HW #2.2 Flashcards

1
Q
  1. What is a server? How is it different than a desktop computer?
A

A server is similar to a computer in structure, except that it is much more powerful; able to handle more data, users, applications and support enterprise-level activities, communications and data transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. What is an IP address?
A

An IP address is an identifier of computers/devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. What is the idea behind DNS? Why would you give a server a domain name?
A

The purpose of DNS is to translate human-readable domain names into IP addresses. Giving a server a domain name makes it easier for people to access websites and services without needing to remember complex IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. How do you display the IP address of your server?
    *
A

hostname -i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. What are the similarities and differences between a hub and a switch?
A

A hub is an unintelligent device that broadcasts a signal to all devices connected to the hub, whereas a switch can direct traffic to a specific destination. Both a hub and a switch manages data flow and traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. What is the main difference between a hub/switch and a router?
    *
A

The main difference between a hub/switch and a router is that a switch and hub creates and contains a network, whereas a router allows traffic to travel within networks. Think of a switch as a gate to a city, and the router as roads within that city.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. What is the difference between a modem and a router and what does each do?
A

A modem brings internet into a home and/or business. A router routes and passes internet connection in your devices.

The modem also demodulates incoming analog signals and modulates outgoing digital signals; while routers act as wireless access points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. What is CPU and what does it do?
A

CPU is a central processing unit responsible for executing instructions of a program and performing various calculations and operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What is the difference between disk space and RAM?
A

main difference between disk space and RAM is that disk space refers to storage, whereas RAM refers to the amount of memory available to conduct an application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is RAM required to do?

A

RAM is required to run applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. What does it mean if you’re low on memory?
A

It means a computer’s available RAM is running out or being heavily used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does it mean if you’re low on disk space?

A

It means you are running out of “physical” space to store programs or applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. What is the command to check storage on the drives on your server?
A

df -h

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. What is the general idea behind a transport protocol?
A

It’s the method in which data is being transported from server to server. The main ones are UDP and TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. What is the 3-way handshake comprised of, and which transport protocol is it associated with?
A

3-way handshake = 1. Syn 2. Syn Ack 3. Ack received ; it is associated with TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. What is the “Fire and Forget” protocol?
A

The Fire and Forget protocol is UDP, which is a server that continually bombards another server with data or transmissions without caring whether it is being received.

17
Q
  1. Which transport is faster?
A

UDP because there are no checks.

18
Q
  1. Which transport is more secure
A

TCP, because it validates the receipt of data.

19
Q
  1. How do you know what ports are open and listening on your server?
A

Use ss -tanpu or -tulpn command and then look at state section of information log

20
Q
  1. What is ping used for? (Give at least 2 examples)
A

query whether a server is connected to the internet.

check whether there is a DNS error or a network card failure.

21
Q
  1. What is a loopback test for? How do you do it?
A

A loopback test determines whether your own server is the point of failure, and further helps determine where the failure is coming from. To run a loopback test, you can write in the CLI:
ping 127.0.0.1
or
ping localhost

22
Q
  1. How do you verify that DNS resolution is working properly?
A

ping (Insert Hostname)

23
Q
  1. If an IP is reached successfully, but not its domain name, what could be a possible problem?
A

It’s possible you have the wrong DNS, or the domain name server is down, or the DNS resolver is down.

24
Q
  1. How do you test connectivity to the internet?
A

ping google.com

25
Q
  1. What are ports? How are they used?
A

Ports are like doorways to servers. Data must be directed to doorways that are open to that specific stream of data, otherwise it does not come through or is “blocked”. They are attached to the end of an IP address with a colon followed by a number, such as 123.24.88.4:8089

26
Q
  1. Explain what firewalls do.
    *
A

Firewalls can be regarded as the walls of a gated city, preventing traffic from coming in and only allowing it to enter in specific locations.

They block all traffic that have not been specified in the ACL as being “allowed”.

27
Q
  1. What is an ACL or Access Control List?
    *
A

List of rules that specifies which users or systems are granted or denied access to a particular system resource.

28
Q
  1. What are host-based firewalls?
A

Host-based firewalls are firewalls between different servers within the same network to subdivide traffic and prevent the breach of one area of the network to infect the entire network.

29
Q
  1. What are network-based firewalls and what might they look like?
A

Network-based firewalls are firewalls placed at the outer perimeter of a network to protect it from outside traffic and malicious actors.

30
Q
  1. Explain VPN in simple terms.
A

It is a virtual private network that provides a secure connection to a network of servers (they can add in that remote workers are required to use this)

31
Q
  1. Give an example of a type/brand of VPN that is commonly used by corporations
A

Cisco AnyConnect, Palo Alto Global Protect, Citrix Gateway, Zscaler, CheckPoint, Ivanti, Big-IP, Aruba, IPSec, Akamai

32
Q
  1. Show the IP address of your server and post the “print out” that you get back after the command is run.
A

hostname - i .

33
Q
  1. Show how you would find out the applications on your computer that are actively listening on a port. Post the result.
A

ss -tanpu

34
Q
  1. How would you find the remaining disk space capacity on your instance?
A

df -h

35
Q
  1. How would you determine when a file or directory is consuming too much space? Share an example with the directory /var/log
A

du /var/log

36
Q
  1. Test your connectivity to the internet and limit the packet count to 5. Post screenshot.
A

ping -c5 <Ip></Ip>