Network Services 2.4 Flashcards

1
Q

Can be configured to allow the clients on the network to access the network and be able to read and write to its disk

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Another server that could be a physical workstation or network infrastructure that provides printing functionality

A

Print Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Relies on the NetBIOS protocol or SMB

A

Windows-based file and printer server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ports 137, 139

Used for file or printer sharing in a Windows network

A

Network Basic Input/ Output System (NetBIOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port 445

Used for Windows file and printer sharing services

A

Sever Message Block (SMB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provides the ability for a Linux or Unix server to be able to host files or printers that can then be used by Windows clients running the SMB protocol

A

Samba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ports 20, 21

Provides insecure file transfers

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Allows for printing anywhere in the world

A

IP- based File and Printer Server / Cloud Printing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any server that provides access to a website

A

Web Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Extensible web server software, created by Microsoft

A

Internet Information Services (IIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most popular way to run a web server these days

A

Apache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reverse proxy, load balancer, mail proxy, and HTTP cache

A

NGINX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Combines the fully qualified domain name with a protocol at the beginning

A

Uniform Resource Locator (URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Severs that are set up to compose a message and send it to another user

A

Email Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Specifies how emails should be delivered from one mail domain to another

Operates over port 25

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Older email protocol which operates over port 110

A

Post Office Protocol 3 (POP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mailbox server environment designed for Windows based domain environments

A

Microsoft Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mail retrieval protocol

port 143 and can connect to a server and receive and read messages

A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Standardized framework used for port-based authentication on wired and wireless networks

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

occurs when a person’s identity is established with proof and is confirmed by the system

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A database used to centralized info about clients and objects on the network

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used to organize and manage the network, including clients, servers, devices, users, and groups

A

Active Directory (AD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Provides centralized administration of dial up, VPN, and wireless authentication services for 802.1x and the EAP

A

Remote Authentication Dial In User Service (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Propreitary version of RADIUS that can perform the role of an authenticator in 802.1x networks

A

Terminal Access Controller Access-Control System Plus (TACACS+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Occurs when a user is given access to a certain piece of data or certain areas of a building

A

Authorization

18
Q

Ensures the tracking of data, computer usage, and network resources is maintained

A

Accounting

18
Q

Authentication protocol used by Windows to provide for two way (mutual) authentication using a system of tickets

A

Kerberos

19
Q

Occurs when you have proof that someone has taken an action

A

Non-repudiation

20
Q

Sends text based commands to remote devices and is a very old networking protocol

should never be used to connect to secure devices

A

Telnet Port 23

21
Q

Encrypts everything that is being send and received between the client and the server

A

Secure Shell (SSH) Port 22

22
Q

Provides graphical interface to connect to another computer over a network connection

A

Remote Desktop Protocol (RDP) Port 3389

23
Q

Creates a secure connection to tunnel into the RDP

A

Remote desktop gateway (RDG)

24
Q

Designed for thin client architectures

A

Virtual Network Computing (VNC) port 5900

25
Q

Any kind of software that replicates the TTI I/O functionality to remotely connect to a device

A

Terminal Emulator (TTY)

25
Q

Enables different appliances and software applications to transmit logs to a centralized server

A

Syslog

26
Q

TCP/ IP protocol that aids in monitoring network-attached devices and computers

A

Simple Network Management Protocol (SNMP)

26
Q

Computers and other network-attached devices monitored through the use of agents by a network management system

A

Agents

27
Q

Software running on one or more servers to control the monitoring of network-attached devices and computers

A

Network Management System (NMS)

27
Q

Devices that creates network connection between and end user’s client machine and a remote resource (web server)

A

Proxy Server

28
Q

Distributes incoming requests across a number of servers inside a server farm or a cloud infrastructure

A

Load Balancer/ Content Switch

28
Q

Involves continual flooding of victim systems with requests for services, causing the system to crash (single attacker)

A

Denial of Service (DoS)

28
Q

Multiple machines simultaneously launch attacks on the server to force it offline (multiple attackers)

A

Distributed Denial of Service (DDoS)

29
Q

Identifies any attacking IP addresses and routes their traffic through a Knoll interface

A

Blackholing/ Sinkholing

29
Q

works for smallscale attacks against Dos

A

Intrusion Prevention System (IPS)

29
Q

Allows to scale up the demand as needed

A

Elastic Cloud

30
Q

Provides the ability to conduct security functions within a single device or network appliance

A

Unified Threat Management (UTM)

30
Q

Rule set placed on the firewalls, routers, and other network devices that permit or allow traffic through a particular interfacae

A

Access Control List (ASL)

30
Q

Inspects and controls that traffic that is trying to enter or leave a network’s boundary

A

Firewall

30
Q

Provides the mechanisms for workflow and process automation by controlling machinery using embedded devices

A

Industrial Control System (ICS)

31
Q

Includes computers, servers, networks, and cloud platforms

A

Information Technology (IT)

31
Q

Communications network designed to implement an ICS

A

Operational Technology (OT)

32
Q

Digital serial data communication protocol used in OT networks to link different PLCs

A

Fieldbus

33
Q

Can be a local control panel or software that runs on a computer

A

Human Machine Interface (HMI)

34
Q

Type of ICS used to manage large scale multi-site devices and equipment in a geographic region from a host computer

A

Supervisory Control and Data Acquisition (SCADA)

35
Q

Computer system that is designed to perform specific and dedicated functions

A

Embedded Systems

36
Q

Type of digital computer used in industrial or outdoor settings

A

Programmable Logic Controller (PLC)

37
Q

Type of OS that prioritizes deterministic execution of operations that ensure consistent response for time critical tasks

A

Real Time Operating System (RTOS)

38
Q

Processor integrates the platform functionality of multiple logical controllers onto a single chip

A

System on a chip

39
Q

Computer system that is no longer supported by its vendor and no longer provided with security updates and patches

A

Legacy system

40
Q

System that is owned by its developer or vendor

A

Proprietary System