2.5 Summarize the properties and purposes of services provided by networked hosts. Flashcards
One of the most popular server types on the internet is the ___. It responds to browser requests sent from the browsers on your computer.
web server
HTML and HTML5 protocols are associated with what?
web servers
What is the difference between static web pages and dynamic web pages?
static- created previously.
dynamic- created when the client is requesting them.
AFP and SMB protocols stand for what and are associated with what?
Apple filing protocol, Server Message Block (windows). They are used by file servers. SMB can be used for print servers.
If there are printers on your network, than you probably have ___ that act as a middleman between you and that printing device. They can run inside a PC or or be plugged into the printer.
print servers
LPD, and IPP stand for what and are associated with what?
Line Printer Daemon, Internet Printing Protocol. Associated with print servers.
If you turned on your computer and you were able to get access to the network without any additional configurations, then you’re probably using DHCP.
DHCP, Dynamic Host Configuration Protocol.
DHCP protocol does what?
It can automatically configure the IP addressing for your device.
If you’re using DNS at home, you’re probably making use of a DNS server at your (1)___. If you’re an organization that has your own internal services, then you probably (2)___.
(1) internet service provider
(2) have your own
Some organizations use a ___ for all of their internet communication.
proxy server
A ___ is an intermediate server that sits between you and some other third party network and makes requests on your behalf.
proxy server
Since a proxy sits in the middle of the communication, it’s a perfect place to perform some security functions such as…
access control, malware scanning, and content filtering
We’re used to reading through our email messages on our mobile devices and our computers. And the device that allows us to do that is the ___.
mail server
The device that checks credentials is an ___. It’s a centralized repository of all of the credentials, usernames, passwords for your organization.
authentication server
Authentication is usually spread across multiple servers. So if one server happens to go down, your system can still authenticate your users. This is known as
redundancy
An organization that has mail, authentication, proxy, DHCP, DNS, or web servers then you probably need a ___ device.
SIEM
SIEM stands for what, and means?
security information and event management. It allows you to consolidate logs from all servers and network devices into one single database.
There’s a standard process for transferring log files to a SIEM, and this standard is called a ___. This means also that you’re going to need to store all of this data over a very long period of time, so you’re probably going to need a lot of storage space.
syslog
Some syslog consolidation tools and SIEMs will use WORM drive technology. That stands for Write Once Read Many. And so you’re able to write once onto optical drives, and no one is able to ___ that information later.
change
Network administrators need some way to watch for intrusions onto their network. And they do this by using either an ___ or an ___.
IDS/IPS
You might see IDS/IPS/SIEM components collapsed into a single device. Also known as a next-generation firewall or a ___ device. This could also be called a web security gateway.
UTM (Unified Threat Management device)
With an ___, you can install/update software, driver installations, security patch, or troubleshoot on all of your workstations with just one console.
endpoint management server
Most ___ require that you install an agent initially on everyone’s workstation. But once that installation is done, you’re able to manage everyone from this central console.
endpoint management servers
___ are systems that are not normal operating systems but they have a connectivity to a network, usually for specific enterprise functions.
embeded systems