Lesson 11-12 Assessment Flashcards

1
Q

cloud hosting

A

used for hosting the packages of a website ran in the virtual cloud of several hardware computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

virtual private server

A

the ISP allocates a virtual machine on a physical server. This is isolated from other customer instances by the hypervisor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HTTP

A

Hypertext Transfer Protocol
is an application protocol that enables clients to request resources from an HTTP server using a URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Use of email and voice services

A

email services: enables a person to compose a message and send it to another user on their own network or anywhere in the world via the Internet.

voice services: standard methods for the provision of business and social communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TFTP vs FTP

A

FIle transfer protocol is an TCP application protocol used to transfer files between
network hosts.

Trivial File Transfer Protocol is a UDP application protocol that only supports GET and PUT commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SQL

A

structure query language is an programming and query language common to many relational database management systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

POP

A

Post Office Protocol is a mailbox access protocol that allows the download of email messages from a server mailbox to a client but not management of the remote inbox. Its most active version is POP 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SMTP

A

Simple mail transfer protocol an application protocol that discovers the IP address of the recipient SMTP server by using the domain name part of their email address.

SMTP is useful only to deliver mail to hosts that are permanently available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IMAP

A

Internet Message Access Protocol is a mail retrieval protocol that supports permanent connections to a server and connecting multiple clients to the same mailbox simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is VOIP hard to support

A

Voice and video services can be challenging to support because they require response times measured in milliseconds (ms). Delayed responses will result in poor call or video quality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SIP

A

Session Initiation Protocol is a session control protocol used to establish, disestablish, and manage VoIP and conferencing communications sessions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What happens if a message sent via SMTP cannot be delivered?

A

The server generates a non-delivery report (NDR) with an appropriate error code and discards the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What protocol would enable a client to manage mail subfolders on a remote mail server?

A

Internet Message Access Protocol or IMAP Secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False? SIP enables the location of user agents via a specially formatted URI.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Follow these guidelines to support network applications effectively:

A

Configure web servers with a valid certificate issued by a locally trusted or public certificate authority to enable HTTPS over TCP/443.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Follow these guidelines to support network applications effectively:

A

Enable secure FTP on web servers, file servers, and appliances as a means of transferring files securely.

17
Q

What is a directly connected route?

A

An IP network or subnet connected to one of the router’s interfaces.

18
Q

Which of the parameters in the following routing table entry represents the gateway?

R 192.168.1.0/24 [120/1] via 198.51.100.254, GigabitEthernet0/1

A

198.51.100.254—the gateway is the address of the next hop router. 1

92.168.1.0/24 is the destination and GigabitEthernet0/1 is the interface

19
Q

What type of routing table entry is shown below?

S* 0.0.0.0/0 [1/0] via 192.0.2.1

A

static entry for the default route

20
Q

What happens if a message sent via SMTP cannot be delivered?

A

the server generates a non-delivery report (NDR) with an appropriate error code and discards the message.

21
Q

Follow these guidelines to support network applications effectively:

A

Deploy web servers to intranets as required. Public websites can be deployed to a perimeter network, but most organizations use some type of hosted or cloud service.

22
Q

True or False? SIP enables the location of user agents via a specially formatted URI.

A

True

23
Q

Terminal emulator

A

A terminal emulator is a built-in Linux command/software that processes text input and output between users or the shell.

24
Q

RMP

A

Remote Desktop Protocol is an application protocol developed by Microsoft that provides encrypted remote GUI connections to a physical Windows machine.

25
Q

NTP

A

Network Time Protocol is used for time synchronization of devices and many time-dependent applications.

26
Q

True or false? SSH must be configured with two key pairs to operate; one on the server and one on the client.

A

False; Secure shell, is an application protocol that supports secure tunneling and remote terminal emulation. The client may use a key pair or other mechanisms, such as a password for authentication.

27
Q

What remote management service is associated with TCP port 23?

A

Telnet is a remote management service that supports insecure terminal emulation for remote host management and transmits shell commands.

28
Q

Which port is used by the Network Time Protocol (NTP)?

A

UDP/123 becuase 123 is the client’s source port.

29
Q

SNTP

A

A Simple network time protocol is a modified version of NTP. it is usually used by client hosts to synchronize the device time. A client host that supports only SNTP cannot act as a time source for other hosts.

30
Q

What sort of log would you inspect if you wanted to track web server access attempts?

A

Audit/security/ and access log.

31
Q

What would be the purpose of configuring thresholds in network monitoring software?

A

The software could produce an alert if network performance did not meet any given metric.

32
Q

How is jitter mitigated by a VoIP application?

A

By buffering packets.

33
Q

What is a top listener in terms of network monitoring?

A

An interface that receives the most incoming traffic.

34
Q

Configure endpoints to provide information to the log collector. This could involve one or more different methods, such as:

A

Configure SNMP traps.

  • Configure remote logging to the using syslog or a similar protocol.
  • Configure NetFlow/IPFIX exporters.
  • Deploy agents to the endpoints to perform log and performance counter collection and measurement