Chapter 7 Net +

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Secure Sockets Layer (SSL)

A Protocol developed in the 1990's by Netscape for securely transmitting documents over the Internet that uses a private key to encrypt data.

Upgrade an existing unsecure connection.

A client uses the command STARTTLS. Explain what will occur as a result.

Resource pooling

A cloud provider has a data center that operates 250 servers. The company provisions the servers based on the customers needs at the time. What is the cloud provider using?

Infrastructure as a Service (IaaS)

A company hires a cloud service to provide servers, load balancers, and storage area network (SAN) devices. What cloud service type is the company using?

Time Division Multiplexing (TDM)-based Private Branch Exchange (PBX)

A company's network connects to a telecommunications carrier over a digital trunk line. Evaluate telecommunications hardware and software and determine what the company is utilizing.

sip:[email protected] sip:sam.walker@1234567890

A network administrator is tasked with designing Session Initiation Protocol (SIP) Uniform Resource Indicator (URI). Develop two SIP URIs for a user named Sam Walker that works for mywebsite.com. The user's phone number is 123-456-7890. (Select two)

Transport Layer Security (TLS)

A protocol based on SSL that provides authentication and encryption, used by most servers for secure exchanges over the Internet.

nginx

An open source web server and load balancer specially designed to cope with very high traffic. nginx ("Engine X") accounts for about 17% of the active sites.

Microsoft Internet Information Server (IIS)

Bundled with Windows Server® (and client versions of Windows). IIS accounts for about 12% of busy sites.

Simple NTP (SNTP). SNTP works over the same port as NTP. (123)

Clients themselves usually obtain the time by using a modified form of the protocol called what?

port 443 (HTTPS)

Encrypted traffic between the client and server is sent over TCP __________________ (by default), rather than the open and unencrypted port 80.

self-signed (the certificate holder is both the issuer and the subject of the certificate)

Frequently, certificates are untrusted because they are what?

stateless protocol

HTTP is a what? this means that the server is not required to preserve information about the client during a session.

XEN Server/ Hyper-V

Identify Type I hypervisors that run on a bare metal virtual platform. Pick 2

Hypervisor

Identify the component in a virtual platform that will manage the virtual environment and facilitate interaction with the computer hardware and network.

Scans for malware and rogue or non-compliant device access. Monitors and audits user and resource activity

Identify the function of a Cloud Access Security Broker. (Select two)

Server Message Block (SMB)

Identify the protocol that provides the File/Print Sharing Service on a Windows network.

root certificate

If you trust the issuer, you can add their certificate to the client device's what store?

perimeter firewall

It is important that any traffic on the NetBIOS port ranges (137-139 and 445) be blocked by a what?

File/Print Sharing Service

On a Windows® network, the ____ is provided by the Server Message Block (SMB) protocol.

139 and 445

On legacy networks, SMB ran as part of the NetBIOS API on TCP port what? If no legacy client support is required, however, SMB is more typically run directly over TCP port ?

Apache

Open source software and powerful, robust features combine to make this server the most popular. It is available for UNIX, Linux, Mac OS X®, and Windows, but it is most widely deployed on Linux. Apache accounts for about 50% of the most active websites.

Internet Message Access Protocol (IMAP) / 143

POP has some significant limitations, some of which are addressed by what?. Clients connect to an ________ server over TCP port ?

dial-up

POP is primarily designed for access; the client contacts the server to download its messages, and then disconnects.

traffic shapers

Protocols, appliances, and software that can apply these three functions can be described as what?

Quality of Service (QoS)

Provides information about the connection to a QoSsystem, which in turn ensures that voice or video communications are free from problems, such as dropped packets, delay, or jitter.

Application and Transport or Session or Presentation

SSL/TLS works as a layer between the _____________ layers of the TCP/IP stack, or, in OSI terms, at the layer _________________.

explicit TLS or opportunistic TLS.

STARTTLS is also reffered to as what?

Mail Exchanger (MX)

The SMTP server for the domain is registered in DNS using what record?

non-delivery report (NDR)

The SMTP server retries at regular intervals before timing out and returning what to the sender?

Post Office Protocol (POP)

The _______________ is an early example of a mailbox protocol. It can be secured by using SSL/TLS. The default TCP port for secure POP (POP3S) is port 995.

Hypertext Transfer Protocol (HTTP) (80) (Not secured)

The foundation of web technology is the ___________. __________ enables clients (typically web browsers) to request resources from a _______________ server.

There will be an upfront cost to upgrade equipment, but server consolidation will reduce equipment cost and energy consumption for the long term. Technicians will require training in order to manage the new network configuration, but it will be easier for the technicians to manage and update due to Virtual Desktop Infrastructure (VDI).

The owner of the company requests a briefing on the pros and cons of modifying the current network to include virtualization. Weigh the benefits and drawbacks and report the results. (Select two)

SMTPS (Simple Mail Transfer Protocol Secure) (587) used to be (465)

This establishes the secure connection before any SMTP commands (HELO, for instance) are exchanged. This is also referred to as implicit TLS.

digital certificate or certificate authority (CA)

To implement HTTPS, the web server is assigned a _____________________ or by some trusted ________________________

Apache Tomcat

Used to host Java-based applications.

Differentiated Services (DiffServ)

What classifies each packet passing through a device?

VoIP gateway//////// analog version of the gateway is (FXO) gateway.

What is a means of translating between a VoIP system and voice-based equipment and networks, such as public switched telephone network (PSTN) lines?

Jitter

What is defined as being a variation in the delay. Jitter manifests itself as an inconsistent rate of packet delivery.

Session Initiation Protocol (SIP)

What is one of the most widely used session control protocols. SIP endpoints are the end-user devices (also known as user agents), such as IP-enabled handsets or client and server web conference software.

Latency

What is the time it takes for a transmission to reach the recipient, measured in milliseconds (ms)?

Virtual Private Server (VPS)

When the ISP allocates you a virtual machine (VM) on a physical server. This is isolated from other customer instances by the hypervisor.

Dedicated server

When the ISP allocates your own private server computer. This type of service is usually unmanaged (or management comes at additional cost).

Shared hosting

When your website is hosted within a private directory on a shared server. Performance can be severely affected by other sites hosted on the server, because all the sites are competing for the same resources.

Cloud hosting

When your website is run on a cloud over several hardware computers, allowing more scalability if demand patterns change.

IMAP (Internet Message Access Protocol)

a common protocol for retrieving email messages via the Internet

Uniform Resource Locator (URL).

submits a request for a resource, using a what? The server acknowledges the request and responds with the data (or an error message).

Real-time services

what are those that require response times measured in milliseconds (ms), because delayed responses will result in poor call or video quality.

VoIP/SIP endpoint

what can be implemented as software running on a computer or smartphone or as a dedicated hardware handset?

load balancer

what distributes client requests across available server nodes in a farm or pool?

Real-time Transport Protocol (RTP) (does not guarantee reliability)

what enables the delivery of a stream of media data via UDP, while implementing some of the reliability features usually associated with TCP communications?

Network Time Protocol (NTP) Port 123

what enables the synchronization of these time-dependent applications?

Data transport

what handles the delivery of the actual video or voice information

Bottleneck

what is a link or forwarding/processing node that becomes overwhelmed by the volume of traffic?

H.323

what is an alternative session control protocol to SIP?

Private Branch Exchange (PBX)

what is an automated switchboard providing a single connection point for an organization's voice lines?

Quality of Service (QoS)

what protocols and appliances are designed to support real-time services on packet-switched networks?

the certificate

what proves the identity of the server, assuming that the client also trusts the CA?

Load balancing switches and content switches (or multilayer switches)

what provides switching functionality higher up the OSI model, at layer 4 or at layers 4-7, respectively.

Voice over IP (VoIP), web conferencing, and video teleconferencing (VTC)

what solutions have become the standard method for the provision of business communications over the last decade, as the network technologies that support them have become faster, more reliable, and cheaper.

Simple Mail Transfer Protocol (SMTP) (25)

what specifies how email is delivered from one system to another. It is a relatively straightforward protocol that makes the connection from the sender's server to that of the recipient and then transfers the message?


Set pelajaran terkait

Financial Management: Chapter 3 Homework

View Set

Crim Law/CrimPro/Evidence - Mnemonics.

View Set

ECON chapter 14 the demand and supply of resources

View Set

AMERICAN GOVERNMENT: L3 The Scientific Revolution and the Age of Reason

View Set

Understanding the Digital Forensics Profession and Investigations (Module 1 review) - [Computer Forensics]

View Set