Network Services Flashcards

1
Q

To connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which server is used to handle this type of request?

A

DNS Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the DNS database records listed below returns a 32-bit IP address?

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The DNS database AAAA record creates a pointer that maps a hostname to:

A

IPv6 Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the DNS database records maps a domain name to a list of mail servers for that domain?

A

MX
(Mail Exchange)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of a DNS TXT record?

A

Provides outside services with additional information about a domain
(Not used to direct any traffic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which DNS TXT records are used for spam management?

A

SPF (Sender Policy Framework)
DKIM (DomainKeys Identified Mail)
DMARC (Domain-based Message Authentication, Reporting & Conformance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What allows the receiver of an email message to verify that the message claimed to have come from a specific domain was indeed authorized by the owner of that domain?

A

DKIM
(DomainKeys Identified Mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An authentication method that enables signing an outbound email message with digital signature.

A

DKIM
(DomainKeys Identified Mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An open standard defining a technical method to prevent electronic mail sender address forgery.

A

SPF (Sender Policy Framework)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A DNS TXT record that allows the owner of a domain to specify all the servers authorized to send mail from their domain?

A

SPF (Sender Policy Framework)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A DNS TXT record containing instructions for the recipient of an email message on how to handle emails that do not align with the sender’s mail policies?

A

DMARC
(Domain-based Message Authentication, Reporting & Conformance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which server type enables automatic allocation of IP addresses on a network?

A

DHCP Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as what?

A

Lease

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which term refers to permanent IP address assignment from a DHCP server?

A

Reservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A range of IP addresses that a DHCP server can lease out to DHCP clients is known as?

A

Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A dedicated file server is also referred to as what?

A

FTP Server

17
Q

IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable what kind of network service?

A

Printing

18
Q

What is the function of an SMTP server?

A

Email Handling

19
Q

Which type of server is used for collecting diagnostic and monitoring data from networked devices?

A

Syslog Server

20
Q

What is the function of an HTTP server?

A

Serving of web pages

21
Q

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

A

Authentication

22
Q

The process of granting or denying access to resources? (Part of AAA security architecture)

A

Authorization

23
Q

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called what?

A

Accounting

24
Q

2 solutions that provide the AAA functionality

A

TACACS+ (a remote authentication protocol)
RADIUS

25
Q

The protocol and port number used by spam filter?

A

SMTP
25

26
Q

A physical network device or software solution designed for managing the optimal distribution of workloads across multiple computing resources is known as:

A

A Load Balancer

27
Q

In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as:

A

A Proxy

28
Q

Which system refers to industrial and manufacturing control system?

A

SCADA
(Supervisory Control and Data Acquisition)

29
Q

An emerging field of new technologies, such as wearable tech or home automation is known as what?

A

IoT
(Internet of Things)