Network Services Flashcards

1
Q

To connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?
ICS server
Web server
DNS server
DHCP server

A

DNS Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the DNS database records listed below returns a 32-bit IP address?
MX
AAAA
CNAME
A
PTR

A

A

An A record maps a domain name to the IP address (Version 4) of the computer hosting the domain. An A record uses a domain name to find the IP address of a computer connected to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The DNS database AAAA record creates a pointer that maps a hostname to:
IPv4 address
Mail server
IPv6 address
Canonical name

A

IPv6 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following DNS database records maps a domain name to a list of mail servers for that domain?
NS
SPF
MX
PTR

A

MX

mail exchange record, is a DNS record that routes emails to specified mail servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of a DNS TXT record? (Select 2 answers)

Resolves an IP address to a hostname for reverse lookups
Maps a domain name to a list of mail servers for that domain
Provides outside services with additional information about a domain
Not used to direct any traffic
Allows multiple domain names to resolve to the same IP address

A

Provides outside services with additional information about a domain
Not used to direct any traffic

TXT records are a type of Domain Name System (DNS) record in text format, which contain information about your domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which DNS TXT records are used for spam management? (Select 3 answers)

SPF
DKIM
SRV
DMARC
PTR

A

DKIM
DMARC

DKIM (DomainKeys Identified Mail) is a protocol that allows an organization to take responsibility for transmitting a message by signing it in a way that mailbox providers can verify. DKIM record verification is made possible through cryptographic authentication.

DMARC (Domain-based Message Authentication Reporting & Conformance)is an open email authentication protocol that provides domain-level protection of the email channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following allows the receiver of an email message to verify that the message claimed to have come from a specific domain was indeed authorized by the owner of that domain?
SRV
DKIM
NS
CNAME

A

DKIM

DKIM (DomainKeys Identified Mail) is a protocol that allows an organization to take responsibility for transmitting a message by signing it in a way that mailbox providers can verify. DKIM record verification is made possible through cryptographic authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the answers listed below refers to an authentication method that enables signing an outbound email message with digital signature?
SPF
DKIM
SRV
DMARC

A

SPF

Sender Policy Framework (SPF) is an email authentication standard that domain owners use to specify the email servers they send email from, making it harder for fraudsters to spoof sender information. SPF email policies are widely used across the globe and are currently defined by the IETF under section RFC 7208.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the answers listed below refers to a DNS TXT record that allows the owner of a domain to specify all the servers authorized to send mail from their domain?
DKIM
SRV
CNAME
SPF

A

SPF

Sender Policy Framework (SPF) is an email authentication standard that domain owners use to specify the email servers they send email from, making it harder for fraudsters to spoof sender information. SPF email policies are widely used across the globe and are currently defined by the IETF under section RFC 7208.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following answers refers to a DNS TXT record containing instructions for the recipient of an email message on how to handle emails that do not align with the sender’s mail policies?
DKIM
SPF
NS
DMARC

A

DMARC

Domain-based Message Authentication Reporting & Conformance
is an open email authentication protocol that provides domain-level protection of the email channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which server type enables automatic allocation of IP addresses on a network?
DNS server
DHCP server
FTP server
HTTP server

A

DHCP Server
Dinamic Host COntrol Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as:
Option
Reservation
Scope
Lease

A

Lease

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the terms listed below refers to permanent IP address assignment from a DHCP server?
Scope
Reservation
DHCP relay
Lease

A

Reservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A dedicated file server is also referred to as:
SMTP server
DNS server
HTTP server
FTP server

A

FTP Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable what kind of network service?
Name resolution
Printing
Email handling
IP address allocation

A

Printing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the function of an SMTP server?
Authentication
File storage & sharing
Name resolution
Email handling

A

Email Handling

17
Q

Which type of server is used for collecting diagnostic and monitoring data from networked devices?
Proxy server
UC server
Syslog server
ICS server

A

Syslog Server

18
Q

What is the function of an HTTP server?
File storage
Serving of web pages
Name resolution
Email handling

A

Serving of web pages

19
Q

Which part of the AAA security architecture deals with the verification of the identity of a person or process?
Authentication
Authorization
Accounting

A

Authentication

20
Q

Which of the answers listed below refers to the process of granting or denying access to resources?

Authentication
Authorization
Accounting

A

Authorization

21
Q

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called:
Authentication
Authorization
Accounting

A

Accounting

22
Q

Which of the following solutions provide the AAA functionality? (Select 2 answers)
CHAP
TACACS+
PAP
RADIUS
MS-CHAP

A

TACACS+
RADIUS

TACACS+ is a remote authentication protocol, which allows a remote access server to communicate with an authentication server to validate user access onto the network. TACACS+ allows a client to accept a username and password, and pass a query to a TACACS+ authentication server.

Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that authorizes and authenticates users who access a remote network.

23
Q

Which of the answers listed below refer to the protocol and port number used by spam filter? (Select 2 answers)
HTTPS
23
SMTP
443
Telnet
25

A

SMTP
25

24
Q

The term “Unified Threat Management” (UTM) refers to a network security solution, commonly in the form of a dedicated device (called UTM appliance or web security gateway), which combines the functionality of a firewall with additional features such as URL filtering, content inspection, spam filtering, gateway antivirus protection, IDS/IPS function, or malware inspection.
True
False

A

True

25
Q

A physical network device or software solution designed for managing the optimal distribution of workloads across multiple computing resources is known as:
Content filter
Proxy server
Load balancer
Domain controller

A

Load Balancer

26
Q

In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as:
Bridge
Active hub
Server
Proxy

A

Proxy

27
Q

Which of the following answers refers to industrial and manufacturing control system?
EDR
CMS
SCADA
MDM

A

SCADA

SCADA is the acronym for Supervisory Control and Data Acquisition. SCADA is a computer-based system for gathering and analyzing real-time data to monitor and control equipment that deals with critical and time-sensitive materials or events.

28
Q

An emerging field of new technologies, such as wearable tech or home automation is known as:
SoC
NFC
IoT
ESN

A

IoT
Internet of Things