2.4 Summarize services provided by networked hosts Flashcards
What is the current version of SMB?
SMB3
Why is SMB1 disabled by default on current Windows versions?
It has security vulnerabilities
How can SMB be implemented on Linux-based devices & NAS appliances?
Via Samba software suite
This allows a Windows client to access a Linux host as though it were a Windows file or print server
What did the eraliest Windows network use instead of TCP/IP?
NetBIOS
Meaning of NetBIOS?
Network Basic Input/Output System
What did NetBIOS allow computers to do?
Address one another by name & establish sessions over protocols
protocols like SMB
What was NetBIOS re-engineered to work over?
TCP & UDP protocols
What term is used to describe the re-engineering of NetBIOS to function over TCP and UDP protocols?
NetBT
Meaning of NetBT?
NetBIOS over TCP/IP
What port does NetBT use for name services?
UDP/137
What does NetBT use UDP/137 for?
Name services
What port does NetBT use for session services?
TCP/139
What does NetBT use TCP/139 for?
Session services
Is NetBT obselete?
Yes
Modern networks use IP, TCP/IP, & DNS for these functions
Why should NetBT be disables on most networks?
Poses a risk to security
When should NetBT be used?
When network needs to support file sharing for pre-Windows 2000 versions
This is because pre-Windows 2000 systems rely on NetBIOS for file and printer sharing
What does FTP use TCP/21 for?
Establish a connection
Between client & server
What does FTP use TCP/20 for?
Transfer data in Active or Passive mode
In FTP’s active mode, the server initiates the data connection to the client on port 20, but it can encounter firewall and NAT issues. Passive mode, where the client initiates both control and data connections to the server, is more firewall-friendly.
2 FTP options that are encrypted?
SFTP & FTPS
FTPS = File Transfer Protocol Secure
Meaning of SFTP?
FTP over Secure Shell
Which encrypted FTP version is widely used?
SFTP
What does a web server do?
Provides client access using HTTP or HTTPS
What does HTTP enable clients to do?
Clients are typically web browsers
To request resources from an HTTP server
How does a server respond to an HTTP resource request from a client?
Returning requested data or responding with an error code
What kind of webpages does HTTP serve?
HTML webpages
What are HTML webpages?
Text files with coded tags describing how to format documents
How does a web browser display HTML webpages?
Interprets the tags & other resources associated with the page
HTTP also enables hyperlinking to related documents and supports form submission (POST) for data transfer from client to server.
What is the functionality of HTTP often extended by?
Support for scripting & programmable features
(Web apps)
Meaning of URL?
Uniform Resource Locators
What are URLs used for?
Accessing resources on the Internet
They contain the necessary info. to identify & access an item
What may a URL for an HTTP resource contain?
- Protocol
- Host location
- File path
Can the URL’s Host location be an IP address instead of the FQDN?
Yes, but IPv6 addresses must be enclosed in [ ]
What does the URL’s File path specify?
The directory & file name locatoin of the resource (if required)
The file path may or may not be case sensitive, depending on how the server is configured
What do orgs. typically lease a web server or space on a server from?
ISP
Larger orgs. with Internet-connected datacenters may host websites themselves
What is the “intranet”?
Private network using web technologies for local access
It provides local access to internal resources for employees within an organization. It offers a secure environment for sharing information, collaboration, and communication exclusively among authorized internal users, helping to improve efficiency and streamline operations while maintaining data security.
What is the “extranet”?
Private network using web technologies for remote access
Enables remote access for authorized users who are external to the organization, such as business partners, suppliers, or customers. It provides a secure way to share specific resources and information with these external parties while maintaining the overall security and integrity of the internal network.
Meaning of SSL?
Secure Sockets Layer
Why was SSL developed?
To address HTTP
Since HTTP was unencrypted
Meaning of TLS?
Transport Layer Security
What was TLS developed from?
SSL
It was ratified as a standed by the IETF
When is HTTP referred to as HTTPS?
When TLS is used with the HTTP application
Encrypted traffic is sent over TCP/443 rather than unencrypted TCP/80
TLS can be used to secure other TCP app protocols, like FTP, POP3/IMPA, SMTP, LDAP
What term is used when TLS is used with UDP?
DTLS
DTLS = Datagram Transport Layer Security
Most often used in VPN solutions
How is HTTPS implemented?
Web server is installed with a digital certificate issued by a trusted CA
CA = Certificate Authority
What do certificates on web servers have?
Encrypted data to prove the identity of the server to the client
Assuming the client also trusts the CA (Certificate Authority)
How is data in digital certificates encrypted?
Using a public/private encryption key pair
Who possesses the private key in web server encryption?
Web server
The private key is kept a secret known only to the server
How is the public key in web server encryption given to clients?
via the digital certificate
How are encrypted tunnels established in web server encryption?
Using the digital certificate’s key pair & a chosen cipher suite in TLS
Even if someone knows the public key, they can’t decrypt the tunnel’s contents without the server’s private key. This ensures secure communication, preventing third-party reading or modification.
How does a browser open a secure session to an HTTPS server?
With a URL starting with https://
It displays a padlock icon in the address bar, indicating a trusted server certificate and a secure connection. Websites can enforce secure sessions, rejecting or redirecting plain HTTP requests
What scheme do email addresses follow?
URL scheme
What do email addresses compromise of?
- Username
- Domain name
Separated by an @
symbol
i.e. david.martin@comptia.org
or david.martin@aol.com
What does SMTP specify?
How email is delivered from 1 mail domain to another
How does the sender’s SMTP server find the recipient’s SMTP server’s IP address?
By using the domain name of the recipient’s email address
SMTP servers for the domain are registered in DNS using Mail eXchange (MX) & host (A/AAAA) records
For user@example.com
, the sender’s SMTP server queries DNS for the MX record of example.com. The DNS server returns mail.example.com
, which is then resolved to an IP address for email delivery
What is SMTP TCP/25 used for?
Message relay between SMTP servers, or MTAs
MTA = Message Transfer Agents
This means the process of transferring emails from a SMTP server to another
What is SMTP TCP/587 used for?
Mail clients to submit emails to an SMTP server
STMP servers configured to support TCP/587 shoud use encryption & authentication
What do SMTP servers deliver emails to?
mailbox servers
i.e. POP3 or SMTP
A mailbox server could be a separate machine or a separate process running on the same computer