Understanding Network Services Flashcards

1
Q

Some servers will be dedicated to a specific task, such as hosting websites, and they are called ____servers.

A

dedicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ servers may perform multiple tasks, such as hosting a website and serving as the administrator’s daily workstation.

A

nondedicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____ is a network separated from the internal network by a firewall but also protected from the Internet by a firewall. Figure 8.1 shows an example.

A

demilitarized zone (DMZ),

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A DMZ is managed by what is called a ____ which is called that because it has three network interfaces.

A

three-pronged firewall,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two of the most common web platforms are the open-source ____ and Microsoft’s ____

A

Apache

Internet Information Services (IIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ____ server provides a central repository for users to store, manage, and access files on the network.

A

file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Networks can also use ___ devices, which are stand-alone units that contain hard drives, come with their own file management software, and connect directly to the network.

A

network attached storage (NAS) `

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In an ___ setup, the client provides and manages the software.

A

IaaS

Infrastructure as a service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ability for users to get the data they want, when they want, and how they want, is sometimes referred to as ____ access.

A

ubiquitous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In most cases, clients can get more resources instantly (or at least very quickly), and that is called ___

A

rapid elasticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In most cases, clients can get more resources instantly (or at least very quickly), and that is called ___

A

rapid elasticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Most cloud storage providers offer ____, which makes it so that you have a folder on your computer, just as if it were on your hard drive.

A

synchronization to the desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cloud-based apps run through your ___.

A

web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The key enabler for virtualization is a piece of software called the hypervisor, also known as a ____

A

virtual machine manager (VMM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

There are two types of hypervisors: ___ and ___.

A

Type 1 and Type 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A Type 1 hypervisor sits directly on the hardware, and because of this, it’s sometimes referred to as a ___.

A

bare metal hypervisor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A Type 2 hypervisor sits on top of an existing operating system, called the ___ .

A

host OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A Type 2 hypervisor sits on top of an existing operating system, called the host OS. This is most commonly used in ___ , where multiple OSs are managed on the client machine as opposed to on a server.

A

client-side virtualization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Some hypervisors require that the CPU be specifically designed to support virtualization. For Intel chips, this technology is called ____, and AMD chips need to support ___.

A

virtualization technology (VT)

AMD-V

20
Q

The virtual desktop is often called a ___

A

virtual desktop interface (VDI)

21
Q

Virtual machines are created to exist and function just like a physical machine. Because of that, all of the requirements that a physical machine would have need to be replicated by the hypervisor, and that process is called ___.

A

emulation

22
Q

Examples of Type 1 hypervisors include Microsoft Hyper-V, ___ and ___.

A

VMware ESX, and Citrix XenServer.

23
Q

The highest level of cloud computing is ____ , where the provider supplies the infrastructure and applications.

A

software as a service (SaaS)

24
Q

Each DNS server has a database, called a ___ file, which maintains records of hostname to IP address mapping.

A

zone

25
Q

There are ___ global root servers.

A

13

26
Q

DNS servers for intranet use can be located inside all of the network firewalls. If it’s being used for Internet name resolution, it’s most effective to place it in the DMZ. DNS uses UDP or TCP port ___.

A

53

27
Q

A ___ server makes requests for resources on behalf of a client.

A

proxy

28
Q

What are the 3 benefits from using a proxy?

A
  1. Can cache previous websites (potentially adding speed)
  2. The proxy can act as a filter, blocking content from prohibited websites.
  3. Third, the proxy server can modify the requester’s information when passing it to the destination, blocking the sender’s identity and acting as a measure of security; the user can be made anonymous.
29
Q

An _____ server is a device that examines the credentials of anyone trying to access the network, and it determines if network access is granted.

A

authentication

30
Q

Authentication servers can be a dedicated server machine, ___ or access point, ___ , or a remote access server (RAS).

A

wireless router

Ethernet switch

31
Q

The goal of a _____ is to centralize security management, allowing administrators to manage all of their security-related hardware and software through a single device or interface.

A

unified threat management (UTM)

32
Q

A UTM device can generally provide these types of services:

A

Packet filtering and inspection, like a firewall
Intrusion protection service
Gateway anti-malware
Spam blocking
Malicious website blocking (either prohibited or nefarious content)
Application control

33
Q

What is the meaning for the DNS record type SOA?

A

Start of Authority. It signifies the authoritative DNS server for that zone.

34
Q

What is the meaning for the DNS record type NS

A

Name Server. It’s the name or address of the DNS server for that zone.

35
Q

What is the meaning for the DNS record type MX

A

Mail Exchange It’s the name or address of the email server.

36
Q

What is the meaning for the DNS record type A?

A

IPv4 host record.

37
Q

What is the meaning for the DNS record type AAAA?

A

Called “quad A,” it’s the host record for IPv6 hosts.

38
Q

What is the meaning for the DNS record type CNAME?

A

Canonical Name. It’s an alias; it allows multiple names to be assigned to the same host or address.

39
Q

What is the port and purpose of SMTP?

A

Port 25

SMTP is used for sending email and transferring email between mail servers.

40
Q

What is the port and purpose of POP3?

A

Port 110

POP3 is used for Receiving email.

41
Q

What is the port and purpose of IMAP4?

A

Port 143

IMAP 4 is used for receiving email. It’s newer and has more features than POP3.

42
Q

An ___ server is a device that examines the credentials of anyone trying to access the network, and it determines if network access is granted.

A

authentication

43
Q

What is the first step in the DHCP request process?

A
DHCP Discover (broadcast)
"Can anyone give me an IP address?"
44
Q

What is the second step in the DHCP request process?

A

DHCP Offer (unicast)

If a DHCP server is available to hear the broadcast, it will respond directly to the requesting client using the client’s MAC address as the destination address.

45
Q

What is the third step in the DHCP request process?

A

DHCP Request (broadcast)

46
Q

What is the fourth step in the DHCP request process?

A

DHCP ARK (Unicast)

47
Q

A ___ server is a device that isolates internal networks from the servers by downloading and storing files on behalf of clients.

A

proxy