2.5 Network Hosts / Server Roles Flashcards
Summarize the properties and purposes of services provided by networked hosts.
Name the different types of server roles.
Web server, file server, print server, DHCP server, DNS server, Proxy server, Mail server, Authentication server, syslog.
What is a web server?
A web server is a computer that stores and shares the files that make up web sites. The role of a web server is to provide access to websites.
What is a file server?
A computer designated to store software, courseware, administrative tools, and other data on a LAN or WAN. It “serves” this information to other computers via the network when users enter their personal access codes.
What is a print server?
A server, computer, or standalone network device that shares access to a printer over a network.
Anytime you plug a printer into a computer and share the printer over the network, the sharing system can be referred to as a print server.
What does DHCP mean?
DHCP = Dynamic Host Control Protocol
What does a DHCP server do?
A DHCP server provides your computer with all the IP information it needs to get on the network.
What does a DNS server do?
It tacks easy-to-remember DNS names for IP addresses.
What is a proxy server?
A proxy server is software that enables multiple connections to the internet to go through one protected computer. Application that want to access internet resources send requests to the proxy server instead of trying to access the internet directly, which both protects the client computers and enables the network administrator to monitor and restrict internet access.
What is a mail server?
A networked host or server that provides e-mail service.
What is an authentication server?
An authentication server is an application that facilitates authentication of an entity that attempts to access a network. Such an entity may be a human user or another server. An authentication server can reside in a dedicated computer, an Ethernet switch, an access point or a network access server.
What is syslog?
UNIX systems use a tool called syslog to create information placed in log files. Applications use syslog to write about issues happening to or about the application. Syslog works over networks. Syslog is NOT a program (like event viewer).
What does UTM stand for?
UTM = Unified threat management
What does UTM do?
UTM takes the traditional firewall and packages it with many other security features such as IPS, VPN, load balancing, antivirus, and many other features depending on the make and model. The UTM approach to building network gear helps build robust security deep into the network, protecting what really matters: our data.
What does IDS stand for?
Intrusion detection system
What does IDS do?
An IDS is an internet application that inspects packets, looking for active intrusions. An IDS functions inside the network, watching for threats that a firewall might miss such as viruses, illegal logon attempts. and other well known attacks. Plus, because it inspects traffic inside the network, the IDS can discover internal threats like the activity of a vulnerability scanner snuggled in on a flash drive by a disgruntles worker planning an attack on an internal database server.