IS3440 CHAP 8 NETWORKED FILESYSTEMS AND REMOTE ACCESS Flashcards Preview

IS3440 LINUX SECURITY > IS3440 CHAP 8 NETWORKED FILESYSTEMS AND REMOTE ACCESS > Flashcards

Flashcards in IS3440 CHAP 8 NETWORKED FILESYSTEMS AND REMOTE ACCESS Deck (34):
1

___ is a distributed network filesystem, sometimes associated with Kerberos tokens.

(AFS) Andrew Filesystem

2

___ is a protocol that guarantees integrity and data-origin authentication of network packets.

(AH) Authentication Header

3

___ is a backup fo a PDC on a Microsoft Window NT domain; Linux with Samba can be configured as a BDC.

(BDC) Backup Domain Controller

4

___ is an encryption protocol that normally provides authenticity, integrity, and confidentiality protection of network packets.

(ESP) Encapsulating Security Payload protocol

5

___ is an application programming interface that accommodates communication primarily between Kerberos and services such as NFS.

(GSSAPI) Generic security services application program interface

6

___ is a protocol for key exchange used to set up a security association between different systems.

(IKE) Internet Key Exchange

7

___is an application layer email protocol that supports client access to remote servers.

(IMAP4) Internet Message Access Protocol v4

8

___ is a computer network authentication protocol. Developed at MIT as part of project Athena, it allows clients to prove their identities to each other with secure tickets.

Kerberos

9

___ is an identity associated with Kerberos tickets. it includes the user, the Kerberos administrator, and the realm.

Kerberos principal

10

___ is typically, the name of the domain for the LAN or enterprise network, in upper-case letters.

Kerberos realm

11

___ is the "proof" on one system that verifies the identity of a second system.

Kerberos ticket

12

___ is a system assigned to maintain a database of NetBIOS names and their services such as domain or workgroup membership.

Master browser

13

___ is a name for a computer system, commonly assigned on Microsoft-style networks; associated with the session layer of the OSE model.

(NetBIOS) Network Address Translation traversal protocol

14

___ is an account with standard end-user operating system permissions. This type of user does not have administrative permissions that would be found with a superuser, root . , or administrative account.

Nonprivileged user

15

___ is an application layer email protocol that supports email client downloads of incoming messages.

(POP3) Post Office Protocol v3

16

___ is a master server on a Microsoft Windows NT domain that controls and can grant access to a number of computer resources based on the usernames and passwords in its database. Linux with Samba can be configured as this.

(PDC) Primary Domain Controller

17

___ is an application-layer email protocol primarily used for outgoing messages from clients.

(SMTP) Simple Mail Transfer Protocol

18

___ is a server that includes a database of NetBIOS names and Internet Protocol (IP) addresses.

(WINS) Windows Internet Name Service

19

___ is one name for a protocol associated with the X Window system.

X11

20

1. Which of the following services are required with Kerberos?

1. Telnet
2. NFS
3. NTP
4. Samba

NTP

21

2. Which of the following files would you expect to contain Kerberos keys?

1. krb5.keys
2. users.krb
3. michael.key
4. user.keytab

user.keytab

22

3. The protocol that allows Kerberos to work with different file-sharing services is ___.

GSSAPI (generic security services application program interface)

23

4. The vsFTP directory directive changes the default directory for anonymous access.
TRUE OR FALSE.

FALSE

24

5. Which of the following Samba directives sets the name for the local server?

1. hostname
2. netbios name
3. server_name
4. domain name

netbios name

25

6. If you want to set up a PDC, what should be the value of the security directive?

1. user
2. domain
3. server
4. ads

user

26

7. Which of the following bits of information is contained in a WINS server?

1. Usernames
2. Permissions
3. NetBIOS names
4. Hostnames

NetBIOS names

27

8. Name the full path to the directory with SSH keys for user
donna

./home/donna/.ssh/
(acceptable; /home/donna/ .ssh)

28

9. Which of the following directives specify that SSH listens on a network card with a network address of 192.168.0.0?

1. ListenAddress 192.168.0.1
2. ListenAddress 192.168.0.0/24
3. ListenAddress 192.168.0.0/255.255.255.0
4. ListenAddress 192.268.0.255

ListenAddress 192.168.0.1

29

10. In what file on a remote system would you copy an SSH public key?

1. .ssh/authorized_keys
2. .ssh/id_rsa.pub
3. .ssh/id_dsa.pub
4. .ssg/id_authorized.pub

.ssh/authorized_keys

30

11. TCP/IP port 443 is associated with IPSec connections.
TRUE OR FALSE

FALSE

31

12. Which of the following directories may contain configuration files for IPSec connections? (Select two)

1. /etc/sysconfig/networ-scripts/
2. /etc/ipsec/
3. /etc/network/
4./etc/racoon/

/etc/sysconfig/networ-scripts/

/etc/racoon/

32

13. Which of the following services or protocols can be used to add security to Telnet?

1. SSL
2.STP
3. SSH
4. PAP

SSL

33

14. Which of the following authentication systems is not normally with RADIUS?

1. CHAP
2. PAP
3. PPP
4. EAP

PPP

34

15. Which of the following ports is a secure alternative for SMTP?

1. 52
2. 110
3. 993
4. 465

465