0% found this document useful (0 votes)
17 views2 pages

New 1

Uploaded by

Prajwal Jr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views2 pages

New 1

Uploaded by

Prajwal Jr
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

--Networking

TCP-- TCP (Transmission Control Protocol) is a connection-oriented protocol that


ensures data packets are delivered in order and without errors.
It uses handshakes and acknowledgments, making it reliable but slower

UDP-- (User Datagram Protocol) is connectionless and faster but does not guarantee
packet delivery or order,
often used in applications where speed is critical, like streaming or gaming.

DNS (Domain Name System) translates human-readable domain names (e.g.,


www.example.com) into IP addresses (e.g., 192.168.1.1)

VLAN (Virtual Local Area Network) segments a physical network into multiple logical
networks,
allowing network administrators to group devices based on function, security, or
team

How would you troubleshoot a slow network?


Answer: identify latency or packet loss. Verify the network configuration,
inspect logs for errors

NAT (Network Address Translation) allows multiple devices on a local network to


share a single public IP address when accessing external networks.
It conserves public IP addresses and adds a layer of security by hiding internal IP
addresses from the outside world.

Server Management and Virtualization

How do you ensure high availability in a server environment?

Answer: High availability can be ensured by using load balancers, clustering


servers, s
etting up failover mechanisms, and ensuring redundancy in network, storage, and
power supplies.

How do you ensure high availability in a server environment?

Answer: High availability can be ensured by using load balancers, clustering


servers, setting up failover mechanisms,
and ensuring redundancy in network, storage, and power supplies.

Symmetric encryption uses the same key for both encryption and decryption, making
it fast but less secure for communication.
Asymmetric encryption uses a pair of keys: a public key for encryption and a
private key for decryption,
providing stronger security, often used in SSL/TLS for secure communications.

--How to secure the servers


disabling unused ports and services, applying firewalls, enforcing strong password
policies, using SSH key authentication,
setting up multi-factor authentication, and regularly auditing system logs for
suspicious activities.

A firewall controls incoming and outgoing network traffic based on predetermined


security rules. It can be hardware or software-based
and works by inspecting traffic and allowing or blocking data packets based on the
security rules defined.
NAS (Network attached storage)

NAS refers to the hardware device that provides storage over the network, while NFS
is a protocol used to access files on that storage.
NAS can support different file-sharing protocols, including NFS, SMB, and AFP.
NFS is typically used in UNIX/Linux environments, while NAS can work across
multiple operating systems.
In summary, NAS is the device or system providing networked storage,
and NFS is one of the protocols that can be used to access and manage that storage,
particularly in Linux/Unix environments.

You might also like