Network Services 2.4 Flashcards

1
Q

Can be configured to allow the clients on the network to access the network and be able to read and write to its disk

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Another server that could be a physical workstation or network infrastructure that provides printing functionality

A

Print Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Relies on the NetBIOS protocol or SMB

A

Windows-based file and printer server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ports 137, 139

Used for file or printer sharing in a Windows network

A

Network Basic Input/ Output System (NetBIOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port 445

Used for Windows file and printer sharing services

A

Sever Message Block (SMB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Provides the ability for a Linux or Unix server to be able to host files or printers that can then be used by Windows clients running the SMB protocol

A

Samba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ports 20, 21

Provides insecure file transfers

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Allows for printing anywhere in the world

A

IP- based File and Printer Server / Cloud Printing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any server that provides access to a website

A

Web Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Extensible web server software, created by Microsoft

A

Internet Information Services (IIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most popular way to run a web server these days

A

Apache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reverse proxy, load balancer, mail proxy, and HTTP cache

A

NGINX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Combines the fully qualified domain name with a protocol at the beginning

A

Uniform Resource Locator (URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Severs that are set up to compose a message and send it to another user

A

Email Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Specifies how emails should be delivered from one mail domain to another

Operates over port 25

A

Simple Mail Transfer Protocol (SMTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Older email protocol which operates over port 110

A

Post Office Protocol 3 (POP3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mailbox server environment designed for Windows based domain environments

A

Microsoft Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mail retrieval protocol

port 143 and can connect to a server and receive and read messages

A

Internet Message Access Protocol (IMAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Standardized framework used for port-based authentication on wired and wireless networks

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

occurs when a person’s identity is established with proof and is confirmed by the system

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A database used to centralized info about clients and objects on the network

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used to organize and manage the network, including clients, servers, devices, users, and groups

A

Active Directory (AD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Provides centralized administration of dial up, VPN, and wireless authentication services for 802.1x and the EAP

A

Remote Authentication Dial In User Service (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Propreitary version of RADIUS that can perform the role of an authenticator in 802.1x networks

A

Terminal Access Controller Access-Control System Plus (TACACS+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Occurs when a user is given access to a certain piece of data or certain areas of a building
Authorization
18
Ensures the tracking of data, computer usage, and network resources is maintained
Accounting
18
Authentication protocol used by Windows to provide for two way (mutual) authentication using a system of tickets
Kerberos
19
Occurs when you have proof that someone has taken an action
Non-repudiation
20
Sends text based commands to remote devices and is a very old networking protocol should never be used to connect to secure devices
Telnet Port 23
21
Encrypts everything that is being send and received between the client and the server
Secure Shell (SSH) Port 22
22
Provides graphical interface to connect to another computer over a network connection
Remote Desktop Protocol (RDP) Port 3389
23
Creates a secure connection to tunnel into the RDP
Remote desktop gateway (RDG)
24
Designed for thin client architectures
Virtual Network Computing (VNC) port 5900
25
Any kind of software that replicates the TTI I/O functionality to remotely connect to a device
Terminal Emulator (TTY)
25
Enables different appliances and software applications to transmit logs to a centralized server
Syslog
26
TCP/ IP protocol that aids in monitoring network-attached devices and computers
Simple Network Management Protocol (SNMP)
26
Computers and other network-attached devices monitored through the use of agents by a network management system
Agents
27
Software running on one or more servers to control the monitoring of network-attached devices and computers
Network Management System (NMS)
27
Devices that creates network connection between and end user's client machine and a remote resource (web server)
Proxy Server
28
Distributes incoming requests across a number of servers inside a server farm or a cloud infrastructure
Load Balancer/ Content Switch
28
Involves continual flooding of victim systems with requests for services, causing the system to crash (single attacker)
Denial of Service (DoS)
28
Multiple machines simultaneously launch attacks on the server to force it offline (multiple attackers)
Distributed Denial of Service (DDoS)
29
Identifies any attacking IP addresses and routes their traffic through a Knoll interface
Blackholing/ Sinkholing
29
works for smallscale attacks against Dos
Intrusion Prevention System (IPS)
29
Allows to scale up the demand as needed
Elastic Cloud
30
Provides the ability to conduct security functions within a single device or network appliance
Unified Threat Management (UTM)
30
Rule set placed on the firewalls, routers, and other network devices that permit or allow traffic through a particular interfacae
Access Control List (ASL)
30
Inspects and controls that traffic that is trying to enter or leave a network's boundary
Firewall
30
Provides the mechanisms for workflow and process automation by controlling machinery using embedded devices
Industrial Control System (ICS)
31
Includes computers, servers, networks, and cloud platforms
Information Technology (IT)
31
Communications network designed to implement an ICS
Operational Technology (OT)
32
Digital serial data communication protocol used in OT networks to link different PLCs
Fieldbus
33
Can be a local control panel or software that runs on a computer
Human Machine Interface (HMI)
34
Type of ICS used to manage large scale multi-site devices and equipment in a geographic region from a host computer
Supervisory Control and Data Acquisition (SCADA)
35
Computer system that is designed to perform specific and dedicated functions
Embedded Systems
36
Type of digital computer used in industrial or outdoor settings
Programmable Logic Controller (PLC)
37
Type of OS that prioritizes deterministic execution of operations that ensure consistent response for time critical tasks
Real Time Operating System (RTOS)
38
Processor integrates the platform functionality of multiple logical controllers onto a single chip
System on a chip
39
Computer system that is no longer supported by its vendor and no longer provided with security updates and patches
Legacy system
40
System that is owned by its developer or vendor
Proprietary System