Network Services Flashcards

1
Q

What is the function of a file server?

A

File servers allow network clients to read/write files stored on a shared drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What protocol is commonly used for file sharing on Windows networks?

A

SMB (Server Message Block), which operates over port 445.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a print server?

A

Print servers manage print jobs for shared network printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is FTP, and what are its ports?

A

FTP is used for transferring files over the internet, operating on ports 20 and 21.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between HTTP and HTTPS?

A

HTTP (port 80) is unencrypted, while HTTPS (port 443) uses SSL/TLS encryption for secure connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of a digital certificate in HTTPS?

A

It verifies the server’s identity and enables encrypted communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the function of Apache web server software?

A

Apache is an open-source web server, commonly used on Linux and Unix systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the function of SMTP?

A

SMTP is used for sending emails between servers (port 25).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main advantage of IMAP over POP3?

A

IMAP syncs email across multiple devices, whereas POP3 downloads and deletes emails from the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Microsoft Exchange used for?

A

Exchange is an advanced email server used in corporate environments, supporting SMTP, POP3, and IMAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the components of AAA (Authentication, Authorization, Accounting)?

A

Authentication verifies identity, Authorization grants access, and Accounting tracks user activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What protocol is commonly used for centralized authentication in AAA systems?

A

RADIUS (Remote Authentication Dial-In User Service), which operates over UDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of Kerberos?

A

Kerberos provides mutual authentication and authorization in Windows domain environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary difference between Telnet and SSH?

A

Telnet is unencrypted, making it insecure, while SSH provides encrypted communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the function of RDP (Remote Desktop Protocol)?

A

RDP allows remote graphical access to Windows-based machines (port 3389).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does VNC (Virtual Network Computing) provide?

A

VNC allows cross-platform remote desktop access (port 5900).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Syslog used for?

A

Syslog is used to log events from network devices to a centralized server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is SNMP used for?

A

SNMP monitors network-attached devices and gathers data for management.

19
Q

What is the difference between in-band and out-of-band management?

A

In-band management shares the same network for regular data and management, while out-of-band uses a separate network for security.

20
Q

How does web caching improve network efficiency?

A

Caching stores copies of frequently accessed web pages, reducing load time and bandwidth usage.

21
Q

What security benefits do proxy servers offer?

A

Proxy servers can filter websites and block access to unsafe sites, enhancing network security.

22
Q

How do proxy logs help in bandwidth management?

A

Proxy logs identify high-traffic sites, allowing admins to block non-essential sites to optimize bandwidth.

23
Q

What is the main purpose of a load balancer?

A

A load balancer distributes incoming traffic across multiple servers to prevent overload on any single server.

24
Q

How do load balancers improve user experience?

A

By balancing traffic, load balancers ensure faster response times and prevent server overload.

25
Q

What is the primary purpose of Access Control Lists (ACLs)?

A

To control traffic flow by permitting or denying traffic based on criteria like IP addresses, port numbers, and protocols.

26
Q

Where are Access Control Lists typically applied?

A

On firewalls, routers, and other network infrastructure devices.

27
Q

Why is the order of rules important in ACL configuration?

A

ACL rules are processed top-down, and the first matching rule is applied, so more specific rules should be placed at the top.

28
Q

Name three types of firewalls.

A

Packet-Filtering, Stateful, Proxy.

29
Q

How do Stateful Firewalls differ from Packet-Filtering Firewalls?

A

Stateful firewalls track the state of connections, providing more advanced filtering, whereas packet-filtering firewalls examine individual packets without maintaining connection state.

30
Q

What is the primary purpose of Unified Threat Management (UTM) devices?

A

To consolidate multiple security functions (firewall, antivirus, intrusion prevention, VPN, etc.) into a single device.

31
Q

List two advantages of using UTM devices.

A

Cost savings and ease of use due to consolidation of multiple security functions.

32
Q

What is a major disadvantage of using UTM devices?

A

Single point of failure—if the UTM fails, all security functions are lost.

33
Q

How do Next-Generation Firewalls (NGFW) differ from Unified Threat Management (UTM) devices?

A

NGFWs consolidate security functions into a single, high-performance engine, offering better speed and efficiency than UTMs.

34
Q

When would you choose a Next-Generation Firewall (NGFW) over a UTM?

A

When high-speed and network efficiency are top priorities.

35
Q

What is the main difference between Information Technology (IT) and Operational Technology (OT)?

A

IT focuses on managing and processing data in traditional networks, while OT interacts with and controls physical processes in real-time.

36
Q

What is an Industrial Control System (ICS)?

A

ICS automates and controls machinery and industrial processes like manufacturing, energy production, and healthcare.

37
Q

What is prioritized in Industrial Control Systems (ICS)?

A

Availability and integrity are prioritized over confidentiality to ensure continuous operation and prevent downtime.

38
Q

Name two key components of Industrial Control Systems (ICS).

A

Embedded devices and Distributed Control Systems (DCS).

39
Q

What is the purpose of Fieldbus in ICS?

A

Fieldbus is a digital communication protocol used to link programmable logic controllers (PLCs) and sensors in OT.

40
Q

What is Supervisory Control and Data Acquisition (SCADA)?

A

SCADA is a system used for managing large-scale, geographically dispersed industrial control systems, enabling data collection and remote management.

41
Q

How does SCADA differ from ICS?

A

SCADA manages wide-area, multi-site control, while ICS is focused on controlling operations within a single facility.

42
Q

How do SCADA systems collect and transmit data?

A

SCADA systems use wide-area networks (WANs) or cellular/satellite connections to transmit data from field devices to SCADA servers.

43
Q

Provide an example of SCADA in action.

A

Smart meters in residential areas send data about electricity usage to a SCADA system for billing and grid monitoring.

44
Q

What are two key technologies used in ICS?

A

Programmable Logic Controllers (PLCs) and Human-Machine Interfaces (HMIs).