NFS mid-term

Description

Computer Science Flashcards on NFS mid-term, created by Brian Nichols on 18/03/2018.
Brian Nichols
Flashcards by Brian Nichols, updated more than 1 year ago
Brian Nichols
Created by Brian Nichols about 6 years ago
23
1

Resource summary

Question Answer
NFS The Network File System (NFS) is a client/server application that lets a user view and store files on a remote computer as though they were on the user's own computer.
RFC Request For Change When a network administrator believes that a change should be made on the network. Request for change should be filed
CIFS The Common Internet File System Is the renaming of SMB protocol by Microsoft. (CIFS/SMB) is the standard way that users share files across intranets and the Internet.
SMBD SMBDis the server daemon (application) on Linux that provides filesharing and printing services to Windows clients.
NMDB NetBIOS name services Emulates Windows environment on Linux for Samba naming services. It allows other computers to browse the resources provided by the Samba server
SFU Software for Microsoft that emulates Linux,
SAN Storage Area Network A high-speed subnetwork of shared storage devices. A SAN's architecture works in a way that makes all storage devices available to all servers on a LAN or WAN. .
Management Proxies Remote software that provides information on the target system and provides suggestions.
SNMP Simple Network Management Protocol Are protocols for managing complex networks. Used for collecting and organizing information about managed network devices and modifying that information to change device behavior.
LDAP The Lightweight Directory Access Protocol is an open industry application protocol for accessing and maintaining directory information over an IP network.
ADSL Asynchronous DSL Allows for higher download speeds than upload speeds over standard copper lines.
IMAP Internet Message Access Protocol (IMAP) is an Internet protocol used by e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection. Messages stay on the server.
Firewall Firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
MIME Multipurpose Internet Mail Extensions - is an Internet standard that extends the format of email to support: Text in character sets other than ASCII: audio, video, images, application programs etc.
SMTP Simple Mail Transfer Protocol (SMTP) is an Internet standard for email transmission.
MTA Message transfer agent is software that transfers email from one computer to another using a client-server application.
MUA Software Mail User Agent is a computer program used to access and manage a user's email. ex. Outlook
MTA Software Mail Transfer Agent Exchange Server
NAS Network-attached storage Is a storage device connected to a network providing data access to a group of clients. SMB and NFS supported.
Firewall Techniques A) Packet Filter B) Application Gateway C) Stateful Inspection
IP Spoofing Modification of packet headers Thinks it comes from a trusted source.
Difference Unicode and ASCII ASCII has 7 text-based bits. The 8th bit is used for image lines. Unicode is 16 bits for high-quality graphics and styled font text.
Baseline State of the software when it was first installed for comparison to future states.
Audit Types Inventory Audits Facility Audit Operational Audit Efficiency Audit Security Audit
Inventory Audit Inventory Audits should be done before the network is operational Best performed when all the equipment is in one place
Facility Audit Facility audit tracks network devices and notes physical location of all network equipment It is best to have network diagram. The diagram should be updated
Operational Audit This audit looks at daily operational parameters of the network: Network utilization Average # of collisions # of network errors Amount of broadcast traffic
Efficiency Audit Evaluate performance of network-support staff and network users. Evaluated for their ability to respond to and troubleshoot network problems. Determine if there is sufficient # of adequately trained support personnel.
Security Audit All that requires limited access to passwords or locks. What virus protection is needed Which files should be backed up What type of emergency and disaster-recovery procedures should be implemented
EMI Electromagnetic Interference Equipment that interferes with normal operation of computer systems.
SMB is the same as? CIFS
What is SMB? A Linux protocol used by Microsoft OS allowing shared access to files and printers.
What is Samba? Sofware on Linux that provides File/Print services for smb/CIFS clients. Allows Unix servers to communicate with the same networking protocol as Microsoft Windows products
RFI Radio Frequency Interference
SOAP Messaging protocol Allows software to run on different OS systems to communicate with each other.
DAS Direct Attached Storage Storage unit directly connected to a device.
SCSI Small Computer System Interface Standards for physically connecting and transferring data between devices. Example Raid systems Parallel interface
Fiber Channel Fiber or Copper technology for transmitting data between computer devices at data rates of up to 4 + Gbps.
ISCSI Internet Small Computer Systems Interface SCSI over the IP network
Postscript Developed for desktop publishing More MAC end design Made for graphics Supported by most printers
PCL Printer Command Language Not originally designed for graphics. Supports different program languages for printers. Supported by most printers.
Win Printer No intelligence on the printer. Documents are sent to printers from a device.
CUPS Print server software for LInux
Raster Graphics Individual dots that create an image Graphics produce images as grids of individually defined pixels
Vector Graphics Complete image printing Produces images using points, lines, and shapes. Faster than Raster
BIND Allows DNS to run on Linux Sofware developed by Burkly
Purpose Proxy Server Filter requests - deny/permit websites Cache information to speed up same requests in the future.
DMZ Demilitarized Zone a physical or logical subnetwork that exposes an organization's external-facing services to an untrusted network. An external network can access only what is exposed in the DMZ, while the rest of the organization's network is firewalled.
Gateways Joining of different systems together to communicate that may use different protocols.
Extranet A controlled private network that allows access to partners, vendors, and suppliers or an authorized set of customers. Ex. Remote VPN
XML Is a markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable
Network Management Elements Security: Ensuring that the network is protected from unauthorized users. Performance: Eliminating bottlenecks in the network. Reliability: Making sure the network is available to users and responding to hardware and software malfunctions.
Difference between Manager and Agent Manager polls agents for information. Any alerts are then referred to Managers.
MIB Management Information Database Are objects that can manage simple network protocols on the agent.
Why would you do a network audit? Done to ensure that a network is performing correctly. Compares results to the initial audit at setup as a baseline.
Show full summary Hide full summary

Similar

Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr