application services Flashcards

(32 cards)

1
Q

What type of ISP website hosting packages are common for organizations?

A

Dedicated server—The ISP allocates your own private server computer. This type of service is usually unmanaged (or management comes at additional cost).

Virtual private server (VPS)—The ISP allocates you a virtual machine (VM) on a physical server.

Cloud hosting—Your website is run on a cloud over several hardware computers, allowing more scalability if demand patterns change.

Shared hosting—Your website is hosted within a private directory on a shared server. Performance can be severely affected by other sites hosted on the server, because all the sites are competing for the same resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between active and passive FTP?

A

Active: Client uses PORT command
FTP client provides IP and port for server to connect to the data channel.
Client side must open a range of ports for inbound connection, usually blocked by firewall

Passive: Client uses PASV command
FTP server provides IP and port for the client to connect to the data channel.
Server side must open a range of ports for inbound connection, usually NOT blocked by firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is TFTP?

A

Trivial file transfer protocol
connectionless protocol that works over UDP 69.
only suitable for transferring small files.
TFTP server is most commonly used by legacy network appliances.
Has no security mechanisms, and appliances are no longer as resource constrained as they were in the early days of networking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is SFTP?

A

Secure file transfer protocol.
A secure link is created between the client and server using SSH over TCP port 22

FTPS is tricky to configure when there are firewalls between the client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 2 ways of configuring FTP over TLS?

A

Explicit TLS (FTPES)—Use the AUTH TLS command to upgrade an insecure connection established over TCP port 21 to a secure one. The data connection for the actual file transfers can also be encrypted (using the PROT command).

Implicit TLS (FTPS)—Negotiate an SSL/TLS tunnel before the exchange of any FTP commands. This mode uses TCP port 990 for the control connection.

FTPES is usually the preferred method due to being easier to configure with firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is File/Print sharing services provided on Windows?

A

SMB (Server Message Block)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Support for SMB on Linux based machines is provided by what?

A

By the Samba Software suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a NAS?

A

Network attached Storage.
A device dedicated to performing a file server role.
A NAS appliance is accessed via an IP address or domain name.
Most NAS devices support some level of Redundant Array of Independent Disks (RAID).
The main drawback of NAS is that it shares bandwidth with other network applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a database do?

A

provisions information in a format that can be read and updated through some type of query language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 2 main types of databases?

A

Relational databases: Relational databases store information in tables with rows (records) and columns (fields).
Relationships between data fields in different tables is created using key fields that uniquely identify each record.
Relational databases are operated using Structured Query Language (SQL)
SQL has been implemented in relational database management system (RDBMS) platforms by several different vendors.

NoSQL or Not only SQL: Rather than highly structured relational tables, NoSQL data can use a variety of formats, such as key-value pairs or wide columns (where rows do not have to have the same set of fields).
Typically accessed using an application programming interface (API) over HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 2 ways for SMTP to use TLS?

A

STARTTLS: AKA explicit TLS or opportunistic TLS. Its a command that upgrades an existing insecure connection to use TLS.
A deprecated method but still widely used.
Port 587

Implicit TLS: This establishes the secure connection before any SMTP commands. The preferred method.
Port 465

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is SMTP?

A

Simple Mail Transfer Protocol.
specifies how email is delivered from one system to another.
The SMTP servers for the domain are registered in DNS using mail exchange (MX) and host (A/AAAA) records.
SMTP does not queue messages indefinitely, if it times out it returns a NDR (Non delivery report.) to the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IMAP (Internet Message Access Protocol)

A

The most widely used mail retrieval protocol.
Supports permanent connections to a server and connecting multiple clients to the same mailbox simultaneously.
Also allows a client to manage the mailbox on the server.
Uses TCP pot 143 secure is 993

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is TDM based PBX

A

time division multiplexing and private branch exchange

A TDM-based PBX connects to the telecommunications carrier over a digital trunk line, which will support multiple channels (inward and outward calls). Supports features such as call waiting, music on hold, and voicemail. Can multiplex separate voice and data channels for transmission over a single cable.

TDM PBX is supplied as vendor-specific hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is VoIP PBX?

A

What TDM PBX is being replaced by.
It establishes connections between local VoIP endpoints with data transmitted over the local Ethernet network.
Can also route incoming and outgoing calls from and to external networks.
Will also support features such as music on hold and voicemail.
Can be implemented as software
VoIP PBX would normally be placed at the network edge and be protected by a firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What protocols are designed to support real time services? (i.e. VoIP, media streaming etc.)

A

Session Control- Used to establish, manage, and disestablish communications sessions. Can handle tasks such as user discovery, availability advertising, and negotiating session parameter

Data transport—Handles the delivery of the actual video or voice information.

Quality of service (QoS)—Provides information about the connection to a QoS system, which in turn ensures that voice or video communications are free from problems, such as dropped packets, delay, or jitter.

17
Q

What is SIP? (session Initiation Protocol)

A

One of the most widely used session control protocols.
Typically runs over UDP or TCP ports 5060 (unsecured) and 5061 (SIP-TLS).

18
Q

What does RTP and RTCP do?

A

Real time protocol, and Real time control protocol.
Paired protocols for delivering and managing audio/video data in real time.
RTP carries the media stream.
RTCP monitors the QoS.

19
Q

What is a VoIP phone?

A

Handset or software client that implements a type of voice over Internet Protocol (VoIP) to allow a user to place and receive calls.
Handsets can use Power over Ethernet (PoE)
There are also wireless handsets that work over 802.11 Wi-Fi networks.
For connection security it uses SIPS which uses digital certificates to authenticate endpoints and establish a TLS tunnel.

20
Q

What is MTTF?

A

Mean Time To Failure.
Used to express the expected lifetime or reliability of non-repairable components, providing an average time until failure.

21
Q

What is MTTRr?

A

Mean time to repair.
Measure of time take to correct a fault so that the system is restored to full operation.

22
Q

What is MTBF?

A

Mean Time Between Failures.
Used for repairable components, indicating the average time between failures

23
Q

What is FHRP?

A

First hop redundancy protocols.
Provides failover routers to serve as the default gateway for a subnet. AKA VRRP and HSRP

24
Q

What is HSRP?

A

Hot Standby Router Protocol
Allows multiple physical routers to serve as a single default gateway for a subnet.
Standby router monitors the status of the active router and takes over if the active becomes unavailable.
This triggers the selection of new standby router from the remaining routers in the group.

25
What is VRRP?
Virtual Router Redundancy Protocol Similar to HSRP but has different terminology. The active router is called master, all other routers are called backup routers. There is no specific standby router all backups monitor the master and if it fails a new master router is selected from the available backup routers based on priority.
26
What is a virtual IP used for?
AKA floating address An IP address assigned to multiple domain names or servers ( good for clustering)
27
What is clustering?
A load balancing technique where a group of servers are configured as a unit and work together to provide network services.
28
What are the 2 main types of load balancers?
Layer 4 switch—Basic load balancers make forwarding decisions on IP address and TCP/UDP header values, working at the Transport layer of the OSI model. Layer 7 switch (content switch)- Makes forwarding decisions based on application-level data, such as a request for a particular URL or data types like video or audio streaming.
29
What is MTD?
Maximum tolerable downtime A metric states the requirement for a business function. RTO + WRT must not exceed MTD
30
What is RTO?
Recovery Time Objective This is the period following a disaster that an individual IT system may remain offline. Represents the maximum amount of time allowed to identify that there is a problem and then perform recovery
31
What is WRT?
Work Recovery Time. This is the period following a disaster that an individual IT system may remain offline.
32
What is RPO?
Recovery Point Objective. The amount of data loss that a system can sustain, measured in time units.