2.4 Network Services Flashcards

1
Q

What does DNS stand for?

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DNS servers are usually managed by…?

A

the ISP or IT department (it’s a critical resource)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS relies on one server. T or F?

A

False, the load is balanced across many different servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does a DHCP server do?

A

automatic IP address configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DHCP servers can be found on what home device?

A

Common service available on most home routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Enterprise DHCP servers will be _____

A

redundant (running on central servers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a file server?

A

a centralized storage of documents, spreadsheets, videos, pictures and other files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are file servers used by Microsoft and Apple? (2)

A
  1. SMB Server Message Block Microsoft
  2. AFP Apple Filing Protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are print servers used for?

A

connects a printer to the network to provide printing services to all network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 2 ways that printer servers can appear as?

A
  1. Software in a computer (computer is connected to the printer)
  2. Built into the printer (has network adapter and software)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 3 standard printing protocols?

A
  1. Server Message Block
  2. IPP (Internet Printing Protocol)
  3. LPD (Line Printer Daemon)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What’s the purpose of a mail server?

A

Stores incoming mail, sends outgoing mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who usually manages a mail server?

A

usually managed by the ISP or IT department

(one of the most important services, 24/7 support)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is syslog?

A

the standard for message logging

(needs A LOT of disk space)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are 6 Load balancer features?

A
  1. Configurable - manage across servers
  2. TCP offload - Protocol overhead
  3. SSL offload - Encryption/Decryption
  4. Caching - Fast Response
  5. Prioritization - QoS
  6. Content Switching - application-centric balancing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a proxy server?

A

An intermediate server

(proxy -> intermediary)

17
Q

How does a proxy server work? (3 steps)

A
  1. The client makes the request to the proxy
  2. Proxy performs the actual client request
  3. Proxy provides results back to the client
18
Q

What are 4 useful features of having a proxy server?

A
  1. Access control
  2. Caching
  3. URL filtering
  4. Content scanning
19
Q

What does SCADA stand for?

A

Supervisory Control and Data Acquisition System

20
Q

What does ICS stand for?

A

Industrial Control Systems

21
Q

What is SCADA/ICS used fo?

A

PC manages equipment (power, equipment, facilities, real-time information, requires segmentation)

22
Q

What does a Web server do?

A

Responds to browser requests

23
Q

Web pages are built using what?

A

HTML/HTML 5

24
Q

Where are web pages stored?

A

On the Web server

25
What are 2 ways that web pages appear on the browser?
They are downloaded to the browser and appear as: 1. Static pages 2. Built dynamically in real-time
26
Authentication servers are almost always an...
enterprise service (not required on a home network)
27
What are authentication servers used for?
To authenticate the login to access resources (centralized management)
28
Authentication servers are usually a set of....
redundant servers (always available, important service)
29
What is Spam?
Unsolicited emails, messages, etc
30
Spam can come in what 3 forms?
1. Commercial advertising 2. Non-commercial proselytizing 3. Phishing attempts
31
What are spam gateways? What 2 forms does it appear as? (2)
Stop unsolicited email at te gateway before it reaches the user (on-site or cloud-based)
32
What do load balancers do?
Distributes the load (of multiple servers) and are invisible to the end-user
33
What do large-scale load balancer implementations look like?
Web server farms, database farms
34
What's the advantage of using load balancers for outages?
Server outages have no effect
35
What are 2 meanings for "Legacy" systems?
1. Really old 2. Really important
36
What are embedded systems?
Purpose-built device, doesn't usually have direct access to the operating system
37
What are 3 examples of an embedded system?
1. Alarm system 2. Door security 3. Time card system
38
What are IoT devices? (Internet of Things)
Appliances, smart devices, air control, smart doorbells that use the Internet
39
How do you prevent security breaches using IoT devices?
Segment the network from the rest