2.4 Network Services Flashcards

1
Q

DNS server

A
  • Domain Name System
    – Convert names to IP addresses
    – And vice versa
  • Distributed naming system
    – The load is balanced across many different servers
  • Usually managed by the ISP or IT department
    – A critical resource
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DHCP server

A
  • Dynamic Host Configuration Protocol
    – Automatic IP address configuration
  • Very common service
    – Available on most home routers
  • Enterprise DHCP will be redundant
    – Usually running on central servers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

File server

A
  • Centralized storage of documents,spreadsheets, videos, pictures, and any other files
    – A fileshare
  • Standard system of file management
    – SMB (Server Message Block),
    Apple Filing Protocol (AFP), etc.
  • The front-end hides the protocol
    – Copy, delete, rename, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Centralized storage of documents,spreadsheets, videos, pictures, and any other files
    – A fileshare
  • Standard system of file management
    – SMB (Server Message Block),
    Apple Filing Protocol (AFP), etc.
  • The front-end hides the protocol
    – Copy, delete, rename, etc.
A

File server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Print server

A
  • Connect a printer to the network
    – Provide printing services for all network devices
  • May be software in a computer
    – Computer is connected to the printer
  • May be built-in to the printer
    – Network adapter and software
  • Uses standard printing protocols
    – SMB (Server Message Block), IPP (Internet
    Printing Protocol), LPD (Line Printer Daemon
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Connect a printer to the network
    – Provide printing services for all network devices
  • May be software in a computer
    – Computer is connected to the printer
  • May be built-in to the printer
    – Network adapter and software
  • Uses standard printing protocols
    – SMB (Server Message Block), IPP (Internet
    Printing Protocol), LPD (Line Printer Daemon
A

Print server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mail server

A
  • Store your incoming mail – Send your outgoing mail
  • Usually managed by the ISP or the IT department
    – A complex set of requirements
  • Usually one of the most important services – 24 x 7 support
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Store your incoming mail
    – Send your outgoing mail
  • Usually managed by the ISP or the IT department
    – A complex set of requirements
  • Usually one of the most important services – 24 x 7 support
A

Mail server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Syslog

A
  • Standard for message logging
    – Diverse systems, consolidated log
  • Usually a central logging receiver
    – Integrated into the SIEM (Security Information Event Manager)
  • You’re going to need a lot of disk space
    – No, more. More than that.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Standard for message logging
    – Diverse systems, consolidated log
  • Usually a central logging receiver
    – Integrated into the SIEM (Security Information Event Manager)
  • You’re going to need a lot of disk space
    – No, more. More than that.
A

Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Web server

A
  • Respond to browser requests
    – Using standard web browsing protocols
  • HTTP/HTTPS
    – Pages are built with HTML, HTML5
  • Web pages are stored on the server
    – Downloaded to the browser
    – Static pages or built dynamically in real-time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Respond to browser requests
    – Using standard web browsing protocols - HTTP/HTTPS
    – Pages are built with HTML, HTML5
  • Web pages are stored on the server
    – Downloaded to the browser
    – Static pages or built dynamically in real-time
A

Web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication server

A
  • Login authentication to resources
    – Centralized management
  • Almost always an enterprise service
    – Not required on a home network
  • Usually a set of redundant servers
    – Always available
    – Extremely important service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spam

A
  • Unsolicited messages
    – Email, forums, etc.
  • Various content
    – Commercial advertising
    – Non-commercial proselytizing
    – Phishing attempts
  • Significant technology issue
    – Security concerns, resource utilization,
    storage costs, managing the spam
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Unsolicited messages
    – Email, forums, etc.
  • Various content
    – Commercial advertising
    – Non-commercial proselytizing
    – Phishing attempts
  • Significant technology issue
    – Security concerns, resource utilization,
    storage costs, managing the spam
A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Login authentication to resources
    – Centralized management
  • Almost always an enterprise service
    – Not required on a home network
  • Usually a set of redundant servers
    – Always available
    – Extremely important service
A

Authentication server

17
Q

Spam gateways

A
  • Unsolicited email
    – Stop it at the gateway before it reaches the user
    – On-site or cloud-based
18
Q
  • Unsolicited email
    – Stop it at the gateway before it reaches the user
    – On-site or cloud-based
A

Spam gateways

19
Q

All-in-one security appliance

A
  • Next-generation firewall, Unified Threat Management (UTM) / Web security gateway
  • URL filter / Content inspection
  • Malware inspection
  • Spam filter
  • CSU/DSU (access to WAN)
  • Router, Switch
  • Firewall
  • IDS/IPS (Intrusion Detection System, Intrusion Prevention System)
  • Bandwidth shaper * VPN endpoint
20
Q
  • Next-generation firewall, Unified Threat Management (UTM) / Web security gateway
  • URL filter / Content inspection
  • Malware inspection
  • Spam filter
  • CSU/DSU (access to WAN)
  • Router, Switch
  • Firewall
  • IDS/IPS (Intrusion Detection System, Intrusion Prevention System)
  • Bandwidth shaper * VPN endpoint
A

All-in-one security appliance

21
Q

Load balancers

A
  • Distribute the load
    – Multiple servers
    – Invisible to the end-user
  • Large-scale implementations
    – Web server farms, database farms
  • Fault tolerance
    – Server outages have no effect
  • Very fast convergence
22
Q
  • Distribute the load
    – Multiple servers
    – Invisible to the end-user
  • Large-scale implementations
    – Web server farms, database farms
  • Fault tolerance
    – Server outages have no effect
  • Very fast convergence
A

Load balancers

23
Q

Load balancer features

A
  • Configurable load - Manage across servers
  • TCP offload - Protocol overhead
  • SSL offload - Encryption/Decryption
  • Caching - Fast response
  • Prioritization - QoS
  • Content switching - Application-centric balancing
24
Q
  • Configurable load - Manage across servers
  • TCP offload - Protocol overhead
  • SSL offload - Encryption/Decryption
  • Caching - Fast response
  • Prioritization - QoS
  • Content switching - Application-centric balancing
A

Load balancer features

25
Proxy server
* An intermediate server – Client makes the request to the proxy – The proxy performs the actual request – The proxy provides results back to the client * Useful features – Access control, caching, URL filtering, content scanning
26
SCADA / ICS
* Supervisory Control and Data Acquisition System – Large-scale, multi-site Industrial Control Systems (ICS) * PC manages equipment – Power generation, refining, manufacturing equipment – Facilities, industrial, energy, logistics * Distributed control systems – Real-time information – System control – Requires extensive segmentation – No access from the outside
27
* Supervisory Control and Data Acquisition System – Large-scale, multi-site Industrial Control Systems (ICS) * PC manages equipment – Power generation, refining, manufacturing equipment – Facilities, industrial, energy, logistics * Distributed control systems – Real-time information – System control – Requires extensive segmentation – No access from the outside
SCADA / ICS
28
* An intermediate server – Client makes the request to the proxy – The proxy performs the actual request – The proxy provides results back to the client * Useful features – Access control, caching, URL filtering, content scanning
Proxy server
29
Legacy and embedded systems
* Legacy systems – Another expression for “really old” – May also be “really important” – Learning old things can be just as important as learning the new things * Embedded systems – Purpose-built device – Not usual to have direct access to the operating system – Alarm system, door security, time card system
30
* Legacy systems – Another expression for “really old” – May also be “really important” – Learning old things can be just as important as learning the new things * Embedded systems – Purpose-built device – Not usual to have direct access to the operating system – Alarm system, door security, time card system
Legacy and embedded systems
31
IoT (Internet of Things) devices
* Appliances – Refrigerators * Smart devices – Smart speakers respond to voice commands * Air control – Thermostats, temperature control * Access – Smart doorbells * May require a segmented network – Limit any security breaches
32
* Appliances – Refrigerators * Smart devices – Smart speakers respond to voice commands * Air control – Thermostats, temperature control * Access – Smart doorbells * May require a segmented network – Limit any security breaches
IoT (Internet of Things) devices
33
* Domain Name System – Convert names to IP addresses – And vice versa * Distributed naming system – The load is balanced across many different servers * Usually managed by the ISP or IT department – A critical resource
DNS server
34
* Dynamic Host Configuration Protocol – Automatic IP address configuration * Very common service – Available on most home routers * Enterprise DHCP will be redundant – Usually running on central servers
DHCP server