Network Services and Servers Flashcards

1
Q

What port does DHCP use on the server side? What is the other port used in DHCP?

A

The server side uses port UDP 67
The client side uses port UDP 68

Dynamic Host Control Protocol is used to assign/lease IP’s automatically to devices on the network from the DHCP Server Pool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the Apple equivalent network service to SMB? And what port?

A

AFP - Apple Filing Protocol is the equivalent service to Microsoft’s Server Message Block - both these services allow you to remotely communicate with the network server. Port tcp/548.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a file server used for?

A

To centrally store and share files on a network.

E.g. photos can be stored to a centralised network server using SMB on top of NetBIOS - less (port TCP 445) and they can then be accessed from any device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On older versions of the Windows OS what ports were used for file sharing across a network and what protocol ran on these ports?

What is the newer version of this protocol and what port does it use?

A

UDP ports 137-139 were used for the NetBIOS (Network Service) protocol to allow communication (file sharing) across computers/devices on the same network (LAN).

In newer versions of Windows NetBIOS-less protocol is used for the same job on port 445 - this is more secure as it is not an “in the clear” connection. (encrypted data in transit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a print server?

A

A print server is hardware or software that connects a printer to a LAN/network so that all connected network devices can utilise it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What standard printing protocols do print servers use (to receive/send print jobs)?

A

SMB - Server Message Block (Windows), LPD - Line Printer Daemon (MacOS), IPP - Internet Printing Protocol (Cross OS protocol, supports all OSs/Operating Systems Plural)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Network Services?

A

A way of sharing communal tools: printers, centralised file sharing, mailboxes to all devices connect to a network (LAN). Most of these tools are accessed through a server that controls and hosts them.

Network Services improve/extend the capabilities/abilities of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a redundant server and what is it used for?

A

A redundant server is a backup/clone server that can be activated if the primary/original server of that type fails. This eliminates any potential downtime.

Generally only vital servers have redundant servers/backup servers such as the Authentication server or Mail server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the role of the Authentication Server in a network?

A

It stores the user credentials of the networks users and provides services that allow users to login to the network/authentication/verification of who they are.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does UTM refer to in regards to network security?

A

Unified Threat Management (UTM) is a security approach where multiple security measures/features are rolled into one device or software.

For example a UTM Gateway may function as a firewall, spam filter, URL filter, VPN and Intrusion Detection System (IDS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the job of a Load Balancer within a network configuration?

A

A load balancer distributes network load (traffic) across multiple servers to avoid overloading a single server, it also provides server fault/failure tolerance as if one server goes down the load balancer will re-route traffic through other servers to prevent network downtime.

It sits between the external internet connection and the servers in network topography/layout.

They are highly configurable and can prioritise traffic flow of certain websites and applications.

They can also have caches to respond instantly to internet requests with bits of information without involving any of the servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a load balancer provide fault tolerance/continues network function if a server goes down?

A

A load balancer can simply stop routing network traffic to the affected server if it goes down and reroute that traffic to other servers on the network thereby preventing any down time for clients on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SCADA an example of?

A

Supervisory Control And Data Acquisition (SCADA) is a type of Industry Control System (ICS) used for electronically managing/automating closed loop equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a DCS?

A

Distributed Control System (DCS) - is a computerized control system (type of ICS - Industry Control System) used to automate things like power grid management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does legacy mean/refer to in IT?

A

Something that has been superseded/improved upon but is still in use. Often are hard to replace.

E.g. 802.11a WiFi standard or PlayStation 2’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an EMBEDDED system?

A

A purpose built device with a dedicated function (specific task) with no access to the Operating System. Such as a door security system, calculator, ATM’s. Device system with generally a single task/purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some IoT devices and what does IoT stand for?

A

Internet of Things (IoT) devices are things on the network that aren’t computers, network devices or server.

Some examples are smart appliances (smart over, fridge, lights, Amazon Echo device) or monitoring devices such as smart home thermostat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Are Fit-Bits examples of an IoT device or an embedded system or both?

A

Both! They are purpose built devices with no access to their OS (embedded system/mini PC system) and are part of the Internet of Things - devices that can communicate on a network that aren’t PC’s or network devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the difference between the DNS and a DNS server (recursive resolver)?

A

The Domain Name System (or DNS records) is a database/phonebook of all the web domain names (such as google.com) and all of their corresponding IP addresses. It is arranged in a hierarchy:
1) Root Level - 13 root servers
2) Top Level Domains (TLD) - .com .org .net, etc
3) Second Level Domains
4) Sub-Domain
5) Host

The DNS Server (resolver) interacts with the DNS database to convert human readable domain names to machine-readable IP addresses and vice versa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the service or middle-man that communicates between the client and the DNS database?

A

DNS Server/recursive resolver service.

21
Q

What are the levels of the DNS Hierarchy/Structure? (Starting from top/root down/order in which they are queried by the recursive resolver service)

A

Root level - 13 IP address clusters/addresses that are inbuilt/saved as a file on OSs.
|
Top Level Domains (TLDs) - such as .org, .com, .co.uk (technically a ccTLD - country code Top Level Domain), etc.
|
Second Level Domains - Amazon, Facebook, Youtube, etc
|
Sub-Domains (part of the websites above) - en., videos., support., sales., www., careers., etc

22
Q

What is a TLD in the DNS Hierarchy/Structure?

A

Top Level Domain (the .com level) such as .com, .co.uk (ccTLD)

23
Q

What are some examples of second level domains?

A

Youtube, Facebook, Trainline.

24
Q

What’s an example of a country-code Top Level Domain (ccTLD)?

A

.co.uk, .pol, .us

25
Q

What CMD can you use to search for a domain names IP addresses?

A

nslookup (followed by the domain name) E.g. nslookup google.com

It returns the IP addresses associated with the web server. Multiple IP addresses are used for redundancy (if one goes down the others will still allow users to connect and use the site).

26
Q

What is a subdomain?

A

A subdomain is a subdivision of a domain/website. E.g. support.amazon is the support section of amazon’s domain. Or en-gb.facebook the en-gb is the subdomain.

27
Q

What is a synonym for DNS records? RR

A

Resource Records - Database records of IP addresses, Domain names and other useful information for the converting of Domains to IP’s and vice versa.

There are over 30 types of Resource Records/DNS Records!

28
Q

What IP version does an A Record contain? And what else does it contain?

A

An A Record contains IPv4 IP addresses and the associated Domain names.

29
Q

What does an AAAA Record contain (4x the size of an A record? 4x the bits..)?

A

AAAA Records contain IPv6 IP addresses and the associated Domain names.

IPv6 addresses have 4x the bits (128 bit) of IPv4 addresses (32 bit).

30
Q

What does TTL stand for in a DNS Address (A/AAAA) Record?

A

Time To Live is a configurable amount of time that the DNS Record is cached/stored for in the database.

31
Q

What type of record is an MX record?

A

Mail Exchanger Record - directs email to a Mail Server on the network.

32
Q

What does a TXT record store?

A

Human-readable text such as useful public information. They are also used for verification and email security as if you have access to the DNS then you must be the administrator of the domain name.

You can search a domains TXT records with CMD:
dig DOMAINname.com txt
nslookup type=txt DOMAINname.com

33
Q

What type of mail attack do SPF records prevent?

A

Sender Policy Framework (SPF) records are a list of all the servers authorized to send emails for a given domain. Mail servers can verify that mail did really come from an authorised host by checking it against an SPF record.

This prevents mail spoofing. - mail spoofing is a technique used in spam and phishing attacks to trick users into thinking a message came from a person or entity they know or trust.

34
Q

What is the role of a DMARC TXT record in relation to email security?

A

DMARC TXT records are an extension of SPF and DKIM records that decide/written policy on what to do with RECEIVED emails that DON’T get validated via SPF and or DKIM records.

E.g. send to spam, accept all, reject all.

35
Q

At what length of IP lease duration left does a T1 timer check-in/request a lease extension?

A

Half-way through the lease/50%/half-life.

If approved the IP lease will be renewed to it’s full initial time.

T1 timer - renewing timer.
T2 timer - rebinding timer.

36
Q

What does a T2 lease timer do?

A

After 7/8ths of the IP lease time has expired and the DHCP server that originally assigned it’s IP is not responding the device will rebind/attempt to connect to any other DHCP server on the network an renew/extend the lease on the SAME IP address. This avoids the likely downtime that would occur if the lease ran out and the original DHCP server was still down/not responding.

T2 timer - rebinding timer.
T1 timer - renewing timer.

37
Q

A device’s dynamically allocated IP address lease has one eighth of the initial lease time remaining and the initial assigning DHCP server is still not responding. What happens now if there is a T2 timer on the IP address?

A

The T2 timer triggers as 7/8ths of the initial lease term has elapsed/expired. If there is still no response from the initial assigning DHCP at this point the device will try to REBIND the IP address to another DHCP server on it’s network. If successful the IP address lease is reset/restarted to its initial time.

38
Q

What is the standard length of a DHCP dynamic IP lease?

A

Generally 24 hours for private networks. However, in public networks where people join and disconnect a lot more frequently a shorter lease time is used so that IP’s don’t run out, are reclaimed/recycled faster.

39
Q

What is a group of devices in the same broadcast domain called?

A

LAN or VLAN - a group of devices that can all reach each other.

40
Q

Define Virtualisation.

A

Using software to simulate hardware.

41
Q

What is the difference between a LAN and a VLAN?

A

A VLAN uses virtualisation (software) to emulate hardware. Devices on the network are separated logically (by software) instead of physically (by hardware like a Switch).

42
Q

What is a VPN?

A

A Virtual Private Network - encrypts your data across public networks (e.g. the internet) to ensure security and anonymity. A VPN can create a private tunnel into a remote LAN/private network. Your encrypted data is sent to a VPN CONCENTRATOR which decrypts it and sends it into the private network.

43
Q

What does a VPN concentrator do to received data?

A

Decrypt/encrypts it so that it can be sent into the private network or back to the the VPN user securely.

44
Q

What type of internet connection standard is DOCSIS for?

A

Cable network/internet over cable connection.

45
Q

What is latency?

A

The time taken (on average) for data to pass from one point to another on a network (ms/milliseconds/PING). Usually analysed by packet capture and measured in ms.

Higher latency the longer it takes to receive data/more lag.

46
Q

What is network jitter?

A

The VARIATION of LATENCY over time. The amount/measure of inconsistency of data transfer times between two points on a network.

47
Q

What is ping?

A

Test the reachability/accessibility of devices/hosts on a network.

48
Q
A