2.0 Networking - sections 14 Flashcards

1
Q

A Server

A

Can be configured to allow the clients on the network to access the network and be able to read and write to its disk(file share).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Printer Server

A

Another server that could be a physical workstation or network infrastructure the provides printing functionality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Printer Servers

A

Windows-based file and printer server, Linus/or Unix-based, IP-based File and Print Server/Cloud Printing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Windows-based file and print server runs which protocols.

A

Relies on the NetBIOS protocol or SMB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Linus/or Unix-based file and print server use what software

A

Uses Samba, Samba provides the ability for Linus or Unix server to be able to host files or printers that can then be used by windows clients running the SMB protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IP-based File and Printer Server / Cloud Printing

A

Allows for printing anywhare in the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A Web Server

A

Any server that provides access to a website. Generally uses HTTP and HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A IIS web server

A

Internet Information Services(IIS): Extensible web server software, created by Microsoft(HTTP, HTTP/2, and HTTPS) commonly used for window servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Apache software

A

Apache software is the most popular way to run a web server these days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NGINX Web server has/is

A

Reverse proxy, mail proxy, load balances, and HTTP cache. Developed for speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

URL

A

Uniform Resource Locator(URL): Combines the fully qualified domain name with a protocol at the beginning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Email Servers

A

Servers that are set up to compose a message and send it to another user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The four types of Email Servers

A

Simple Mail Transfer Protocol(SMTP), Post Office Protocol version 3(POP3), Internet Mail Application Protocol(IMAP), Microsoft Exchange.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SMTP

A

Simple Mail Transfer Protocol(SMTP): Specifies how emails should be delivered from one mail domain to another. Think SEND mail Transfer protocol, port 25.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

POP3

A

Post Office Protocol(POP3): Older email protocol which operates over port 110. Older protocol to GET/RECEIVE emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IMAP

A

Internet Mail Application(IMAP): Mail retrieval protocol. Operates over port 143 and can connect to a server and receive and read messages. Newer protocol to GET?RECEIVE emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Micosoft Exchange

A

Mailbox server environment designed for Windows-based domain environments. Commonly seen and used in corporate environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AAA Servers

A

Authentication, Authorization, Accounting(AAA) Servers: A server program that handles user request for access to computer resources. Provides authentication, Authorization, Accounting services for an enterprise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

802.1X Authentication framework

A

Standardizard framework protocol used for port-based authentication on wired and wireless networks, and is used to run the Authentication protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Types of Authentication protocols

A

Active Directory(AD), Remote-Authentication Dial-in User Server(RADIUS), Terminal Access Controller Access-Control System Plus(TACACS+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AD Authenticaion protocol

A

Active Directory(AD): Used to organize and manage the network, including clients, servers, devices, users and groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RADIUS Authenticaion protocol

A

Remote Authentication Dial-in User Service(RADIUS): Provides centralized administration of dial-up, VPN, and wireless authentication services for 802.1x and the EAP. Runs on application layer(OSI model), uses UDP for connections making it fast.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TACACS+ Authentication protocol

A

Terminal Access Controller Access-Control System Plus(TACACS+): Proprietary version of RADIUS that can perform the role of an authenticator in 802.1x networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Kerberos Authorization protocol

A

Kerberos: Authorization protocol used by windows to provide for two-way (mutual) authentication using a system of tickets. A domain controller can be single point of failure for Kerberos.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Non-Repudiation Accounting protocol

A

Non-Repudiation: Occurs when you have proof that someone has taken an action.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Remote Access Servers

A

A server that can run different protocols or services to remotely connect devices/users over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Remote Access Server Protocols

A

Telnet, SSH, RDP, VNC, TTY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Telnet:

A

Sends text-based commands to remote devices and is very old networking protocol, port 23. Never use to connect to secure devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

SSH

A

Secure Shell(SSH): Encrypts everything that is being sent and received between the client and the server, port 22.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

RDP

A

Remote Desktop Protocol(RDP): Provides graphical interface to connect to another computer over a network connection, port 3389. Uses remote desktop gateway(RDG) to create a secure connection to tunnel into the RDP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

VNC

A

Virtual Network Computing(VNC): Designed for thin client architectures, port 5900.

32
Q

TTY

A

Terminal Emulator(TTY): Any kind of software that replicates the TTY I/O functionality to remotely connect to a device.

33
Q

Network monitoring Servers

A

Servers that run protocols for tracking various aspects of a network and it devices, and logs.

34
Q

Syslog

A

Protocol that enables different appliances and software applications to transmit logs to a centralized server. Is the default(de facto) standard for logging events.

35
Q

Types of Syslog protocols

A

Old Syslog(syslog), New Syslog(syslog-ng, rsyslog)

36
Q

Old Syslog(syslog) uses what?

A

Relied on UDP, lacked security controls

37
Q

What is syslog-ng, rsyslog, and what does it use.

A

New syslog(syslog-ng, rsyslog): Uses TCP, TLS, MD5, and SHA1

38
Q

SNMP

A

Simple Network Management Protocol(SNMP): TCP/IP protocol that aids in monitoring network-attached devices and computers. Has three parts/components Managed devices, agent, and network management system,port 161, 162.

39
Q

Managed devices component of SNMP

A

Computers and other network-attached devices monitored through the use of agents by a network management system.

40
Q

Agent component of SNMP

A

Software that loaded on a managed devices to redirect informatoin to the network management system.

41
Q

Network Management System(NMS) component of SNMP

A

Software running on one or more servers to control the monitoring of network-attached devices and computers.

42
Q

The two ways SNMP sends data

A

In-band, Out-of-band

43
Q

In-band(syslog data)

A

Less secure, over the network you are using

44
Q

Out-of-band(syslog data)

A

A create/or configure a managed out-of-band network to increase security.

45
Q

Proxy Servers

A

Devices that create a network connection between an end user’s client machine and a remote resource (web server). Can be hardware or software.

46
Q

Proxy servers provide

A

Increased network speed and efficiency, increased security, and additional auditing capabilities.

47
Q

Load balancer/Content switch

A

Distributes incoming requests across a number of servers inside a server farm or a cloud infrastructure. Key to defending against DoS attack or DDoS attack

48
Q

DoS

A

Denial of Service(DoS): Involves a continual flodding of victim systems with request for services, causing the system to crash (single attacker).

49
Q

DDoS

A

Distributed Denial of Service(DDoS): Mulitple machines simultaneously launch attacks on the server to force it offline(multiple attackers).

50
Q

Load Balancer Security techniques

A

Blackholing/Sinkholing, Intrusion Prevention System(IPS), Elastic Cloud

51
Q

Blackholing/Sinkholing

A

A load balancer security technique that identifies any attacking IP addresses and routes their traffic through a null interface.

52
Q

Intrusion Prevention System(IPS)

A

A load balancer security technique that works for small-scale attacks against DoS.

53
Q

Elastic Cloud

A

A load balancer security technique that allows to scale up the demands as needed. ISP will charge you for scaling up.

54
Q

UTM

A

Unified Threat Management(UTM): Provides the ability to conduct security functions( antivirus, content filtering, email and web filtering, anti-spam) within a single device or network appliance. UTM devices are placed between your LAN and the connection to the internet.

55
Q

Access Control List(ACL)

A

Rule sets placed on the firewall, routers, and other network devices that permit or allow traffic through a particular interface.

56
Q

The two actions in ACL

A

Top is specific rules, bottom is generic. Always performed top-down.

57
Q

The two interface configurations for ACL-UTM

A

Web-based interface, Text-based interface

58
Q

Firewall(s)

A

Inspects and controls the traffic that is trying to enter or leave a network’s boundary.

59
Q

Firewall types

A

Packet-filtering, Dynamic packet-filtering, Stateful, Proxy, Kernel proxy.

60
Q

NGFW

A

Next-Generation Firewall(NGFW): Use a single more efficient engine, perferred over UTM if network speed and efficiency are your primary concern.

61
Q

IT stands for

A

Information Technology(IT): Includes computers, servers, networks, and cloud platforms.

62
Q

Two types of OT

A

ICS, and SCADA

62
Q

What is OT

A

Operational technology(OT): Communications network designed to implement an ICS. Technology that interacts with the real world.

63
Q

ICS opertional Technology

A

Industrial Control System(ICS): Provides the mechanisms for workflow and process automation by controlling machinery using embedded devices.

64
Q

What is a DCS opertational technology

A

Distributed Control System(DCS): Multiple ICSs can create a Distributed control system.

65
Q

The three technologies in ICS

A

Fieldbus, Programmable Logic Controller(PLC), Human-Machine Interface(HMI).

66
Q

SCADA Opertional Technology

A

Supervisory Control and Data Acquisition systems(SCADA): Is still technically ICS, but used to manage the large scale multi-site devices and equipment in a geographic region from a host computer. Needs wide-area network to work for large scale sites with cellular, microwave, satellite, fiber, VPN-based LAN.

67
Q

Embedded Systems

A

Embedded Systems: Computer systems that is designed to perform specific and dedicated functions. Are static enviroments, where frequent changes are not allowed. Made to do one thing/operation/action.

68
Q

PLC

A

Programmable Logic Controller(PLC): Type of digital computer used industrial or outdoor settings. the computer inside the machine/device).

69
Q

Types of Embedded systems

A

Real-time Operating System(RTOS), System-on-a-chip

70
Q

RTOS Embedded system

A

Real-time Operating System(RTOS): Type of OS that prioritizes deterministic execution of operations that ensure consisten response for time-critical tasks.

71
Q

System-on-a-chip

A

Processor integrates the platform functionality of mulitple logical controllers onto a single chip.

72
Q

Componets of System-on-a-chip

A

An integrated circuit that contains all the components of a computer, Processor, Memory, Storage, Graphics Processor, Peripherals.

73
Q

Legacy System

A

Computer system that is no longer supported by its vendor and no longer provided with security updates and patches. Need to identify legacy systems and put mitigations in place to keep operating systems.

74
Q

Proprietary System

A

System that is owned by its developer or vendor.