2.5 Network Services Flashcards

1
Q

A server is any computer that is running a ____

A

sharing program. Client/Server architecture - the client requests something and the server delivers it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A Cyclic Redundancy Check (CRC) is ____

A

A data check to ensure the data in the frames was received in good order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The connection between a computer and a switch is called a _____ and limited to a distance of ____ meters or less

A

Segment. 100.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do splitters(split a segment into two or more connections) affect signal quality in an ethernet switched network?

A

It will prevent the switch from recognizing which host is sending or receiving a signal and no host connected to a split segment will be able to communicate – negatively affecting signal quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shielded Twisted Pair (STP) consists of twisted pairs of wires surrounded by shielding to protect them from _____ .

A

Electromagnetic interference (EMI). Pretty rare because theres not much need for it unless in areas with excessive electronic noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RJ-11 connects ______

A

your telephone to the telephone jack in the wall of your house. Primarily used for telephone based internet connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There are two standards for connecting the RJ-45 connector to the UTP cable.

A

568A and 568B. you do not have to follow any standard as long as you use the same pairings on each end of the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication Server is ____

A

a central repository of all the authentication credentials for your organization. Not usually on a home network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SIEM (security information and event management) allows you to _____

A

consolidate logs from all the different network services into a single database. used by security team to look for real time alerts and threats over time. Forensic Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Standard Process for transferring log files to a SIEM is called ___

A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unified Threat Management (UTM)

A

an all in one security appliance that enables IDS/IPS and other security features all in one device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An endpoint management system allows _______ all from one device

A

Software installation. Driver installation. Software updates. Security Patches. Remote troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

in an IPV6 address the first 64 bits is generally the _____ and the last 64 bits is generally the ______

A

Network prefix. Host network address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly