Network Hosts Flashcards
Which networking task would best describe the process of authentication?
Obtaining an IP address configuration
Supplying a username and password
Submitting an http request
Supplying a username and password
Which mail protocol is responsible only for sending mail?
smtp
pop3
imap
smtp
What is the primary benefit of implementing a DHCP server on a network?
Client systems can obtain an IP address configuration automatically
Client systems can resolve names to IP addresses
Client systems can submit print jobs to single server
Client systems can obtain an IP address configuration automatically
Which networking benefits can be provided by implementing a proxy server? (Choose two)
Filtering of web content
Centralized file access
Increased speed for web content
Name to IP address resolution
Automatic client address configuration
Filtering of web content
Increased speed for web content
A legacy system is often maintained in a network environment for which reasons? (Choose two)
It is cheap
It maintains backward compatibility
They are often updated so there is no need to replace
It provides a unique or specialized service
It can run any software
It maintains backward compatibility
It provides a unique or specialized service
Which option would be the closest analogy to the DNS service?
An encyclopaedia
A Library
A phone book
A phone book
Which device or system would most likely not support using Syslog by default?
A switch
A Printer
A Windows server
A Windows server
Which of the following would you consider to be a downside of using a print server? (Choose two)
Print job status considerations
The number of clients that can be added
Multifunction printer considerations
The variety of protocols used
Administrative tasks
Print job status considerations
Multifunction printer considerations
A web server delivers content to clients using which protocol?
imap
pop3
http
http
Which networking device would be able to proactively stop an intrusion into your network?
IDS
UTM
IPS
IPS
Which statements accurately describe the circumstances of when it would be appropriate to use a dedicated file server? (Choose two)
When multiple computers on the network have local files they want to share
When security is a concern and clients should authenticate
When you only have a single server that must provide other services
When you require fast access to network attached storage
When you have only client systems on a home network
When security is a concern and clients should authenticate
When you require fast access to network attached storage