CompTIA A+ Core 1: Activity 5-6
What are the principal types and configuration options?
1) A network Intrusion Detection System (IDS) scans packet contents for signs of traffic that could violate security policies. 2) An Intrusion Protection System (IPS) can effect some sort of action to block such traffic. 3) An IPS is usually provisioned as a Unified Threat Management (UTM) appliance to include firewall, anti-malware, and other security functionality. 4) Appliances with blocking functionality are typically deployed inline with the network, so that all traffic passes through the appliance. 5) Alternatively, a tap or sensor can be attached to the network so that traffic is copied for the appliance to read.
If you want to configure a firewall on the mail server to allow clients to download email messages, which port(s) might you have to open?
A) Either TCP port 993 (IMAPS) or 995 (POP3S), depending on the mail access protocol in use (IMAP or POP). A1) These are the default ports for secure connections. BX) Unsecure default ports are TCP port 143 and TCP port 110. CX) Port 25 (SMTP) is used to send mail between servers, not to access messages stored on a server. Port 587 is often used by a client to submit messages for delivery by an SMTP server
What file sharing protocol(s) could you use to allow access to Windows, Linux, and Apple macOS clients?
A) Most clients should support Server Message Block (SMB)/Common Internet File System (CIFS). B) You might want to configure Apple Filing Protocol to support older macOS clients. C) Another option is to configure File Transfer Protocol (FTP).
What is the difference between SNMP and syslog?
A) The Simple Network Management Protocol (SNMP) provides a means for devices to report statistics to a management server. B) Syslog provides a means for devices to send log entries to a remote server
What protocol would a mail client use to access the message store on a remote mail server?
A) Typically Post Office Protocol (POP3) or Internet Message Access Protocol (IMAP). B) A proprietary protocol such as MAPI (Microsoft Exchange) might also be used.
What is DNS?
Domain Name System—servers that map host and domain names to IP addresses.
What configuration parameter must be entered to enable a client to use DNS?
The IP address of a DNS server on the local network or network reachable by the client.
If a network application cannot tolerate a missing packet, what type of transport protocol should it use?
Transmission Control Protocol (TCP).
True or false: An HTTP application secured using the SSL/TLS protocol should use a different port to unencrypted HTTP.
True. A) By default HTTPS uses port 443. B) It is possible in theory to apply SSL/TLS to port 80, but most browsers would not support this configuration.
True or false: Protocols that stream video and audio over the Internet are likely to be based on UDP.
True. UDP carries less overhead compared to Transmission Control Protocol (TCP), so is better suited to playing media files where small glitches due to lost packets are less of a problem than the whole video freezing.