2.5 - Summarise the properties and purposes of services provided by networked hosts. Flashcards

2.0 - Networking SERVERS

1
Q

Web Server

A

Respond to browser requests
Using standard web browsing protocols - HTTP/HTTPS
Pages are built with HTML, HTML5

Web pages are stored on the server
Downloaded to the browser
Static pages or built dynamically in real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

File Server

A

Centralised storage of documents, spreadsheets, videos, pictures, and any other files.

Standard system of file management
SMB (Server Message Block),
Apple Filing Protocol (AFP), etc.

The front-end hides the protocol
Copy, delete, rename, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Print Server

A

Connect a printer to the network
Provide printing services for all network devices

May be software in a computer
Computer is connected to the printer

May be built-in to the printer
Network adapter and software

Uses standard printing protocols
SMB (Server Message Block),
IPP (Internet Printing Protocol),
LPD (Line Printer Daemon)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DHCP server

A

Dynamic Host Configuration Protocol

Automatic IP address configuration
Very common service

Available on most home routers

Enterprise DHCP will be redundant
Usually running on central servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS server

A

Domain Name System

Convert names to IP addresses.

Distributed naming system.
The load is balanced across many different servers.

Usually managed by the ISP or enterprise IT department.
A critical resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Proxy server

A

An intermediate server

Client makes the request to the proxy
The proxy performs the actual request
The proxy provides results back to the client

Useful features:
Access control, caching, URL filtering, content scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Mail Server

A

Store your incoming mail
Send your outgoing mail

Usually managed by the ISP or the enterprise IT department.
A complex set of requirements.

Usually one of the most important services.
24 x 7 support.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Authentication server

A

Login authentication to resources

Centralised management
Almost always an enterprise service
- Not required on a home network

Usually a set of redundant servers
Always available
Extremely important service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Syslog

A

Standard for message logging

Diverse systems, consolidated log

Usually a central logging receiver
Integrated into the SIEM.

You’re going to need a lot of disk space

WORM drive technology
Write Once Read Many - DVD-R
Protect important security logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SIEM

A

Security Information and Event Management
Logging of security events and information.

Security alerts
Real-time information

Log aggregation and long-term storage
Usually includes advanced reporting features

Data correlation
Link diverse data types

Forensic analysis
Gather details after an event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All-in-one security appliance

A

Next-generation firewall, Unified Threat Management (UTM) / Web security gateway.

URL filter / Content inspection.

Malware inspection, spam filter, CSU/DSU, router, switch, firewall, IDS/IPS, bandwidth shaper, VPN endpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IDS

A

Intrusion Detection System.
Network based.

Intrusions:

  • Exploits against operating systems, applications, etc.
  • Buffer overflows, cross-site scripting, other vulnerabilities.

Detection – Alarm or alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IPS

A

Intrusion Prevention System.
Network based.

Intrusions:

  • Exploits against operating systems, applications, etc.
  • Buffer overflows, cross-site scripting, other vulnerabilities

Prevention – Stop it before it gets into the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Embedded System

A

Purpose-built device

Not usual to have direct access to the operating system

Alarm system, door security, timecard system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Legacy System

A

Another expression for “really old”

May also be “really important”

Learning old things can be just as important as learning the new things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Endpoint management server

A

Manage all devices from one pane of glass.

Software installations, driver installations, software updates, security patches, remote troubleshooting.

Requires an agent on the device
Server sends the commands
Agent executes the commands