web server, file server, print server, DHCP server, DNS server, Proxy server, Mail server, Authentication server, syslog.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a web server?

A

A web server is a computer that stores and shares the files that make up web sites. The role of a web server is to provide access to websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a file server?

A

A computer designated to store software, courseware, administrative tools, and other data on a LAN or WAN. It “serves” this information to other computers via the network when users enter their personal access codes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a print server?

A

A server, computer, or standalone network device that shares access to a printer over a network.

Anytime you plug a printer into a computer and share the printer over the network, the sharing system can be referred to as a print server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does DHCP mean?

A

DHCP = Dynamic Host Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a DHCP server do?

A

A DHCP server provides your computer with all the IP information it needs to get on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a DNS server do?

A

It tacks easy-to-remember DNS names for IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a proxy server?

A

A proxy server is software that enables multiple connections to the internet to go through one protected computer. Application that want to access internet resources send requests to the proxy server instead of trying to access the internet directly, which both protects the client computers and enables the network administrator to monitor and restrict internet access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a mail server?

A

A networked host or server that provides e-mail service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an authentication server?

A

An authentication server is an application that facilitates authentication of an entity that attempts to access a network. Such an entity may be a human user or another server. An authentication server can reside in a dedicated computer, an Ethernet switch, an access point or a network access server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is syslog?

A

UNIX systems use a tool called syslog to create information placed in log files. Applications use syslog to write about issues happening to or about the application. Syslog works over networks. Syslog is NOT a program (like event viewer).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does UTM stand for?

A

UTM = Unified threat management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does UTM do?

A

UTM takes the traditional firewall and packages it with many other security features such as IPS, VPN, load balancing, antivirus, and many other features depending on the make and model. The UTM approach to building network gear helps build robust security deep into the network, protecting what really matters: our data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does IDS stand for?

A

Intrusion detection system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does IDS do?

A

An IDS is an internet application that inspects packets, looking for active intrusions. An IDS functions inside the network, watching for threats that a firewall might miss such as viruses, illegal logon attempts. and other well known attacks. Plus, because it inspects traffic inside the network, the IDS can discover internal threats like the activity of a vulnerability scanner snuggled in on a flash drive by a disgruntles worker planning an attack on an internal database server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does IPS stand for in networking?

A

Intrusion Prevention System

17
Q

What doe IPS do?

A

An IPS is very similar to an IDS, but and IPS sits directly in the flow of network traffic. It can stop an attack while it is happening, the network bandwidth and latency takes a hit, and if IPS goes down the network link might go down too. It can also block incoming packets on the fly based on IP addresses.

18
Q

What is an end-point management server?

A

It keeps track of devices using the network. End-points are the end users and devices that use a network. End point servers can manage security policies for all the different devices and can consolidate the data into one dashboard for the network security administrator.

19
Q

What is an embedded system?

A

They are devices that have an integrated CPU and RAM which can process information internally without the need for a controlling system. Examples could be ann ATM, POS system, etc.

20
Q

What is a legacy system?

A

The term “legacy” refers to things handed down from predeccessors. Therefore, Legacy Systems are systems that use outdated OS, programming languages, application, or hardware.