Section 15 OBJ 2.4: Network Services Flashcards

(51 cards)

1
Q

File Server

A

Can be configured to allow the clients on the network to access the network and be able to read and write to its disk (file share)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Print Server

A

a server that could be a physical workstation or network infrastructure that provides printing functionality

Windows based file and print server:
relies on NETBIOS (137, 139) or SMB (445)

Linux or Unix based file and print server:
Samba - Provides the ability for a Linux or Unix server to be able to host files or printers that can then be used by Windows clients running the SMB protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IP-based File and Print Server / Cloud Printing

A

allows for printing anywhere in the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Web Server

A

Any server that provides access to a website, generally through HTTP or HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet Information Services (IIS)

A

Extensible web server software, created by Microsoft (HTTP, HTTP/2, HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Apache

A

Most popular way to run a webserver these days
Can use Linux, Unix, Mac, and Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NGINX

A

Reverse proxy, load balancer, mail proxy, and HTTP cache
faster than IIS and Apache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uniform Resource Locator (URL)

A

combines the fully qualified domain name (FQDN) with a protocol at the beginning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Email Server

A

Servers that are set up to compose a message and send it to another user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Simple Mail Transfer Protocol (SMTP)

A

Specifies how emails should be delivered from one mail domain to another
Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Post Office Protocol version 3 (POP3)

A

Older email protocol where you connect to your server, download messages, and process them on your local machine
port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Message Access Protocol (IMAP)

A

Mail retrieval protocol capable of retrieving emails and keeping a copy on the server. Can also manage status of each email
Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Microsoft Exchange

A

Mailbox server environment designed for Windows based domain environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication

A

occurs when a person’s identity is established with proof and is confirmed by the system

Five methods of authentication:
- something you know
- something you are
- something you have
- something you do
- somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.1x

A

Standardized framework used for port based authentication on wired and wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Lightweight Directory Access Protocol

A

a database used to centralize information about clients and objects on the network
port 389 unencrypted
port 636 encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Active Directory

A

used to organize and manage the network, including clients, servers, devices, users, and groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Remote Authentication Dial-In User Service (RADIUS)

A

provides centralized administration of dial-up, VPN, and wireless authentication services for 802.1x and the EAP
operates at the application layer
Uses UDP
Combines authentication and authorization
Does not support all network protocols
Has cross-platform compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Terminal Access Control Access-Control System Plus (TACACS+)

A

proprietary version of RADIUS from Cisco that can perform the role of an authenticator in 802.1x networks
Uses TCP
Separates authentication, authorization, and accounting
Supports all network protocols
Exclusive to Cisco devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authorization

A

Occurs when a user is given access to a certain piece of data or certain areas of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Kerberos

A

Authentication protocol used by Windows to provide for two-way (mutual) authentication using a system of tickets

22
Q

Accounting

A

Ensures the tracking of data, computer usage, and network resources is maintained
Typically kept in a log file

23
Q

Telnet

A

Sends text-based commands to remote devices and is a very old networking tool
Not secure because everything is sent in plain text
Port 23

24
Q

Secure Shell (SSH)

A

Encrypts everything that is being sent and received between the client and the server
Port 22

25
Remote Desktop Protocol (RDP)
Provides graphical interface to connect to another computer over a network connection Use remote desktop gateway (RDG) to create a secure connection tunnel into the RDP Port 3389
26
Virtual Network Computing (VNC)
designed for thin client architectures Port 5900
27
Terminal Emulator (TTY)
Any kind of software that replicates the TTY I/O functionality to remotely connect to a device
28
Syslog
Enables different appliances and software applications to transmit logs to a centralized server It is the de facto standard for logging events When mentioned, it can refer to the protocol, server, or the log entries themselves Old Syslog: Relied on UDP Lacked security controls New Syslog: Uses TCP Uses TLS Uses MD5 and SHA1
29
Simple Network Management Protocol (SNMP)
TCP/IP protocol that aids in monitoring network-attached devices and computers 3 components: Managed Devices - computers and other network-attached devices monitored through the use of agents by a network management system Agent - software that is loaded on a managed device to redirect information to the network management system Network Management Systems - running on one or more servers to control the monitoring of network attached computers
30
Proxy Server
Devices that create a network connection between an end user's client machine and a remote resource (web server) Can cache websites to save bandwidth Increased security by whitelisting and blacklisting sites Increase auditing capabilities by keeping logs
31
Load Balancer/Content Switch
Distributes traffic across a number of servers inside a server farm or cloud infrastructure
32
Denial of Service (DoS)
a continuous flooding of requests to crash the system
33
Distributed Denial of Service (DDoS)
Multiple machines simultaneously launch attacks on the server to force it offline
34
Blackholing/Sinkholing
Identifies any attacking IP address and routes their traffic through a null interface
35
Intrusion Prevention System (IPS)
Works for small-scale attacks against DoS
36
Elastic Cloud
Allows to scale up the demand as needed
37
Access Control List (ACL)
Rule sets placed on the firewalls, routers and other network devices that permit or allow traffic through a particular interface Actions always performed top-down in an ACL, so specific rules on top, generic on bottom
38
Firewall
Inspect and control traffic trying to enter or leave a network Types include: Packet-filtering Stateful Proxy Dynamic packet-filtering Kernel Proxy
39
Unified Threat Management (UTM)
Provides the ability to conduct security functions within a single device or network appliance
40
Information Technology (IT)
Includes computers, servers, networks, and cloud platforms
41
Operational Technology (OT)
Communications network designed to implement an ICS Technology that interacts with the real world, no computer needed
42
Industrial Control Systems (ICS)
Provides the mechanisms for workflow and process automation by controlling machinery using embedded devices
43
Fieldbus
Digital serial data communication protocol used in OT networks to link different programmable logic controllers (PLCs)
44
Programmable Logic Controller (PLC)
Type of digital computer used in industrial settings that enables automation and assembly lines, autonomous field operations, robotics, and other applications
45
Human-Machine Interface (HMI)
Can be a local control panel or software that runs on a computer
46
Supervisory Control and Data Acquisition (SCADA)
Type of ICS used to manage large scale multi-site devices and equipment in a geographic region from a host computer
47
Embedded System
Computer system that is designed to perform specific or dedicated functions Considered static environments, where frequent changes are not allowed
48
Real-time Operating System (RTOS)
Type of OS that prioritizes deterministic execution of operations that ensure consistent response for time critical tasks
49
System-on-a-Chip
processor integrates the platform functionality of multiple logic controllers on a chip ex: raspberry-pi
50
Legacy system
computer system that is no longer supported by its vendor and is no longer provided with security updates and patches Must identify legacy systems and put mitigations in place
51
Proprietary System
System that is owned by its developer or vendor