IS3440 CHAP 8 NETWORKED FILESYSTEMS AND REMOTE ACCESS Flashcards

1
Q

___ is a distributed network filesystem, sometimes associated with Kerberos tokens.

A

(AFS) Andrew Filesystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ is a protocol that guarantees integrity and data-origin authentication of network packets.

A

(AH) Authentication Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ is a backup fo a PDC on a Microsoft Window NT domain; Linux with Samba can be configured as a BDC.

A

(BDC) Backup Domain Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ is an encryption protocol that normally provides authenticity, integrity, and confidentiality protection of network packets.

A

(ESP) Encapsulating Security Payload protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

___ is an application programming interface that accommodates communication primarily between Kerberos and services such as NFS.

A

(GSSAPI) Generic security services application program interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ is a protocol for key exchange used to set up a security association between different systems.

A

(IKE) Internet Key Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___is an application layer email protocol that supports client access to remote servers.

A

(IMAP4) Internet Message Access Protocol v4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ is a computer network authentication protocol. Developed at MIT as part of project Athena, it allows clients to prove their identities to each other with secure tickets.

A

Kerberos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ is an identity associated with Kerberos tickets. it includes the user, the Kerberos administrator, and the realm.

A

Kerberos principal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___ is typically, the name of the domain for the LAN or enterprise network, in upper-case letters.

A

Kerberos realm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ is the “proof” on one system that verifies the identity of a second system.

A

Kerberos ticket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

___ is a system assigned to maintain a database of NetBIOS names and their services such as domain or workgroup membership.

A

Master browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ is a name for a computer system, commonly assigned on Microsoft-style networks; associated with the session layer of the OSE model.

A

(NetBIOS) Network Address Translation traversal protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ is an account with standard end-user operating system permissions. This type of user does not have administrative permissions that would be found with a superuser, root . , or administrative account.

A

Nonprivileged user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ is an application layer email protocol that supports email client downloads of incoming messages.

A

(POP3) Post Office Protocol v3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ is a master server on a Microsoft Windows NT domain that controls and can grant access to a number of computer resources based on the usernames and passwords in its database. Linux with Samba can be configured as this.

A

(PDC) Primary Domain Controller

17
Q

___ is an application-layer email protocol primarily used for outgoing messages from clients.

A

(SMTP) Simple Mail Transfer Protocol

18
Q

___ is a server that includes a database of NetBIOS names and Internet Protocol (IP) addresses.

A

(WINS) Windows Internet Name Service

19
Q

___ is one name for a protocol associated with the X Window system.

A

X11

20
Q
  1. Which of the following services are required with Kerberos?
  2. Telnet
  3. NFS
  4. NTP
  5. Samba
A

NTP

21
Q
  1. Which of the following files would you expect to contain Kerberos keys?
  2. krb5.keys
  3. users.krb
  4. michael.key
  5. user.keytab
A

user.keytab

22
Q
  1. The protocol that allows Kerberos to work with different file-sharing services is ___.
A

GSSAPI (generic security services application program interface)

23
Q
  1. The vsFTP directory directive changes the default directory for anonymous access.
    TRUE OR FALSE.
A

FALSE

24
Q
  1. Which of the following Samba directives sets the name for the local server?
  2. hostname
  3. netbios name
  4. server_name
  5. domain name
A

netbios name

25
Q
  1. If you want to set up a PDC, what should be the value of the security directive?
  2. user
  3. domain
  4. server
  5. ads
A

user

26
Q
  1. Which of the following bits of information is contained in a WINS server?
  2. Usernames
  3. Permissions
  4. NetBIOS names
  5. Hostnames
A

NetBIOS names

27
Q
  1. Name the full path to the directory with SSH keys for user
    donna
A

./home/donna/.ssh/

acceptable; /home/donna/ .ssh

28
Q
  1. Which of the following directives specify that SSH listens on a network card with a network address of 192.168.0.0?
  2. ListenAddress 192.168.0.1
  3. ListenAddress 192.168.0.0/24
  4. ListenAddress 192.168.0.0/255.255.255.0
  5. ListenAddress 192.268.0.255
A

ListenAddress 192.168.0.1

29
Q
  1. In what file on a remote system would you copy an SSH public key?
  2. .ssh/authorized_keys
  3. .ssh/id_rsa.pub
  4. .ssh/id_dsa.pub
  5. .ssg/id_authorized.pub
A

.ssh/authorized_keys

30
Q
  1. TCP/IP port 443 is associated with IPSec connections.

TRUE OR FALSE

A

FALSE

31
Q
  1. Which of the following directories may contain configuration files for IPSec connections? (Select two)
  2. /etc/sysconfig/networ-scripts/
  3. /etc/ipsec/
  4. /etc/network/
  5. /etc/racoon/
A

/etc/sysconfig/networ-scripts/

/etc/racoon/

32
Q
  1. Which of the following services or protocols can be used to add security to Telnet?
  2. SSL
  3. STP
  4. SSH
  5. PAP
A

SSL

33
Q
  1. Which of the following authentication systems is not normally with RADIUS?
  2. CHAP
  3. PAP
  4. PPP
  5. EAP
A

PPP

34
Q
  1. Which of the following ports is a secure alternative for SMTP?
  2. 52
  3. 110
  4. 993
  5. 465
A

465