Network Services Flashcards

1
Q

DNS server
stands for
what does it do
how many

A

Domain name system
- converts names to IP address
- will prob have many dns servers within the same data center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DHCP server

A

Dynamic host configuration protocol
assigns IP addresses to devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These are file servers, what do they stand for
SMB windows
AFP mac

A

Server message block
apple filing protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

printer server
software running on computer
may also have hardware card allows the printer to connect to

A

an Ethernet connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are three protocols you can use for printers
SMB
IPP
LPD

A

SMB-server message block
IPP internet printing protocol
LDP line printer daemon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Syslog
SIEM:used to collect log files

A

a centralized database to view log information
Security information and event manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What two protocols are used for web servers
They are built with what coding langL

A

HTTP
HTTPS
HTML
HTML5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication server

A

a specialized server in a computer network that is responsible for verifying the identity of users or devices trying to access network resources. Its primary function is to authenticate and authorize users based on their provided credentials, such as usernames and passwords, digital certificates, or other authentication methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a mail gateway

A

a network device or software application that acts as an intermediary for the transmission of email messages
crucial role in the routing, filtering, and delivery of email messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Next-generation firewall, Unified Threat

A

an advanced network security device that combines traditional firewall capabilities with additional security features
.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Load balancers

A

a network device, software application, or service that efficiently distributes incoming network traffic or workload across multiple servers or resources* Distribute the load
– Multiple servers
– Invisible to the end-user
* Large-scale implementations
– Web server farms, database farms
* Fault tolerance
– Server outages have no effect - Very fast convergence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Load balancer features

A
  • Configurable load - Manage across servers
  • TCP offload - Protocol overhead
  • SSL offload - Encryption/Decryption
  • Caching - Fast response
  • Prioritization - QoS
  • Content switching - Application-centric balancing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Proxy servers
useful features 4

A
  • Proxy servers can hide a user’s IP address
    -Proxies can be configured to filter web content,
    -Proxies can cache frequently accessed web content locally
    -Load Balancing and Traffic Distribution:
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SCADA/ICS
hint:industrial

A
  • Supervisory Control and Data Acquisition System
    – Large-scale, multi-site Industrial Control Systems (ICS)crucial role in monitoring, controlling, and managing various processes and equipment in industries such as manufacturing, energy, water supply, transportation, and more.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Legacy devices what are they

A

– Another expression for “really old”
– May also be “really important”
– Learning old things can be just as important as
learning the new things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

embedded systems at a data center what are they

A

– Purpose-built device
– Not usual to have direct access to
the operating system
– Alarm system, door security, time card system

17
Q

ioT devices

A

Internet of things devices embedded with sensors, software, and network connectivity, allowing them to collect and exchange data with other devices and systems over the internethousehold appliances, vehicles, industrial machinery, medical devices,

18
Q

Bits: Each IPv4 address is made up of ____bits in total.

Bytes: Since each byte consists of ___bits, to find the number of bytes, you divide the total number of bits by ___:

___ bits / ____bits/byte = ____ bytes

So, an IPv4 address consists of 4 bytes.

Maximum Decimal Value for Each Byte: Since each byte in an IPv4 address is composed of 8 bits, you can calculate the maximum decimal value for each byte by taking 2^8 (2 raised to the power of 8):

2^8 = 256

Therefore, the maximum decimal value for each byte in an IPv4 address is 256. However, IPv4 addresses use values ranging from 0 to 255, not 1 to 256, so valid decimal values for each byte in an IPv4 address range from 0 to 255.

A

32 bits
8 bits
8
32bits
8bits
4 bytes

255

19
Q

IPv6
___bits
___bytes
they tend to be assigned with a ___ bit subnet mask meaning

A

128 bits in length, which is four times the length of IPv4 addresses (32 bits)

16 bytes because each byte consists of 8 bits.first

first 64 bits are the network address (subnet mask)
the last 64 bits are the host address

20
Q

what is a subnet masks

A

a 32-bit number used in Internet Protocol (IP) addressing to divide an IP address into network and host portions. It’s a fundamental concept in IP networking and plays a crucial role in determining how IP addresses are assigned to devices on a network. The subnet mask essentially tells devices which part of an IP address identifies the network and which part identifies the specific device within that network.

21
Q

what is a default gate way

A

The IP of a router if you need to communicate outside of your network

22
Q

The bootstrap protocol
what month/year was it established and what is it

A

used to assign IP addresses before dynamic host configuration protocol was createdoct 1993

23
Q

Dynamic host configuration protocol
what year

A

used to assign IP addresses
1997

24
Q

what is theDynamic host configuration protocol process 4 steps

A

DORA
* Step 1: Discover
- Client to DHCP Server
– Find all of the available DHCP Servers
* Step 2: Offer
- DHCP Server to client
– Send some IP address options to the client
* Step 3: Request
- Client to DHCP Server
– Client chooses an offer and makes a formal request
* Step 4: Acknowledgment
- DHCP Server to client
– DHCP server sends an acknowledgment to the client

25
Q

what are two things you can do if you want a device to always have the same IP address

A
  1. you can disable DHCP and configure the ip address information manually
  2. configure an IP reservation on the DHCP server
26
Q

What is a APIPA address

A

Automatic Private IP Addressing

feature in Microsoft Windows operating systems that allows a computer to automatically assign itself a private IP address when it is unable to obtain an IP address from a DHCP (Dynamic Host Configuration Protocol) server. APIPA is designed to provide a basic level of network connectivity when no DHCP server is available, ensuring that the computer can still communicate with other devices on the local network.
169.254.0.1 to 169.254.255.254, with a subnet mask of 255.255.0.0.
– Uses ARP to confirm the address isn’t currently in use

27
Q

how many root server clusters or DNS

A

13 root server clusters
over 1,000 actual servers

28
Q

Address records (A) (AAAA)

A

used to map domain names to IP addresses.

– This is the most popular query

  • A records are for IPv4 addresses

– Modify the A record to change the host name to IP address resolution

  • AAAA records are for IPv6 addresses

– The same DNS server, different records

28
Q

what are resource records that are used on a dns server

A
  • data entries used in DNS (Domain Name System)
    -DNS servers use these records to resolve domain names to their corresponding IP addresses or to provide other important information related to domain name
    -over 30 records types
29
Q

Mail exchanger record (MX)

A

MX records specify the mail servers responsible for receiving email messages on behalf of a domain. They include the mail server’s hostname and a priority value for routing email.

30
Q

TXT (Text) Record:
SPF

A

TXT (Text) record is a type of DNS (Domain Name System) resource record used to store plain text information associated with a domain name.

authentication purposes like SPF (Sender Policy Framework) records used in email authentication.

31
Q

(SPF)

A

Sender policy frame work

A mechanism that tell receiving email servers what servers they are allowed
for this domain
– Prevent mail spoofing:email that appears to come from a different source than it actually does.

32
Q

Domain Keys Identified Mail (DKIM)

A
  • authentication method and cryptographic technique used to verify the authenticity of email messages–
    -email server sends an outgoing message on behalf of a domain, it adds a DKIM signature to the message’s header.
    -This public key is used by receiving email servers to verify the DKIM signature.
  • The public key is in the DKIM TXT record
33
Q

DMARC

A

DMARC
* Domain-based Message Authentication, Reporting,
and Conformance (DMARC)
– Prevent unauthorized email use (spoofing)
– An extension of SPF and DKIM
* You decide what external email servers should do with
emails that don’t validate through SPF or DKIM
– That policy is written into a DMARC TXT record
– Accept all, send to spam, or reject the email
– Compliance reports can be sent to the email administrato

34
Q

Unified Threat Management (UTM) / Web Security Gateway:

A

Unified Threat Management (UTM) devices and Web Security Gateways are all-in-one security appliances that integrate multiple security features into a single platform. UTM devices typically include firewall, antivirus, anti-spam, URL filtering, and content filtering capabilities.