Chapter 2 - Telecommunications and Network Security Flashcards

1
Q

Network layering models

A

OSI - reference model - structured into 7 layers and TCP/IP or Department of Defense model - structured into 4 layers. Encapsulation is common to both - layers isolated on a technical level and operate independently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

OSI - defined in 1984 Open System Interconnect ISO/IEC 7498-1. Latest revision 1994

A

Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

OSI - Physical Layer - Layer 1

A

describes the networking hardware - such as electrical signals and bits and bytes such as network interfaces and cabling. Repeaters for communication trnsfer devices at this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OSI - The Data-Link Layer - Layer 2

A

describes data transfer between machines, for instance by an Ethernet - prepares the packet it receives form the network layer to be transmitted as frames on the network, detects errorrs in frames, converts higher layers into bits. Has two sub layers - logical link control (LLC) - manages connections between peers; - Medai Access Control (MAC) - transmits and recieves frames between peers. Moves data to the next physically connected device. SLIP, CSLIP, PPP at this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

OSI - Network Layer - Layer 3

A

describes data transfer between machines for instance by the Internet Protocol (IP) - moves information between two hosts that are not physically connected. Uses logical addressing - Internet Protocol (IP) is the most important network layer protocol. IP uses the destination IP address to transmit packets thorugh networks - Addressing. Fragmentation - IP will subdivide a packet if its size is greater than the maximum size allowed. routers used as this layer, does not guarantee error free delivery. ICMP and IGMP at this layer. Single unit of IP data is a datagram.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

OSI - Transport Lyer - Layer 4

A

describes data transfer between applications, flow control, and error detectection and correction for instance by TCP - end to end transport between hosts. User Datagram Protocol (UDP) and Transmission Control Protocol (TCP) are important transport layer protocols. TCP provides error free transmission. Does not provide confidentiality. Unit of TCP data is a segment. Controls rate of packet transfers. End to End.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

OSI- Session Layer - Layer 5

A

describes the handshake between applications, for instance authentication process - logical persistent connection between peer hosts - responsible for creating, maintaining, and tearing down the session. Full duplex - both host can exchange info simulateneously and independent; Half Duplex - hosts can exchange information but only one host at a time; Simplex only one host can send information to its peer. Information travels in one direction only. With Presentation layer can provide end to end security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OSI - Presentation Layer - Layer 6

A

describes the presentation of information, such as ASCII syntax - assures peer applications use a common format to represent data. Services: data conversion, character code translation, compresion, encryption and decryption. Two sublayer components: CASE - provides and request services; SASE - application specific services. With Session layer can provide end to end security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OSI - Application Layer - Layer 7

A

describes the structure, interpretation, and handling of information. In security terms it is relevant because it relies on all underlying layers. From the point of view of the (ISC)2 Common Body of Knowledge, the application layer is covered in the Operations section. Portal to Network based Services - determining the identity and availability of remote applications. HTTP, FTP, SMTP. Provides non-repudiation services - integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RIP in Layer 3

A

Routing information Protocol - uses only hop counts to determine routing metric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

OSPF in layer 3

A

Open shortest path first - require large amounts of CPU power and memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Border Gateway Protocol in Layer 3 (BGP)

A

allow fully decentralized routing - exchanges routing information between gateway hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ICMP in layer 3

A

Internet Control Message Protocol - means to send error messages and to probe network at Network layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP

A

client sends a SYN segment, server sends an ACL and a SYN, client sends an ACK. Stateful packet filter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP/IP Reference Model

A

Link Layer, network layer, transport layer, application layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Link layer

A

physical communication and routing - covers OSI 1&2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Network Layer

A

Covers OSI layer 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Transport layer

A

covers OSI layer 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Application Layer

A

Covers OSI layers 5,6,7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IP addresses

A

four octets; two parts network number and the host. Network number assigned by ICANN. Host represents the network interface within the network. Range of 0 -255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Class of IP Addresses for Network number

A

Class A - 1-127 (1 octet) Class B - 128-191 (2 octets) Class C- 192-223 (3 octets) Class D - 224-239 (multicast) Class E - 240-155 (Reserved)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Class A - Computer’s loop back address

A

127.0.0.0 - troubleshooting at machine level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IPV6

A

Modernization of IPV4 (32 bits). IPV6 is 128 bits and supports two hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TCP and UDP

A

map data connections through the association of port numbers managed by Internet Assigned Numbers Authority (IANA). 65,536 (216) ports exist. Port number length of 16. TCP connection oriented. UDP is not.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Well known ports

A

0 through 1023 - used by privileged processes and users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Registered ports

A

1024-49151 - can be registered with IANA by application developers but are not assigned by them - users may not have privileges to run an application on a well-known port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Dynamic or Private Ports

A

49152 -65535 can be freely used by applications; one typical use for these ports is initiation of return connections for requested data or services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

User Datagram Protocol

A

UDP - lightweight service for connectionless data transfer without error detection and correction - easy prey to spoofing techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

RFC 3550

A

Real-time protocol (RTP) and real-time control protocol (RTCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

MBone - RFC 2960

A

Multicasting protocol, reliable UDP and Stream control transmission protocol (SCTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Extranet

A

differs from a DMZ - it is made available to authenticated connections - where DMZ hosts publicly available resources that support unauthenticated connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

DHCP

A

Dynamic Host Configuration Protocol - automatically assigns IP addresses to workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

RFC 3118

A

replaces normal DHCP messages with authenticated ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

ICMP

A

Internet Control Message Protocol - exchange of control messages between hosts and gateways and is used for diagnostic tools such as ping and traceroute - can be leveraged for man-in-the-middle and denial-of-service attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

ping of death

A

An enormous number of operating systems would crash or become unstable upon receiving an ICMP eco greater than the legal packet limit of 65,536.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

IGMP

A

Internet Group Management Protocol - manages multicasting groups. Version 1 - periodically sends queries to hosts, Version 2 - two types of queries: general and group-specific. Version 3 - specifies sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

RIP

A

Routing Information Protocol - dynamic routing designed for small networks - uses number of hops for best route less than or equal to 15 hops. cannot be used in a network with different subnet masks, exchange entire route table every 30 seconds, can’t verify trustworthiness. Version 2 - allowed different subnet masks and RFC 2082 MD5 authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

VRRP

A

Virtual Router Redundancy Protocol - supports automatic failover - appears as a physical router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

DNS

A

Domain named services - supports use and resolution of e-mail and WWW addresses. Prominent target of attacks. Port 53. RFC 882,1034, 1035

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

LDAP

A

Lightweight Directory Access Protocol - manages user information loosely based on X.500, front end. Uses backends like NIS, Active Directory, Java System directory. Weak authentication based on host name resolution. Port 389, RFC 1777. Clear text - easily intercepted. Deployment over SSL provides authentication, integrity, confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

NetBIOS

A

Network Basic Input Output System. Ports 137 and 138 (TCP) and 139 (UDP). 135 for remote procedure calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

NIS and NIS +

A

network information service- manages user credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

CIFS/SMB

A

common internet file system/ server message block - user level and tree level security - Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

NFS

A

Network file system - file sharing UNIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

SMTP/ESMTP

A

Simple Mail Transfer Protocol & Enhanced Simple Mail Transfer Protocol - used to route email, Port 25/TCP managed thru DNS using mail exchange records - robust, nonexistent authentication and lock of encryption. Enhanced version offers authentication mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

FTP

A

File Transfer Protocol - publishing data over the Internet, Port 20 - data, Port 21 - control, RFC 959. Original clear text simple authentication. Secure FTP with TLS encrypts session RFC 4217; SFTP - not FTP but uses secure shell to transfer files - encrypts both commands and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

HTTP

A

Hypertext Transfer Protocol - Port 80 RFC 1945, 2109, 2616 - supports exchange of information in HTML - does not support encryption and fairly simple authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

SCADA

A

Supervisory Control Data Acquisition - systems designed to operate with several different communication methods including modems, WANS and various networking equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Dual Homed Host

A

has two network interface cards - each on a separate network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Bastion Host

A

serves as a gateway between a trusted and untrusted network - central host to resist attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Hubs

A

all connected devices will receive each other’s broadcasts; single point of failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Bridges

A

Layer 2 devices filter traffic based on MAC addresses. IEEE 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Routers

A

read destination Layer 3 addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Twisted Pair

A

Cat 1 less than 1Mbps Cat 2 less than 4 Mbps Cat 3 16 Mbps Cat 4 20Mbps Cat 5 100 Mbps Cat 5e 1000 Mbps Cat 6 1000 Mbps Shielded and Unshielded - copper wires twisted together UTP does not require fixed spacing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Coaxial Cable

A

one thick conductor surrounded by a grounding braid of wire in a protective sheath - greater bandwidth and longer cable lengths, expensive and difficult to bend. Requires fixed spacing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Patch Panel

A

devices are connected to a patch panel instead of directly connecting to other devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

DSSS

A

Direct-Sequence Spread Spectrum - wireless technology spreads signal over a wider band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

FHSS

A

Frequency-Hopping Spread Spectrum spreads signal over rapidly changing frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

CDMA

A

Code Division Multiple Access - wireless mostly used for cellular technology. CDMA 200 - Rate of 153.6 Mbps.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

GSM

A

Global Service for Mobile Communications most popular cellular technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Open System Authentication

A

most basic form of wireless authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Shared Key Authentication

A

encrypt a shared secret between the access point and the wireless client - WEP can be decrypted by an attacker in a very short time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

WiFi Protected Access

A

WPA - RC$ 128 bit uses temporal key integrity protocol - uses different key for each packet - mutual authentication. WPA2 certified IEEE 802.11i

64
Q

EAP-TLS

A

Extensible Authentication Protocol, Transport Layer Security - mutual authentication with digital certificate - too much overhead

65
Q

EAP_TTLS

A

tunneled TLS - digital certificates are used but no client-side certificate but less secure

66
Q

EAP-PEAP

A

protected EAP - similar to EAP-TLS but non digital certificate

67
Q

IEEE 802.11

A

802.11b legacy - first ratified version of WiFi 802.11a - not compatible with b 802.11g-frequency band of b and speed of a - 52Mbps. compatible with b

68
Q

Bluetooth

A

short range low-power wireless specification

69
Q

ARP

A

Address resolution protocol - given layer 3 IP address determines layer 2 MAC address - does not require authentication - maps 32 bit IPv4 to 48 bit hardware addresses. RARP - finds IP address

70
Q

PPP

A

Point to Point protocol - used to connect a device to a network over a serial line to a network. ISPs use PPP to allow dial up users access to the Internet - supports authentication, Password Authentication Protocol, CHallenge handshake protocol, and Extensible Authentication protocol

71
Q

Broadband wireless

A

IEEE 802.16 WiMax - 2Mbps to 10 Mbps - allows users to connect to wireless base stations miles from where they are located and obtain MAN access. Uses AES to protect confidentialilty with authentication options including EAP

72
Q

Fiber Optics

A

uses glass or plastic to transmit light - light source, optical cable and light detector. 40gig/second, not easily intercepted

73
Q

Firewalls

A

filters traffic based on a set of rules that enforce administrative security policies. Placed between entitites with different trust domains.complex to admister and manage. Filter by address or service. Should not mount file systems via NFS. 3rd generation firewalls - statefull inspection

74
Q

NAT

A

Network Address Translation - change source address of outgoing packet to a different address. PAT - translate all source port number in the packet to a unique value

75
Q

Static packet filetering

A

examine’s static criteria - blocking all packets with Port number 79(finger) is an example

76
Q

Stateful Inspection or Dynamic Packet FIltering

A

examines each packet in the context of the session allowing dynamic adjustments

77
Q

Proxies

A

mediates communications between untrusted end-points and trusted end points - creates illusion that the traffic orginated from the proxy firewall hiding the trusted internal client from potential attackers

78
Q

IPSec

A

IP security is a suite of protocols for communicating securely with IP by providing mechanisms for authenticating and encrypting. Transport mode - client to server, tunnel mode - firewall to firewall. HAIPE is an extension of IPSec. Does not allow system to select security protocols.

79
Q

AH

A

Authentication Header is used to prove the identity of the sender and ensure that the transmitted data has not been tampered with using hash - ensures integrity not confidentiality - Encapsulating Security Payload - provides intergirty and confidentiality.

80
Q

ESP

A

Encapsalating security payload encrypts IP packets and ensures their integirty

81
Q

Security Association

A

SAs work in one direction and defines mechanisms that an endpoint will use to communicate

82
Q

IKE

A

Internet key exchange - proves identity to each other - shared secret, public key encryption or revised mode of Public Key encryption is Phase 1. Phase 2 - security associations established. Like IPSEC - authentication with pre-shared key, public key, certificate based

83
Q

PPTP

A

Point to Point Tunneling Protocol relies on generic routing encapsulation (GRE) to build the tunnel between end points - drives encryption key from the user’s password

84
Q

L2TP

A

Layer 2 Tunneling Protocol allows caller over a serial line using PPP to connect over the internet to a remote network - does not provide encryption

85
Q

SSH

A

Secure Shell allows users to securely access resources on remote computers over an encrypted tunnel - supports authentication

86
Q

SOCKS

A

popular circuit proxy used to access a remote server - application gateway acts as a connection proxy

87
Q

SSL/TLS

A

SSL 3.0 and TLS 1.1 are compatible with SSL being a session encryption tool - creates a tunnel back to home office. At Application layer - 40 bit and 128 bit. Client side authentication. SSLv2 uses signed certificates

88
Q

XMPP

A

Extensible Messaging and Presence Protocol. Jabber is an open instance messaging protocol and formalized XMPP

89
Q

IRC

A

Internet Relay Chat - Port 194, RFC 1459 - unecrypted

90
Q

RADIUS

A

Remote AUthentication Dial-in User Service - authentication protocol used mainly in network environments , or for similar services requiring single signon for layer 3, Port 1812, 1813 RFC 2865

91
Q

SNMP

A

Simple Network Management Protocol - Port 161, 162 and RFC 1157. designed to manage network infrastructure

92
Q

Telnet

A

Port 23 RFC 854, 855

93
Q

Virtual Network Terminal Services

A

used for remote access to server resources. Port 80 (TCP), 443 (UDP) - eg Citrix

94
Q

BUS

A

is a lan with a central cable to which all nodes connect

95
Q

Tree Topology

A

similar to BUS

96
Q

Ring

A

CLosed loop technology

97
Q

Mesh

A

all nodes are connected to every node

98
Q

Star

A

all nodes connected to a central device

99
Q

Ethernet

A

IEEE 802.3

100
Q

Token RIng

A

IEEE 802.5

101
Q

FDDI

A

Fiber Distribute Data Interface - uses two rings, one used other back up 100 Mbps - counter rotating - has been supplanted

102
Q

MPLS

A

Multiprotocol Label Switching - refered to a IP VPN - but does not incude encryption services

103
Q

ISDN

A

Integrated Services Digital Network - remote access with higher bandwidth (before DSL and cable modems) - at end of life

104
Q

Point-toPoint Lines

A

expensive options - connects two end points - high bandwidth fiber cable

105
Q

T1

A

multiplexes 24 channels over copper cable - 1.544 Mbps - T2 4xT1, T3 7xT2, T4 6xT3

106
Q

X.25

A

allows users and hosts to connect through a model to remote hosts via a packet-switched network - replaced by DSL and ATM

107
Q

Frame Relay

A

Economical alternative to circuit-switched networks - uses packet switching technology for WAN Connectivity.

108
Q

ATM

A

Asynchronous Transfer Mode - 155Mbps - uses virtual circuits, fixed size frames

109
Q

SLIP

A

serial line IP cannot be used for full duplex WAN

110
Q

MNP

A

Microsoft Networking Protocol - Echoplex

111
Q

XDSL

A

1.544 - HDSL - two copper twisted pairs.

112
Q

Ethernet

A

A unit is a frame. Fast Ethernet 802.3u 100Mbps. Ethernet access method is CSMA/CD 100 BAse TX Fast Ethernet - 2 pair Cat 5 UTP or Cat1 STP

113
Q

Unicast

A

LAN Trasmission Protocol

114
Q

POP#

A

Runs on Port 110

115
Q

IP Header Protocol Field

A

ICMP - 1, IGMP - 2, TCP - 6, UDP 17

116
Q

X.400

A

OSI for message handling

117
Q

Diverse routing

A

thru split cable or duplicate cable facilities

118
Q

Telenet & Rlogin

A

Use TCP protocol

119
Q

Screening Router

A

packet filter based on source & destination filter

120
Q

CHAP

A

Challenge Hand Authentication Protocol

121
Q

Syn Attack

A

high number of half open connections

122
Q

Macro Virus

A

Not depending on size of packet

123
Q

Distributed Denial of Service

A

First Phase - compromise as many machines as possible. Components - client, handler, agent, target

124
Q

VPN Software

A

Does not encrypt

125
Q

Bots and Botnets

A

Bots are zombies controlled by shadowy figures - largest shource of spam e-mail

126
Q

Teardrop

A

ip fragments are constructed so that the target host calculates a negative fragment length

127
Q

Overlapping fragment attack

A

subvert packet filters that only inspect the first fragment of a fragmented packet.

128
Q

Source Routing Exploitation

A

sender specifies path

129
Q

Smurg and Fraggle attacks

A

use broadcasts to create DoS attacks. Smurf misuses ICMP. Fraggel uses UDP

130
Q

NFS Attacks

A

basic authentication method easy to exploit

131
Q

Network Nws Transport Protocol Secuirty

A

NNTP - main shortcoming authentication

132
Q

Finger Use Information Protocol

A

last log in time of a user and whether currently logged in

133
Q

Network Time Protocol

A

NTP sychronizes computer clocks

134
Q

DoS

A

overload with excessive traffic

135
Q

Syn Flood Attack

A

DoS against the inital handshake - overloads the target’s connection table

136
Q

Spoofing

A

bogus source address

137
Q

Session Highjack

A

unatuhorized insertion of packets into a data stream

138
Q

Layer Ethernet 802.3 is placed on

A

Data Link Layer

139
Q

Best Proactive Network Defense

A

Perimeter Surveillance and intelligence gathering

140
Q

Network is not the target of attack in

A

man in the middle attack

141
Q

Most effective against a distribute DoS attack

A

Traffic Filtering

142
Q

Optimal placement for network based intrusion detection systems

A

On the network perimeter to alert the network administrator of all suspicious activity

143
Q

End-point devices most likely be considered part of a converged IP network

A

fileserver, ip phone, security camera

144
Q

an advantage of fiber-optic over copper cables from a security perspective

A

more difficult to wiretap

145
Q

Part of a network’s perimeter defense

A

firewall, proxy server, host based intrusion detection system

146
Q

Principal Security Risk of wireless LANs

A

Lack of physical access controls

147
Q

WLAN’s SSID configured with adequate security protection

A

SSIDs are not for authentication

148
Q

IPSec

A

provides mechanisms for authentication and encryption

149
Q

Security Event Manager

A

aggreagates logs from security devices and application servers looking for suspiious activity

150
Q

DNS weakness

A

lack of authenticationof servers and therby the authenticity of records

151
Q

Open email relays

A

using a blacklist of open email relays does not provide a secure way for an email administrator to identify open mail relays and filter spam

152
Q

botnet can be characterized by

A

a group of dispersed compromised machines controlled remotely for illicit reasons

153
Q

mesh network is rarely implemented in modern networks due to

A

cost

154
Q

Strongest wireless encryption an 801.11N

A

WPA2

155
Q

Media best suited for an area with a lot of electromagnetic raidation

A

Fiber

156
Q

Multi layer Protocols such as Modbus

A

are often insecure by their very nature as they were not designed to natively operate over today’s IP networks.

157
Q

Best approach for admistering a server remotely

A

SSHv2