Flashcards in IS3440 CHAP 8 NETWORKED FILESYSTEMS AND REMOTE ACCESS Deck (34):
___ is a distributed network filesystem, sometimes associated with Kerberos tokens.
(AFS) Andrew Filesystem
___ is a protocol that guarantees integrity and data-origin authentication of network packets.
(AH) Authentication Header
___ is a backup fo a PDC on a Microsoft Window NT domain; Linux with Samba can be configured as a BDC.
(BDC) Backup Domain Controller
___ is an encryption protocol that normally provides authenticity, integrity, and confidentiality protection of network packets.
(ESP) Encapsulating Security Payload protocol
___ is an application programming interface that accommodates communication primarily between Kerberos and services such as NFS.
(GSSAPI) Generic security services application program interface
___ is a protocol for key exchange used to set up a security association between different systems.
(IKE) Internet Key Exchange
___is an application layer email protocol that supports client access to remote servers.
(IMAP4) Internet Message Access Protocol v4
___ is a computer network authentication protocol. Developed at MIT as part of project Athena, it allows clients to prove their identities to each other with secure tickets.
___ is an identity associated with Kerberos tickets. it includes the user, the Kerberos administrator, and the realm.
___ is typically, the name of the domain for the LAN or enterprise network, in upper-case letters.
___ is the "proof" on one system that verifies the identity of a second system.
___ is a system assigned to maintain a database of NetBIOS names and their services such as domain or workgroup membership.
___ is a name for a computer system, commonly assigned on Microsoft-style networks; associated with the session layer of the OSE model.
(NetBIOS) Network Address Translation traversal protocol
___ is an account with standard end-user operating system permissions. This type of user does not have administrative permissions that would be found with a superuser, root . , or administrative account.
___ is an application layer email protocol that supports email client downloads of incoming messages.
(POP3) Post Office Protocol v3
___ is a master server on a Microsoft Windows NT domain that controls and can grant access to a number of computer resources based on the usernames and passwords in its database. Linux with Samba can be configured as this.
(PDC) Primary Domain Controller
___ is an application-layer email protocol primarily used for outgoing messages from clients.
(SMTP) Simple Mail Transfer Protocol
___ is a server that includes a database of NetBIOS names and Internet Protocol (IP) addresses.
(WINS) Windows Internet Name Service
___ is one name for a protocol associated with the X Window system.
1. Which of the following services are required with Kerberos?
2. Which of the following files would you expect to contain Kerberos keys?
3. The protocol that allows Kerberos to work with different file-sharing services is ___.
GSSAPI (generic security services application program interface)
4. The vsFTP directory directive changes the default directory for anonymous access.
TRUE OR FALSE.
5. Which of the following Samba directives sets the name for the local server?
2. netbios name
4. domain name
6. If you want to set up a PDC, what should be the value of the security directive?
7. Which of the following bits of information is contained in a WINS server?
3. NetBIOS names
8. Name the full path to the directory with SSH keys for user
(acceptable; /home/donna/ .ssh)
9. Which of the following directives specify that SSH listens on a network card with a network address of 192.168.0.0?
1. ListenAddress 192.168.0.1
2. ListenAddress 192.168.0.0/24
3. ListenAddress 192.168.0.0/255.255.255.0
4. ListenAddress 192.268.0.255
10. In what file on a remote system would you copy an SSH public key?
11. TCP/IP port 443 is associated with IPSec connections.
TRUE OR FALSE
12. Which of the following directories may contain configuration files for IPSec connections? (Select two)
13. Which of the following services or protocols can be used to add security to Telnet?
14. Which of the following authentication systems is not normally with RADIUS?