2.5 Summarize the properties and purposes of services provided by networked hosts. Flashcards

1
Q

One of the most popular server types on the internet is the ___. It responds to browser requests sent from the browsers on your computer.

A

web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

HTML and HTML5 protocols are associated with what?

A

web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between static web pages and dynamic web pages?

A

static- created previously.

dynamic- created when the client is requesting them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AFP and SMB protocols stand for what and are associated with what?

A

Apple filing protocol, Server Message Block (windows). They are used by file servers. SMB can be used for print servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If there are printers on your network, than you probably have ___ that act as a middleman between you and that printing device. They can run inside a PC or or be plugged into the printer.

A

print servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

LPD, and IPP stand for what and are associated with what?

A

Line Printer Daemon, Internet Printing Protocol. Associated with print servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you turned on your computer and you were able to get access to the network without any additional configurations, then you’re probably using DHCP.

A

DHCP, Dynamic Host Configuration Protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DHCP protocol does what?

A

It can automatically configure the IP addressing for your device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If you’re using DNS at home, you’re probably making use of a DNS server at your (1)___. If you’re an organization that has your own internal services, then you probably (2)___.

A

(1) internet service provider

(2) have your own

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Some organizations use a ___ for all of their internet communication.

A

proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A ___ is an intermediate server that sits between you and some other third party network and makes requests on your behalf.

A

proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Since a proxy sits in the middle of the communication, it’s a perfect place to perform some security functions such as…

A

access control, malware scanning, and content filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

We’re used to reading through our email messages on our mobile devices and our computers. And the device that allows us to do that is the ___.

A

mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The device that checks credentials is an ___. It’s a centralized repository of all of the credentials, usernames, passwords for your organization.

A

authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Authentication is usually spread across multiple servers. So if one server happens to go down, your system can still authenticate your users. This is known as

A

redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An organization that has mail, authentication, proxy, DHCP, DNS, or web servers then you probably need a ___ device.

A

SIEM

17
Q

SIEM stands for what, and means?

A

security information and event management. It allows you to consolidate logs from all servers and network devices into one single database.

18
Q

There’s a standard process for transferring log files to a SIEM, and this standard is called a ___. This means also that you’re going to need to store all of this data over a very long period of time, so you’re probably going to need a lot of storage space.

A

syslog

19
Q

Some syslog consolidation tools and SIEMs will use WORM drive technology. That stands for Write Once Read Many. And so you’re able to write once onto optical drives, and no one is able to ___ that information later.

A

change

20
Q

Network administrators need some way to watch for intrusions onto their network. And they do this by using either an ___ or an ___.

A

IDS/IPS

21
Q

You might see IDS/IPS/SIEM components collapsed into a single device. Also known as a next-generation firewall or a ___ device. This could also be called a web security gateway.

A

UTM (Unified Threat Management device)

22
Q

With an ___, you can install/update software, driver installations, security patch, or troubleshoot on all of your workstations with just one console.

A

endpoint management server

23
Q

Most ___ require that you install an agent initially on everyone’s workstation. But once that installation is done, you’re able to manage everyone from this central console.

A

endpoint management servers

24
Q

___ are systems that are not normal operating systems but they have a connectivity to a network, usually for specific enterprise functions.

A

embeded systems

25
Q

What are 2 examples of embedded systems?

A

time card clocks, security systems