14. Network Services Flashcards

1
Q

What network service provides the ability for a Linux or Unix server to be able to host files or printers that can be then used by Windows clients running the SMB protocol?

A

Samba

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What refers to extensible web server software, created by Microsoft (HTTP, HHTP/2, and HTTPS)?

A

Intenet Information Services (IIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the current most popular way to run a server?

A

Apache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What functions as a reverse proxy, load balancer, mail proxy, and HTTP cache?

A

NGINX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What combines the fully qualified domain name with e protocol at the beginning?

A

Uniform Resource Locator (URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the standardized framework used for port-based authentication on wired and wireless networks?

A

802.1x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a database used to centralize information about clients and objects on the network?

A

Lightweight Directory Access Protocol (LDAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What provides centralized administration of dial-up, VPN, and wireless authentication services for 802.1x and the EAP? What layer does it operate at and which network protocol does it use?

A

Remote Authentication Dial-In User Service (RADIUS) | Application layer | UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Cisco proprietary version of RADIUS that can perform the role of an authenticator in 802.1x networks?

A

Termincal Access Controller Access-Control System Plus (TACACS+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an authentication protocol used by Windows to provide for two-way (mutual) authentication using a system of tickets? What can be a single point of failiure for it?

A

Kerberos | A domain controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What sends text-based commands to remote devices and is a very old networking protocol that should never be used to connect to secure devices?

A

Telnet Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What encrypts everything that is being sent and received between a client and server?

A

Secure Shell (SSH) Port 22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What provides a GUI to connect to another computer of a network connection, and into which RDG (remote desktop gateway) creates a secure connection to tunnel?

A

Remote Desktop Protocol (RDP) Port 3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is designed for thin client architectures?

A

Virtual Network Computing Port (VNC) Port 5900

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is any kind of software that replicates the TTY I/O (terminal of communiucation between device and user) functionality to remotedly connect to a device?

A

Terminal Emulator (TTY)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What enables different appliances and software applications to transmit logs to a centralized server, and is the de facto standard for logging events by including a PRI (priority) code, header, and message?

17
Q

What is a TCP/IP protocol that aids in monitoring network-attached devices and computers?

A

Simple Network Management Protocol (SNMP

18
Q

What refers to software that is loaded on a managed device to redirect information to the network management system?

19
Q

What is software running on one or more servers to control the monitoring of network-attached devices and computers?

A

Network Management System (NMS)

20
Q

What are three benefits to using a proxy server, which refers to devices that create a network connectio between an end user’s client machine and a remote resource (web server)?

A

Increased network speed & efficiency | Increased security | Additional auditing capabilities

21
Q

What distributes incoming requests across several servers inside a server farm or cloud infrastructure, and is a key thing to help defend against a DoS or DDoS attack?

A

Load balancer / Content switch

22
Q

What refers to a continual flooding of victim systems with requests for services, causing the system to crash?

A

Denial of Service (DoS)

23
Q

What identifies any attacking IP addresses and routes their traffic through a null interface?

A

Blackholing/sinkholing

24
Q

What works for small-scale attacks against DoS?

A

Intrusion Prevention System (IPS)

25
What refers to rule sets placed on the firewalls, routers, and other network devices that permit or allow traffic through a particular interface?
Access Control List (ACL)
26
In an ACL, where do specific rules go and where to generic rules go?
Specific = Top | Generic = Bottom
27
What are five forms/types of firewalls?
Packet-filtering | Stateful | Proxy | Dynamic packet-filtering | Kernel proxy
28
What are three advantages of Unified Threat Management (UTM)?
Reduced # of devices to learn/operate/maintain | Lower upfront costs & power consumption | Easier to install & configure
29
What are three disadvantages of Unified Threat Management?
Single point of failure | Lacks detail provided by a specialized tool | Performance less efficient than single function devices
30
What provides the mechanisms for workflow and process automation by controlling machinery using embedded devices?
Industrial Control System (ICS)
31
What is a serial digital data communication protocol used in Operational Technology (OT) networks to link difference Programmable Logic Controllers (PLCs)?
Fieldbus
32
What is a type of digital computer used in industrial settings that enables automation and assembly lines, autonomous field operations, robotics, and other applications?
Programmable Logic Controller (PLC)
33
What refers to something that can be a local control panel or software that runs on a computer?
Human-Machine Interface (HMI)
34
What is a type of Industrial Control System (ICS) used to manage large scale mutli-site devices and equipment in a geographic region from a host computer?
Supervisory Control and Data Acquisition (SCADA)
35
What refers to computer systems designed to perform specific & dedicated functions, and are considered static environments where changes are infrequent?
Embedded Systems
36
How often is every Programmable Logic Controller (PLC) patch?
Six months or two years
37
What is a type of OS that prioritizes deterministic execution of operations that ensure consistent response for time-critical tasks?
Real-Time Operating System (RTOS)