Network Services and Cloud (Chapter 8) Flashcards

1
Q

Can a DHCP server run with no scope?

A

No, it must at least have one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whats the difference between a NAS and SAN?

A

NAS is a standalone device with its own software to provide file access.
SAN is a collection of servers dedicated to storage and file management.

N is at the end of SAN, meaning its a network of servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is UTM?

A

Unified threat management
Security solution that integrates multiple security features, such as firewall, antivirus, intrusion detection, and content filtering, into a single device, most often centralized on one interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is PaaS?

A

Platform as a Service
Provides a platform for developing, running, and managing applications without dealing with the underlying infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SaaS?

A

Software as a Service
Software applications are delivered over the internet on a subscription basis
Users access them via a web browser without managing the underlying infrastructure (ex. Google Docs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the highest level of the three cloud computing models?

A

SaaS. It includes everything in IaaS and PaaS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a private cloud?

A

A company’s individual cloud set up within their own network
Main benefit is security control
Removes the benefit of rapid elasticity/scalability
Example: Microsoft Azure, vSphere

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 4 main characteristics of cloud computing?

A
  • On-demand self-service
  • Broad network access (a variety of devices can use it)
  • Resource pooling (provider’s resources are divided up among clients)
  • Rapid elasticity (scale up and down as needed)
  • Measured/metered service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What servers should be placed in a screened subnet?

A

Any server that needs to be accessed by the outside world
It provides a firewall for that server, then an additional one for the actual intranet.

This is also called a DMZ!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does an administrator need to set up when creating a DNS server?

A

A zone file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When would a DHCP relay agent be needed?

A

If the server and client are on different subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the differences between CDMA and GSM?

A

CDMA:
- Uses code division so users share the same frequency band
- More efficient bandwidth usage
- Tied to the carrier, meaning phones are locked to a specific network
- Example: Verizon and Sprint in the U.S.

GSM:
- Uses time and frequency division
- Utilizes SIM cards, allowing easy switching between phones and carriers
- More widely adopted globally
- Example: AT&T and T-Mobile in the U.S

CDMA does not use sim cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a hybrid cloud?

A

Combines public and private clouds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a public cloud?

A

Operated by third-party company and gives scalability, reliability, flexibility
On demand–client gets whatever they want

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a cloud’s measured service?

A

Cloud provider charges the client based service usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is high availabilty?

A

Refers to uninterrupted and responsive service
Importance of this varies between companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three main uses for virtual machines?

A
  • Sandbox
    – temp. isolated environment to prevent changes to the physical machine
  • Test Development
    – to create and test applications on a different OS
  • Application Virtualization
    – to virtualize legacy software in an older OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the hypervisor (a.k.a. VMM)?

A

Software that allows multple operating systems to share the same host
Also manages resource allocation

Key enabler for virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a type 1 hypervisor?

A

Machine (usually a server) that doesn’t have an OS and only exists to create VMs directly off its own hardware (great for performance)

Examples include:
VMware ESXi, Microsoft Hyper-V (Hyper-V Server), Citrix XenServer

Also called a bare-metal hypervisor

20
Q

What is a type 2 hypervisor?

A

Operates on top of an existing OS (host) and has some performance overhead

Exmaples include: VMware Workstation, Oracle VirtualBox, Parallels Desktop (for Mac), and Microsoft Virtual PC.

21
Q

What is client-side virtualization?

A

Multiple OSs managed on a client machine instead of a server

22
Q

What does virtual desktop infrustructure (VDI) refer to?

A

The software and hardware needed to create a virtual environment

23
Q

Does a virtual NIC have to be connected to a physical NIC?

A

No. Virtual networks are possible.

24
Q

What is emulation?

A

Replication of physical machine requirements done by the hypervisor
Does not relate to the support of multiple OSs, just runs the same as one specific OS

25
Q

Whats the solution to VM attack threats?

A

Keep both systems updated

26
Q

What is a syslog server?

A

Centralized logging server that receives messages generated by clients that triggered certain conditions (ex. log in, error)

Based on client-server model

27
Q

What does a web server do?

A

Configured with web hosting software, it listens for in/outbound requests on port 443

28
Q

What is a domain controller?

A

Centralized authentication server

29
Q

What is a spam gateway?

A

Software or virutal appliance that blocks malicious emails from entering the network

30
Q

What is unified threat management (UTM)?

A

Single device/interface that centralizes security management and replaces a firewall

Generally does:
Packet filtering, intrusion prevention, website blocking, spam blocking

31
Q

What is load balancing?

A

Multiple servers help balance out work
Often, they are ogranized in groups that handle specific types of requests

32
Q

What does three benefits does load balancing provide?

A

Performance
Scalability (if cloud)
Reliability

33
Q

What does a proxy server do?

A

Makes requests on behalf of a client
It can conceal the sender’s identity or act as a filter

34
Q

What is AAA?

A

Authentication, Authorization, and Accounting
Framework or system used to manage access to network resources and services, ensuring secure and controlled access for users and devices

35
Q

What requires RADIUS?

A

VPN
It remotely authenticates them when logging in

36
Q

What is SCADA?

A

Supervisory control and data acquisition
A category of legacy systems that control manufacturing machines and infrastructure settings

37
Q

Whats contained in a DHCP scope (4)?

A

Subnet mask
Gateway
DNS servers
Lease duration

38
Q

What are two main characteristics of a SAN?

A

Uses block-level storage
Requires a high-speed connection

39
Q

A SOHO site has an IoT network. Whats the best way to protect the network (all of it) from IoT hacking?

A

Put the IoT devices in a DMZ (firewall sandwich)

40
Q

What technology imitates hardware without relying on the CPU being able to run the software code directly?

A

Emulation

41
Q

What is the difference between emulation and virtualization?

A

Emulation mimics a whole different hardware architecture
Virtualization is for running software built for similar or the same architecture as the host

42
Q

Which of the following refers to using virtual machines as a method of provisioning workstations for corporate users?

SaaS
VDI
IaaS
PaaS

A

VDI
Same thing as DaaS

43
Q

Which cloud computing concept is BEST described as focusing on the replacement of physical hardware at a customer’s location with cloud-based resources?

PaaS
IaaS
SECaaS
SaaS

A

IaaS

44
Q

What kind of internet access uses bi-directional data communication via radio frequency channels on a hybrid fiber coaxial (HFC)?

A

Cable

45
Q

What is AMD’s version of a hypervisor?

A

AMD-V

46
Q

Two antennas that are able to communicate with eachother without obstructions is using what kind of connection?

A

Line of sight

47
Q

Which of the following Network Configurations on a Virtual Machine are used to prevent the VM from accessing the Internet, but still allow it to communicate with the other VMs on the Host and the Host Itself?

Private
Internal
LocalHost
External

A

Internal
Exists within an internal virtual network