Lesson 6 Flashcards

1
Q

A server disk configured to allow clients to access it over the network is a

A

Fileshare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SMB

A

Server Message Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

NetBIOS

A

Network Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

NetBT

A

NetBIOS over TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FTP

A

File Transer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Allows a client to upload and download files from a network server

A

File transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Often used to upload files to websites

A

File Transfer Protocol (FTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

URL

A

Uniform Resource Locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Resources on the internet are accessed using an addressing scheme known as a

A

Uniform Resource Locator (URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SSL

A

Server Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Then Transport Layer Security (TLS) is used with the HyperText Transfer Protocol (HTTP) application, it is referred to as

A

HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SMTP

A

Simple Mail Transfer Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

POP

A

Post Office Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IMAP

A

Instant Message Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SSO

A

Single Sign-On

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A protocol that allows a user to authenticate once to access the network and gain authorization for all the compatible application servers running on it

A

Single Sign-On (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A directory is a type of

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

LDAP

A

Lightweight Directory Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AAA

A

Authenticate, Authorization, and Accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Consolidates authentication services across multiple access devices

A

Authenticate, Authorization, and Accounting (AAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Authentication, Authorization, and Accounting (AAA) uses the following components

A

Supplicant
Network Access Server (NAS) or Network Access Point (NAP)
Authentication, Authorization, and Accounting (AAA) Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The device requesting access, such as a user’s PC or laptop

A

Supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Network access applications, such as switches, access points, and VPN gateways

A

Network Access Server (NAS) or Network Access Point (NAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RADIUS

A

Remote Authentication Dial-in User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Authentication, Authorization, and Accounting (AAA) is often implemented using a protocol called

A

Remote Authentication Dial-in User Service (RADIUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What allows a host to accept connections to its command shell or graphical desktop from across the network?

A

A Remote Terminal Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

TTY

A

Teletype

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The terminal or endpoint for communication between the computer and the user

A

Teletype (TTY)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Where the terminal accepts input and displays output, the _____ performs the actual processing

A

Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Any kind of software ther replicates the Teletype (TTY) input/output function

A

Terminal Emulator

32
Q

SSH

A

Secure Shell

33
Q

The principle means of obtaining secure remote access to Unix and Linux servers and to most types of network appliances (Switches, Routers, and Firewalls)

A

Secure Shell (SSH)

34
Q

NOS

A

Network Operating System

35
Q

A protocol and a terminal emulation software tool that transmits shell commands and output between a client and the remote host

A

Telnet

36
Q

RDP

A

Remote Desktop Protocol

37
Q

Microsoft’s protocol for operating remote GIU connections to a Windows machine

A

Remote Desktop Protocol (RDP)

38
Q

SNMP

A

Simple Network management Protocol

39
Q

A framework for management and monitoring network devices

A

Simple Network Management Protocol

40
Q

Simple Network Management Protocol consists of a ______________ and __________.

A
  • Management System
  • Agents
41
Q

A process running on a switch, router, server, or other Simple Network Management Protocol-compatible network device and maintains a database called a Management Information Base (MIB) that holds statistics relating to the activity of the device.

A

Agent

42
Q

MIB

A

Management Information Base

43
Q

Monitors all agents by polling them at regular intervals for information from their Management Information Bases (MIBs) and displays the information for review

A

Management System

44
Q

____ is an example of a protocol and supporting software that facilitates log collection

A

Syslog

45
Q

NAT

A

Network Address Translation

46
Q

What device translates between the private IP address and the public IP address?

A

Network Address Translation (NAT)

47
Q

DLP

A

Data Leak/Loss Prevention

48
Q

Allows or blocks traffic based on a network access control list specifying a source and destination IP addresses and application ports

A

Firewalls

49
Q

IDS

A

Intrusion Detection Systems

50
Q

Identifies known malicious traffic patterns

A

Intrusion Detection Systems (IDS)

51
Q

Scans files being transferred over the network to detect any matches for known malware signatures in binary data

A

Antivirus/Antimalware

52
Q

Used to block outgoing access to unauthorized websites and services

A

Content Filters

53
Q

Scans outgoing traffic for information that is marked as confidential or personal

A

Data Leak/Loss Prevention (DLP)

54
Q

An appliance that enforces a variety of security policies and controls, combining the work of multiple security functions

A

Unified Threat Management (UTM)

55
Q

UTM

A

Unified Threat Management

56
Q

What can be deployed to distribute client requests across server nodes in a farm or pool?

A

Load Balancers

57
Q

EOL

A

End Of Life

58
Q

A product that is no longer supported

A

End Of Life (EOL)

59
Q

An electrical device that is designed to perform a specific, dedicated function

A

Embedded System

60
Q

ICS

A

Industrial Control System

61
Q

Controls machinery used in critical infrastructure, such as power suppliers, water suppliers, health services, telecommunications, and national security services.

A

Industrial Control System (ICS)

62
Q

PLC

A

Programmable Logic Controller

63
Q

OT

A

Operational Technology

64
Q

HMI

A

Human Machine Interface

65
Q

SCADA

A

Supervisory Control and Data Acquisition

66
Q

Gathers data from and managing plant devices and equipment with embedded Programmable Logic Controllers (PLCs)

A

Supervisory Control and Data Acquisition (SCADA)

67
Q

An IoT smart device network will generally use the following types of components:

A
  • Hub/Control System
  • Smart Devices
68
Q

NIC

A

Network Interface Card

69
Q

IDC

A

Insulation Displacement Connector

70
Q

Network error where a port transitions rapidly between up and down states

A

Port Flapping

71
Q

RF

A

Radio Frequency

72
Q

RSSI

A

Received Signal Strength Indicator

73
Q

The time it takes for a signal to reach the recipient, measured in milliseconds (ms)

A

Latency

74
Q

QoS

A

Quality of Service

75
Q
A