Understanding Network Services Flashcards
Some servers will be dedicated to a specific task, such as hosting websites, and they are called ____servers.
dedicated
____ servers may perform multiple tasks, such as hosting a website and serving as the administrator’s daily workstation.
nondedicated
____ is a network separated from the internal network by a firewall but also protected from the Internet by a firewall. Figure 8.1 shows an example.
demilitarized zone (DMZ),
A DMZ is managed by what is called a ____ which is called that because it has three network interfaces.
three-pronged firewall,
Two of the most common web platforms are the open-source ____ and Microsoft’s ____
Apache
Internet Information Services (IIS)
A ____ server provides a central repository for users to store, manage, and access files on the network.
file
Networks can also use ___ devices, which are stand-alone units that contain hard drives, come with their own file management software, and connect directly to the network.
network attached storage (NAS) `
In an ___ setup, the client provides and manages the software.
IaaS
Infrastructure as a service
The ability for users to get the data they want, when they want, and how they want, is sometimes referred to as ____ access.
ubiquitous
In most cases, clients can get more resources instantly (or at least very quickly), and that is called ___
rapid elasticity.
In most cases, clients can get more resources instantly (or at least very quickly), and that is called ___
rapid elasticity.
Most cloud storage providers offer ____, which makes it so that you have a folder on your computer, just as if it were on your hard drive.
synchronization to the desktop
Cloud-based apps run through your ___.
web browser
The key enabler for virtualization is a piece of software called the hypervisor, also known as a ____
virtual machine manager (VMM).
There are two types of hypervisors: ___ and ___.
Type 1 and Type 2
A Type 1 hypervisor sits directly on the hardware, and because of this, it’s sometimes referred to as a ___.
bare metal hypervisor.
A Type 2 hypervisor sits on top of an existing operating system, called the ___ .
host OS
A Type 2 hypervisor sits on top of an existing operating system, called the host OS. This is most commonly used in ___ , where multiple OSs are managed on the client machine as opposed to on a server.
client-side virtualization
Some hypervisors require that the CPU be specifically designed to support virtualization. For Intel chips, this technology is called ____, and AMD chips need to support ___.
virtualization technology (VT)
AMD-V
The virtual desktop is often called a ___
virtual desktop interface (VDI)
Virtual machines are created to exist and function just like a physical machine. Because of that, all of the requirements that a physical machine would have need to be replicated by the hypervisor, and that process is called ___.
emulation
Examples of Type 1 hypervisors include Microsoft Hyper-V, ___ and ___.
VMware ESX, and Citrix XenServer.
The highest level of cloud computing is ____ , where the provider supplies the infrastructure and applications.
software as a service (SaaS)
Each DNS server has a database, called a ___ file, which maintains records of hostname to IP address mapping.
zone
There are ___ global root servers.
13
DNS servers for intranet use can be located inside all of the network firewalls. If it’s being used for Internet name resolution, it’s most effective to place it in the DMZ. DNS uses UDP or TCP port ___.
53
A ___ server makes requests for resources on behalf of a client.
proxy
What are the 3 benefits from using a proxy?
- Can cache previous websites (potentially adding speed)
- The proxy can act as a filter, blocking content from prohibited websites.
- Third, the proxy server can modify the requester’s information when passing it to the destination, blocking the sender’s identity and acting as a measure of security; the user can be made anonymous.
An _____ server is a device that examines the credentials of anyone trying to access the network, and it determines if network access is granted.
authentication
Authentication servers can be a dedicated server machine, ___ or access point, ___ , or a remote access server (RAS).
wireless router
Ethernet switch
The goal of a _____ is to centralize security management, allowing administrators to manage all of their security-related hardware and software through a single device or interface.
unified threat management (UTM)
A UTM device can generally provide these types of services:
Packet filtering and inspection, like a firewall
Intrusion protection service
Gateway anti-malware
Spam blocking
Malicious website blocking (either prohibited or nefarious content)
Application control
What is the meaning for the DNS record type SOA?
Start of Authority. It signifies the authoritative DNS server for that zone.
What is the meaning for the DNS record type NS
Name Server. It’s the name or address of the DNS server for that zone.
What is the meaning for the DNS record type MX
Mail Exchange It’s the name or address of the email server.
What is the meaning for the DNS record type A?
IPv4 host record.
What is the meaning for the DNS record type AAAA?
Called “quad A,” it’s the host record for IPv6 hosts.
What is the meaning for the DNS record type CNAME?
Canonical Name. It’s an alias; it allows multiple names to be assigned to the same host or address.
What is the port and purpose of SMTP?
Port 25
SMTP is used for sending email and transferring email between mail servers.
What is the port and purpose of POP3?
Port 110
POP3 is used for Receiving email.
What is the port and purpose of IMAP4?
Port 143
IMAP 4 is used for receiving email. It’s newer and has more features than POP3.
An ___ server is a device that examines the credentials of anyone trying to access the network, and it determines if network access is granted.
authentication
What is the first step in the DHCP request process?
DHCP Discover (broadcast) "Can anyone give me an IP address?"
What is the second step in the DHCP request process?
DHCP Offer (unicast)
If a DHCP server is available to hear the broadcast, it will respond directly to the requesting client using the client’s MAC address as the destination address.
What is the third step in the DHCP request process?
DHCP Request (broadcast)
What is the fourth step in the DHCP request process?
DHCP ARK (Unicast)
A ___ server is a device that isolates internal networks from the servers by downloading and storing files on behalf of clients.
proxy