Network Services Flashcards

(29 cards)

1
Q

To connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which server is used to handle this type of request?

A

DNS Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the DNS database records listed below returns a 32-bit IP address?

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The DNS database AAAA record creates a pointer that maps a hostname to:

A

IPv6 Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the DNS database records maps a domain name to a list of mail servers for that domain?

A

MX
(Mail Exchange)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the function of a DNS TXT record?

A

Provides outside services with additional information about a domain
(Not used to direct any traffic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which DNS TXT records are used for spam management?

A

SPF (Sender Policy Framework)
DKIM (DomainKeys Identified Mail)
DMARC (Domain-based Message Authentication, Reporting & Conformance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What allows the receiver of an email message to verify that the message claimed to have come from a specific domain was indeed authorized by the owner of that domain?

A

DKIM
(DomainKeys Identified Mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An authentication method that enables signing an outbound email message with digital signature.

A

DKIM
(DomainKeys Identified Mail)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An open standard defining a technical method to prevent electronic mail sender address forgery.

A

SPF (Sender Policy Framework)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A DNS TXT record that allows the owner of a domain to specify all the servers authorized to send mail from their domain?

A

SPF (Sender Policy Framework)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A DNS TXT record containing instructions for the recipient of an email message on how to handle emails that do not align with the sender’s mail policies?

A

DMARC
(Domain-based Message Authentication, Reporting & Conformance)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which server type enables automatic allocation of IP addresses on a network?

A

DHCP Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The time a DHCP client can use an IP address dynamically assigned by the DHCP server is referred to as what?

A

Lease

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which term refers to permanent IP address assignment from a DHCP server?

A

Reservation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A range of IP addresses that a DHCP server can lease out to DHCP clients is known as?

A

Scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A dedicated file server is also referred to as what?

17
Q

IPP, LPD/LPR, and SMB/CIFS are examples of protocols that enable what kind of network service?

18
Q

What is the function of an SMTP server?

A

Email Handling

19
Q

Which type of server is used for collecting diagnostic and monitoring data from networked devices?

A

Syslog Server

20
Q

What is the function of an HTTP server?

A

Serving of web pages

21
Q

Which part of the AAA security architecture deals with the verification of the identity of a person or process?

A

Authentication

22
Q

The process of granting or denying access to resources? (Part of AAA security architecture)

A

Authorization

23
Q

In the AAA security architecture, the process of tracking accessed services as well as the amount of consumed resources is called what?

24
Q

2 solutions that provide the AAA functionality

A

TACACS+ (a remote authentication protocol)
RADIUS

25
The protocol and port number used by spam filter?
SMTP 25
26
A physical network device or software solution designed for managing the optimal distribution of workloads across multiple computing resources is known as:
A Load Balancer
27
In computer networking, a computer system or application that acts as an intermediary between another computer and the Internet is commonly referred to as:
A Proxy
28
Which system refers to industrial and manufacturing control system?
SCADA (Supervisory Control and Data Acquisition)
29
An emerging field of new technologies, such as wearable tech or home automation is known as what?
IoT (Internet of Things)