Network Services Flashcards
To connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?
ICS server
Web server
DNS server
DHCP server
DNS Server
Which of the DNS database records listed below returns a 32-bit IP address?
MX
AAAA
CNAME
A
PTR
A
An A record maps a domain name to the IP address (Version 4) of the computer hosting the domain. An A record uses a domain name to find the IP address of a computer connected to the internet.
The DNS database AAAA record creates a pointer that maps a hostname to:
IPv4 address
Mail server
IPv6 address
Canonical name
IPv6 address
Which of the following DNS database records maps a domain name to a list of mail servers for that domain?
NS
SPF
MX
PTR
MX
mail exchange record, is a DNS record that routes emails to specified mail servers.
What is the function of a DNS TXT record? (Select 2 answers)
Resolves an IP address to a hostname for reverse lookups
Maps a domain name to a list of mail servers for that domain
Provides outside services with additional information about a domain
Not used to direct any traffic
Allows multiple domain names to resolve to the same IP address
Provides outside services with additional information about a domain
Not used to direct any traffic
TXT records are a type of Domain Name System (DNS) record in text format, which contain information about your domain.
Which DNS TXT records are used for spam management? (Select 3 answers)
SPF
DKIM
SRV
DMARC
PTR
DKIM
DMARC
DKIM (DomainKeys Identified Mail) is a protocol that allows an organization to take responsibility for transmitting a message by signing it in a way that mailbox providers can verify. DKIM record verification is made possible through cryptographic authentication.
DMARC (Domain-based Message Authentication Reporting & Conformance)is an open email authentication protocol that provides domain-level protection of the email channel.
Which of the following allows the receiver of an email message to verify that the message claimed to have come from a specific domain was indeed authorized by the owner of that domain?
SRV
DKIM
NS
CNAME
DKIM
DKIM (DomainKeys Identified Mail) is a protocol that allows an organization to take responsibility for transmitting a message by signing it in a way that mailbox providers can verify. DKIM record verification is made possible through cryptographic authentication.
Which of the answers listed below refers to an authentication method that enables signing an outbound email message with digital signature?
SPF
DKIM
SRV
DMARC
SPF
Sender Policy Framework (SPF) is an email authentication standard that domain owners use to specify the email servers they send email from, making it harder for fraudsters to spoof sender information. SPF email policies are widely used across the globe and are currently defined by the IETF under section RFC 7208.
Which of the answers listed below refers to a DNS TXT record that allows the owner of a domain to specify all the servers authorized to send mail from their domain?
DKIM
SRV
CNAME
SPF
SPF
Sender Policy Framework (SPF) is an email authentication standard that domain owners use to specify the email servers they send email from, making it harder for fraudsters to spoof sender information. SPF email policies are widely used across the globe and are currently defined by the IETF under section RFC 7208.
Which of the following answers refers to a DNS TXT record containing instructions for the recipient of an email message on how to handle emails that do not align with the sender’s mail policies?
DKIM
SPF
NS
DMARC
DMARC
Domain-based Message Authentication Reporting & Conformance
is an open email authentication protocol that provides domain-level protection of the email channel
Which server type enables automatic allocation of IP addresses on a network?
DNS server
DHCP server
FTP server
HTTP server
DHCP Server
Dinamic Host COntrol Protocol
The time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as:
Option
Reservation
Scope
Lease
Lease
Which of the terms listed below refers to permanent IP address assignment from a DHCP server?
Scope
Reservation
DHCP relay
Lease
Reservation
A dedicated file server is also referred to as:
SMTP server
DNS server
HTTP server
FTP server
FTP Server
IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable what kind of network service?
Name resolution
Printing
Email handling
IP address allocation
Printing
What is the function of an SMTP server?
Authentication
File storage & sharing
Name resolution
Email handling
Email Handling
Which type of server is used for collecting diagnostic and monitoring data from networked devices?
Proxy server
UC server
Syslog server
ICS server
Syslog Server
What is the function of an HTTP server?
File storage
Serving of web pages
Name resolution
Email handling
Serving of web pages
Which part of the AAA security architecture deals with the verification of the identity of a person or process?
Authentication
Authorization
Accounting
Authentication
Which of the answers listed below refers to the process of granting or denying access to resources?
Authentication
Authorization
Accounting
Authorization
In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:
Authentication
Authorization
Accounting
Accounting
Which of the following solutions provide the AAA functionality? (Select 2 answers)
CHAP
TACACS+
PAP
RADIUS
MS-CHAP
TACACS+
RADIUS
TACACS+ is a remote authentication protocol, which allows a remote access server to communicate with an authentication server to validate user access onto the network. TACACS+ allows a client to accept a username and password, and pass a query to a TACACS+ authentication server.
Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that authorizes and authenticates users who access a remote network.
Which of the answers listed below refer to the protocol and port number used by spam filter? (Select 2 answers)
HTTPS
23
SMTP
443
Telnet
25
SMTP
25
The term “Unified Threat Management” (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.
True
False
True