2.5 Network Services Flashcards
A server is any computer that is running a ____
sharing program. Client/Server architecture - the client requests something and the server delivers it
A Cyclic Redundancy Check (CRC) is ____
A data check to ensure the data in the frames was received in good order
The connection between a computer and a switch is called a _____ and limited to a distance of ____ meters or less
Segment. 100.
How do splitters(split a segment into two or more connections) affect signal quality in an ethernet switched network?
It will prevent the switch from recognizing which host is sending or receiving a signal and no host connected to a split segment will be able to communicate – negatively affecting signal quality
Shielded Twisted Pair (STP) consists of twisted pairs of wires surrounded by shielding to protect them from _____ .
Electromagnetic interference (EMI). Pretty rare because theres not much need for it unless in areas with excessive electronic noise
RJ-11 connects ______
your telephone to the telephone jack in the wall of your house. Primarily used for telephone based internet connections
There are two standards for connecting the RJ-45 connector to the UTP cable.
568A and 568B. you do not have to follow any standard as long as you use the same pairings on each end of the cable
Authentication Server is ____
a central repository of all the authentication credentials for your organization. Not usually on a home network
SIEM (security information and event management) allows you to _____
consolidate logs from all the different network services into a single database. used by security team to look for real time alerts and threats over time. Forensic Analysis
Standard Process for transferring log files to a SIEM is called ___
Syslog
Unified Threat Management (UTM)
an all in one security appliance that enables IDS/IPS and other security features all in one device
An endpoint management system allows _______ all from one device
Software installation. Driver installation. Software updates. Security Patches. Remote troubleshooting
in an IPV6 address the first 64 bits is generally the _____ and the last 64 bits is generally the ______
Network prefix. Host network address