IS3440 CHAP 8 NETWORKED FILESYSTEMS AND REMOTE ACCESS Flashcards

1
Q

___ is a distributed network filesystem, sometimes associated with Kerberos tokens.

A

(AFS) Andrew Filesystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ is a protocol that guarantees integrity and data-origin authentication of network packets.

A

(AH) Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ is a backup fo a PDC on a Microsoft Window NT domain; Linux with Samba can be configured as a BDC.

A

(BDC) Backup Domain Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ is an encryption protocol that normally provides authenticity, integrity, and confidentiality protection of network packets.

A

(ESP) Encapsulating Security Payload protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ is an application programming interface that accommodates communication primarily between Kerberos and services such as NFS.

A

(GSSAPI) Generic security services application program interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ is a protocol for key exchange used to set up a security association between different systems.

A

(IKE) Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___is an application layer email protocol that supports client access to remote servers.

A

(IMAP4) Internet Message Access Protocol v4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is a computer network authentication protocol. Developed at MIT as part of project Athena, it allows clients to prove their identities to each other with secure tickets.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is an identity associated with Kerberos tickets. it includes the user, the Kerberos administrator, and the realm.

A

Kerberos principal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is typically, the name of the domain for the LAN or enterprise network, in upper-case letters.

A

Kerberos realm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ is the “proof” on one system that verifies the identity of a second system.

A

Kerberos ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ is a system assigned to maintain a database of NetBIOS names and their services such as domain or workgroup membership.

A

Master browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ is a name for a computer system, commonly assigned on Microsoft-style networks; associated with the session layer of the OSE model.

A

(NetBIOS) Network Address Translation traversal protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ is an account with standard end-user operating system permissions. This type of user does not have administrative permissions that would be found with a superuser, root . , or administrative account.

A

Nonprivileged user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ is an application layer email protocol that supports email client downloads of incoming messages.

A

(POP3) Post Office Protocol v3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ is a master server on a Microsoft Windows NT domain that controls and can grant access to a number of computer resources based on the usernames and passwords in its database. Linux with Samba can be configured as this.

A

(PDC) Primary Domain Controller

17
Q

___ is an application-layer email protocol primarily used for outgoing messages from clients.

A

(SMTP) Simple Mail Transfer Protocol

18
Q

___ is a server that includes a database of NetBIOS names and Internet Protocol (IP) addresses.

A

(WINS) Windows Internet Name Service

19
Q

___ is one name for a protocol associated with the X Window system.

20
Q
  1. Which of the following services are required with Kerberos?
  2. Telnet
  3. NFS
  4. NTP
  5. Samba
21
Q
  1. Which of the following files would you expect to contain Kerberos keys?
  2. krb5.keys
  3. users.krb
  4. michael.key
  5. user.keytab
A

user.keytab

22
Q
  1. The protocol that allows Kerberos to work with different file-sharing services is ___.
A

GSSAPI (generic security services application program interface)

23
Q
  1. The vsFTP directory directive changes the default directory for anonymous access.
    TRUE OR FALSE.
24
Q
  1. Which of the following Samba directives sets the name for the local server?
  2. hostname
  3. netbios name
  4. server_name
  5. domain name
A

netbios name

25
6. If you want to set up a PDC, what should be the value of the security directive? 1. user 2. domain 3. server 4. ads
user
26
7. Which of the following bits of information is contained in a WINS server? 1. Usernames 2. Permissions 3. NetBIOS names 4. Hostnames
NetBIOS names
27
8. Name the full path to the directory with SSH keys for user donna
./home/donna/.ssh/ | acceptable; /home/donna/ .ssh
28
9. Which of the following directives specify that SSH listens on a network card with a network address of 192.168.0.0? 1. ListenAddress 192.168.0.1 2. ListenAddress 192.168.0.0/24 3. ListenAddress 192.168.0.0/255.255.255.0 4. ListenAddress 192.268.0.255
ListenAddress 192.168.0.1
29
10. In what file on a remote system would you copy an SSH public key? 1. .ssh/authorized_keys 2. .ssh/id_rsa.pub 3. .ssh/id_dsa.pub 4. .ssg/id_authorized.pub
.ssh/authorized_keys
30
11. TCP/IP port 443 is associated with IPSec connections. | TRUE OR FALSE
FALSE
31
12. Which of the following directories may contain configuration files for IPSec connections? (Select two) 1. /etc/sysconfig/networ-scripts/ 2. /etc/ipsec/ 3. /etc/network/ 4. /etc/racoon/
/etc/sysconfig/networ-scripts/ /etc/racoon/
32
13. Which of the following services or protocols can be used to add security to Telnet? 1. SSL 2. STP 3. SSH 4. PAP
SSL
33
14. Which of the following authentication systems is not normally with RADIUS? 1. CHAP 2. PAP 3. PPP 4. EAP
PPP
34
15. Which of the following ports is a secure alternative for SMTP? 1. 52 2. 110 3. 993 4. 465
465