Lesson 6 Flashcards
A server disk configured to allow clients to access it over the network is a
Fileshare
SMB
Server Message Block
NetBIOS
Network Basic Input/Output System
NetBT
NetBIOS over TCP/IP
FTP
File Transer Protocol
Allows a client to upload and download files from a network server
File transfer Protocol (FTP)
Often used to upload files to websites
File Transfer Protocol (FTP)
URL
Uniform Resource Locator
Resources on the internet are accessed using an addressing scheme known as a
Uniform Resource Locator (URL)
SSL
Server Socket Layer
TLS
Transport Layer Security
Then Transport Layer Security (TLS) is used with the HyperText Transfer Protocol (HTTP) application, it is referred to as
HTTPS
SMTP
Simple Mail Transfer Protocol
POP
Post Office Protocol
IMAP
Instant Message Access Protocol
SSO
Single Sign-On
A protocol that allows a user to authenticate once to access the network and gain authorization for all the compatible application servers running on it
Single Sign-On (SSO)
A directory is a type of
Database
LDAP
Lightweight Directory Access Protocol
AAA
Authenticate, Authorization, and Accounting
Consolidates authentication services across multiple access devices
Authenticate, Authorization, and Accounting (AAA)
Authentication, Authorization, and Accounting (AAA) uses the following components
Supplicant
Network Access Server (NAS) or Network Access Point (NAP)
Authentication, Authorization, and Accounting (AAA) Server
The device requesting access, such as a user’s PC or laptop
Supplicant
Network access applications, such as switches, access points, and VPN gateways
Network Access Server (NAS) or Network Access Point (NAP)
RADIUS
Remote Authentication Dial-in User Service
Authentication, Authorization, and Accounting (AAA) is often implemented using a protocol called
Remote Authentication Dial-in User Service (RADIUS)
What allows a host to accept connections to its command shell or graphical desktop from across the network?
A Remote Terminal Server
TTY
Teletype
The terminal or endpoint for communication between the computer and the user
Teletype (TTY)
Where the terminal accepts input and displays output, the _____ performs the actual processing
Shell
Any kind of software ther replicates the Teletype (TTY) input/output function
Terminal Emulator
SSH
Secure Shell
The principle means of obtaining secure remote access to Unix and Linux servers and to most types of network appliances (Switches, Routers, and Firewalls)
Secure Shell (SSH)
NOS
Network Operating System
A protocol and a terminal emulation software tool that transmits shell commands and output between a client and the remote host
Telnet
RDP
Remote Desktop Protocol
Microsoft’s protocol for operating remote GIU connections to a Windows machine
Remote Desktop Protocol (RDP)
SNMP
Simple Network management Protocol
A framework for management and monitoring network devices
Simple Network Management Protocol
Simple Network Management Protocol consists of a ______________ and __________.
- Management System
- Agents
A process running on a switch, router, server, or other Simple Network Management Protocol-compatible network device and maintains a database called a Management Information Base (MIB) that holds statistics relating to the activity of the device.
Agent
MIB
Management Information Base
Monitors all agents by polling them at regular intervals for information from their Management Information Bases (MIBs) and displays the information for review
Management System
____ is an example of a protocol and supporting software that facilitates log collection
Syslog
NAT
Network Address Translation
What device translates between the private IP address and the public IP address?
Network Address Translation (NAT)
DLP
Data Leak/Loss Prevention
Allows or blocks traffic based on a network access control list specifying a source and destination IP addresses and application ports
Firewalls
IDS
Intrusion Detection Systems
Identifies known malicious traffic patterns
Intrusion Detection Systems (IDS)
Scans files being transferred over the network to detect any matches for known malware signatures in binary data
Antivirus/Antimalware
Used to block outgoing access to unauthorized websites and services
Content Filters
Scans outgoing traffic for information that is marked as confidential or personal
Data Leak/Loss Prevention (DLP)
An appliance that enforces a variety of security policies and controls, combining the work of multiple security functions
Unified Threat Management (UTM)
UTM
Unified Threat Management
What can be deployed to distribute client requests across server nodes in a farm or pool?
Load Balancers
EOL
End Of Life
A product that is no longer supported
End Of Life (EOL)
An electrical device that is designed to perform a specific, dedicated function
Embedded System
ICS
Industrial Control System
Controls machinery used in critical infrastructure, such as power suppliers, water suppliers, health services, telecommunications, and national security services.
Industrial Control System (ICS)
PLC
Programmable Logic Controller
OT
Operational Technology
HMI
Human Machine Interface
SCADA
Supervisory Control and Data Acquisition
Gathers data from and managing plant devices and equipment with embedded Programmable Logic Controllers (PLCs)
Supervisory Control and Data Acquisition (SCADA)
An IoT smart device network will generally use the following types of components:
- Hub/Control System
- Smart Devices
NIC
Network Interface Card
IDC
Insulation Displacement Connector
Network error where a port transitions rapidly between up and down states
Port Flapping
RF
Radio Frequency
RSSI
Received Signal Strength Indicator
The time it takes for a signal to reach the recipient, measured in milliseconds (ms)
Latency
QoS
Quality of Service