2.4 Network Services Flashcards

1
Q

DNS server

A
  • Domain Name System
    – Convert names to IP addresses
    – And vice versa
  • Distributed naming system
    – The load is balanced across many different servers
  • Usually managed by the ISP or IT department
    – A critical resource
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DHCP server

A
  • Dynamic Host Configuration Protocol
    – Automatic IP address configuration
  • Very common service
    – Available on most home routers
  • Enterprise DHCP will be redundant
    – Usually running on central servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

File server

A
  • Centralized storage of documents,spreadsheets, videos, pictures, and any other files
    – A fileshare
  • Standard system of file management
    – SMB (Server Message Block),
    Apple Filing Protocol (AFP), etc.
  • The front-end hides the protocol
    – Copy, delete, rename, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Centralized storage of documents,spreadsheets, videos, pictures, and any other files
    – A fileshare
  • Standard system of file management
    – SMB (Server Message Block),
    Apple Filing Protocol (AFP), etc.
  • The front-end hides the protocol
    – Copy, delete, rename, etc.
A

File server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Print server

A
  • Connect a printer to the network
    – Provide printing services for all network devices
  • May be software in a computer
    – Computer is connected to the printer
  • May be built-in to the printer
    – Network adapter and software
  • Uses standard printing protocols
    – SMB (Server Message Block), IPP (Internet
    Printing Protocol), LPD (Line Printer Daemon
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Connect a printer to the network
    – Provide printing services for all network devices
  • May be software in a computer
    – Computer is connected to the printer
  • May be built-in to the printer
    – Network adapter and software
  • Uses standard printing protocols
    – SMB (Server Message Block), IPP (Internet
    Printing Protocol), LPD (Line Printer Daemon
A

Print server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mail server

A
  • Store your incoming mail – Send your outgoing mail
  • Usually managed by the ISP or the IT department
    – A complex set of requirements
  • Usually one of the most important services – 24 x 7 support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Store your incoming mail
    – Send your outgoing mail
  • Usually managed by the ISP or the IT department
    – A complex set of requirements
  • Usually one of the most important services – 24 x 7 support
A

Mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Syslog

A
  • Standard for message logging
    – Diverse systems, consolidated log
  • Usually a central logging receiver
    – Integrated into the SIEM (Security Information Event Manager)
  • You’re going to need a lot of disk space
    – No, more. More than that.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Standard for message logging
    – Diverse systems, consolidated log
  • Usually a central logging receiver
    – Integrated into the SIEM (Security Information Event Manager)
  • You’re going to need a lot of disk space
    – No, more. More than that.
A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web server

A
  • Respond to browser requests
    – Using standard web browsing protocols
  • HTTP/HTTPS
    – Pages are built with HTML, HTML5
  • Web pages are stored on the server
    – Downloaded to the browser
    – Static pages or built dynamically in real-time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Respond to browser requests
    – Using standard web browsing protocols - HTTP/HTTPS
    – Pages are built with HTML, HTML5
  • Web pages are stored on the server
    – Downloaded to the browser
    – Static pages or built dynamically in real-time
A

Web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication server

A
  • Login authentication to resources
    – Centralized management
  • Almost always an enterprise service
    – Not required on a home network
  • Usually a set of redundant servers
    – Always available
    – Extremely important service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spam

A
  • Unsolicited messages
    – Email, forums, etc.
  • Various content
    – Commercial advertising
    – Non-commercial proselytizing
    – Phishing attempts
  • Significant technology issue
    – Security concerns, resource utilization,
    storage costs, managing the spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Unsolicited messages
    – Email, forums, etc.
  • Various content
    – Commercial advertising
    – Non-commercial proselytizing
    – Phishing attempts
  • Significant technology issue
    – Security concerns, resource utilization,
    storage costs, managing the spam
A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Login authentication to resources
    – Centralized management
  • Almost always an enterprise service
    – Not required on a home network
  • Usually a set of redundant servers
    – Always available
    – Extremely important service
A

Authentication server

17
Q

Spam gateways

A
  • Unsolicited email
    – Stop it at the gateway before it reaches the user
    – On-site or cloud-based
18
Q
  • Unsolicited email
    – Stop it at the gateway before it reaches the user
    – On-site or cloud-based
A

Spam gateways

19
Q

All-in-one security appliance

A
  • Next-generation firewall, Unified Threat Management (UTM) / Web security gateway
  • URL filter / Content inspection
  • Malware inspection
  • Spam filter
  • CSU/DSU (access to WAN)
  • Router, Switch
  • Firewall
  • IDS/IPS (Intrusion Detection System, Intrusion Prevention System)
  • Bandwidth shaper * VPN endpoint
20
Q
  • Next-generation firewall, Unified Threat Management (UTM) / Web security gateway
  • URL filter / Content inspection
  • Malware inspection
  • Spam filter
  • CSU/DSU (access to WAN)
  • Router, Switch
  • Firewall
  • IDS/IPS (Intrusion Detection System, Intrusion Prevention System)
  • Bandwidth shaper * VPN endpoint
A

All-in-one security appliance

21
Q

Load balancers

A
  • Distribute the load
    – Multiple servers
    – Invisible to the end-user
  • Large-scale implementations
    – Web server farms, database farms
  • Fault tolerance
    – Server outages have no effect
  • Very fast convergence
22
Q
  • Distribute the load
    – Multiple servers
    – Invisible to the end-user
  • Large-scale implementations
    – Web server farms, database farms
  • Fault tolerance
    – Server outages have no effect
  • Very fast convergence
A

Load balancers

23
Q

Load balancer features

A
  • Configurable load - Manage across servers
  • TCP offload - Protocol overhead
  • SSL offload - Encryption/Decryption
  • Caching - Fast response
  • Prioritization - QoS
  • Content switching - Application-centric balancing
24
Q
  • Configurable load - Manage across servers
  • TCP offload - Protocol overhead
  • SSL offload - Encryption/Decryption
  • Caching - Fast response
  • Prioritization - QoS
  • Content switching - Application-centric balancing
A

Load balancer features

25
Q

Proxy server

A
  • An intermediate server
    – Client makes the request to the proxy
    – The proxy performs the actual request
    – The proxy provides results back to the client
  • Useful features
    – Access control, caching, URL filtering, content scanning
26
Q

SCADA / ICS

A
  • Supervisory Control and Data Acquisition System
    – Large-scale, multi-site Industrial Control Systems (ICS)
  • PC manages equipment
    – Power generation, refining,
    manufacturing equipment
    – Facilities, industrial, energy, logistics
  • Distributed control systems
    – Real-time information
    – System control
    – Requires extensive segmentation
    – No access from the outside
27
Q
  • Supervisory Control and Data Acquisition System
    – Large-scale, multi-site Industrial Control Systems (ICS)
  • PC manages equipment
    – Power generation, refining,
    manufacturing equipment
    – Facilities, industrial, energy, logistics
  • Distributed control systems
    – Real-time information
    – System control
    – Requires extensive segmentation
    – No access from the outside
A

SCADA / ICS

28
Q
  • An intermediate server
    – Client makes the request to the proxy
    – The proxy performs the actual request
    – The proxy provides results back to the client
  • Useful features
    – Access control, caching, URL filtering, content scanning
A

Proxy server

29
Q

Legacy and embedded systems

A
  • Legacy systems
    – Another expression for “really old”
    – May also be “really important”
    – Learning old things can be just as important as
    learning the new things
  • Embedded systems
    – Purpose-built device
    – Not usual to have direct access to
    the operating system
    – Alarm system, door security, time card system
30
Q
  • Legacy systems
    – Another expression for “really old”
    – May also be “really important”
    – Learning old things can be just as important as
    learning the new things
  • Embedded systems
    – Purpose-built device
    – Not usual to have direct access to
    the operating system
    – Alarm system, door security, time card system
A

Legacy and embedded systems

31
Q

IoT (Internet of Things) devices

A
  • Appliances
    – Refrigerators
  • Smart devices
    – Smart speakers respond to voice commands
  • Air control
    – Thermostats, temperature control
  • Access
    – Smart doorbells
  • May require a segmented network
    – Limit any security breaches
32
Q
  • Appliances
    – Refrigerators
  • Smart devices
    – Smart speakers respond to voice commands
  • Air control
    – Thermostats, temperature control
  • Access
    – Smart doorbells
  • May require a segmented network
    – Limit any security breaches
A

IoT (Internet of Things) devices

33
Q
  • Domain Name System
    – Convert names to IP addresses
    – And vice versa
  • Distributed naming system
    – The load is balanced across many different servers
  • Usually managed by the ISP or IT department
    – A critical resource
A

DNS server

34
Q
  • Dynamic Host Configuration Protocol
    – Automatic IP address configuration
  • Very common service
    – Available on most home routers
  • Enterprise DHCP will be redundant
    – Usually running on central servers
A

DHCP server