Lesson 6: Objectives Flashcards

1
Q

What is a fileshare?

A

a server disk configured to allow clients to access it over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a file-server?

A

a central machine provides dedicated file and print services to workstations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A file server could be implemented using what kind of TCP/IP protocol?

A

FTP
(File Transfer Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name a proprietary protocol that may be used to implement fileshare and print server roles.

A

File and Print Services for Windows Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What application protocol underpins file and printer sharing on Windows networks?

A

SMB
(Server Message Block)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The functionality of HTTP servers is often extended by support for:

(2)

A
  1. scripting
  2. programmable features (web applications).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SMB is sometimes referred to as what?

A

CIFS
(Common Internet File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How is the host location usually represented in a URL?

A

FQDN
(Fully Qualified Domain Name)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the steps involved in clients using HTTP to request resources from a HTTP server?

(3)

A
  1. Client connects to HTTP server using port 80
  2. Client submits a request for a resource (GET)
  3. Server either returns the requested data if it’s available or responds with an error code.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which has more security TLS or SSL?

A

TLS is the upgraded version of SSL that fixes existing vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When does FTP use TCP/21

(File Transfer Protocol)

A

to establish a connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the current version of SMB?

A

SMB3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

why does plain FTP pose a security risk?

A

because it’s unencrypted.
passwords are submitted in plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When does FTP use TCP/20?

(File Transfer Protocol)

A

to transfer data in active mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What information might a URL (Uniform Resource Locator) include? (3)

A
  1. Protocol describing the access method or service type being used.
  2. Host Location/FQDN or IPv6 address (enclosed in brackets)
  3. File path specifying the directory and file name location of the resource (If necessary).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are resources on the Internet are accessed?

A

Using an addressing scheme known as a URL (Uniform Resource Locator).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How would you encrypt a FTP session?

A

FTP-Secure (FTPS)
Secure Shell FTP (SFTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do organizations typically acquire a web server or space on a server?

A

they will lease them from an ISP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a web server?

A

provides client access using HTTP/HTTPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HTTP usually serves what?

A

HTML web pages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What contributes to a lack of security for HTTP?

(2)

A
  1. all data is sent unencrypted
  2. there is no authentication of client or server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What 2 methods of security are provided by TLS (Transport Layer Security)

A
  1. certificates for authentication
  2. encryption to protect web communications and other app protocols.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what 2 types of mail servers and protocols are used to process email?

A
  1. mail transfer
  2. mailbox access protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

To implement HTTPS:
(3)

A
  1. web server is installed with a digital certificate issued by a trusted CA
  2. certificate uses encrypted data to prove identity of server to client, assuming client trusts CA
  3. server + client use key pair in certificate and a chosen cipher suite within TLS protocol to set up encrypted tunnel.

CA Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What two things makes up HTTPS?

A
  1. HTTP
  2. TLS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

mail transfer and mailbox access protocols:

What happens during step 4: remote IMAP server and Remote Mail Client?

A
  1. remote users mail client connects to its IMAP server (port 993) to download message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name 5 application protocols secured by TLS?

A
  1. FTP
  2. POP3
  3. IMAP
  4. SMTP
  5. LDAP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

mail transfer and mailbox access protocols:

What happens during step 1: local mail client?

(2)

A
  1. client submits new message to local SMTP server. (Port 587)
  2. message is copied to sent items folder on local IMAP server (port 993)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

mail transfer and mailbox access protocols:

What happens during step 2: local SMTP Server

(2)

A
  1. local SMTP uses DNS to lookup MX record listing an IP address for the remote recipient domain
  2. establishes a session with remote SMTP server (port 25)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

mail transfer and mailbox access protocols:

What happens during step 3: remote SMTP server?

(1)

A
  1. if remote server accepts the message, it copies it to the inbox folder of the users mailbox hosted on an IMAP server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how does SMTP discover the IP address of the recipient?

A

by using the domain name part of the recipients email address. the SMTP servers for the domain are registered in DNS using MX and host A/AAAA records.

mail exchanger
AAAA=maps IPv6 IP to domain name.
A=domain name to find the IP of a computer connected to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is DTLS and where is it used most often?

Datagram transport layer security

A

1.TLS + UDP
2. Most often used in VPN solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 4 steps of mail transfer and mailbox access protocols?

A
  1. Local Mail Client
    2.Local SMTP Server and Local IMAP server
  2. Remote SMTP server
  3. Remote IMAP Server and Remote Mail Client
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SMTP specifies what?

A

how email is delivered from one mail domain to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what features does IMAP have that POP/POP3 doesn’t have?

(4)

A
  1. IMAP supports permanent connections to a server
  2. connects multiple clients to the same mailbox simultaneously.
  3. allows a client to manage the mailbox on the server (organize messages in folders and to control when they are deleted)
  4. create multiple mailboxes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port TCP/587 is used for what?

A

mail clients to submit messages for delivery by a SMTP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Most (LDAP) directories are based on what standard?

(lightweight directory access protocol)

A

X.500 standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is LDAP?
(lightweight directory access protocol)

A

a TCP/IP protocol used to query and update an X.500 directory.

(Uses TCP and UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AAA is often implemented using a protocol called what?

authentication, authorization, and accounting

A

RADIUS

remote authentication dial-in user service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a AAA server?

A

authentication
authorization
accounting

consolidates authentication services across multiple access devices.

20
Q

what are the 3 components of a AAA server?

authentication, authorization, and accounting

A
  1. Supplicant: the device requesting access
  2. NAS or NAP: network access appliances such as switches, AP’s, & VPN gateways. aka AAA clients or authenticators
  3. AAA server: authentication server, positioned within the local network.

Network access server
network access point

21
Q

a remote terminal server allows a host to accept connections to what?

A

its command shell or graphical desktop from across the network.

21
Q

what’s the most widely used version of SSH?

A

OpenSSH (opensssh.com)

22
Q

Telnet is both a protocol and what?

A

a terminal emulation software tool that transmits shell commands and output between a client and the remote host.

terminal emulation is the process of duplicating the functionality and behavior of a physical computer terminal on a different device or platform.

22
Q

SSH is the principal means of obtaining what?

secure shell

A

secure remote access to UNIX and Linux servers and to most types of network appliances.

there are SSH servers and terminal emulation clients available for all the major platforms. (UNIX, Linux, Windows, macOS)

network appliances = switches, routers, firewalls.

22
Q

Remote terminal access servers:

if the TTY (terminal) accepts input and displays output, what performs the actual processing?

A

the shell

23
Q

what protocols allow administrators to log on and manage hosts and switches/routers/firewalls remotely?

2

A

SSH and RDP

23
Q

a Telnet interface can be password protected, but with what caveat?

A

the password and other communications aren’t encrypted and therefore can be vulnerable to packet sniffing and replay.

23
Q

Telnet and SSH both provide terminal emulation for command line shells, but what would you use to work with a graphical interface?

A

RDP

remote desk protocol

24
Q

What does a proxy server do?

5

A
  1. takes a whole HTTP request from a client
  2. checks it
  3. forwards it to the destination server on the internet
  4. when the reply comes, it’s checked
  5. and shuttled back to the LAN computer.
24
Q

what is SNMP?

simple network management protocol

A

a framework for management and monitoring network devices.

24
Q

SNMP consists of what?

simple network management protocol

2

A
  1. management system
  2. agents

agent = a process running on a switch, router, server, or other SNMP compatible network device.

24
Q

what does a SNMP management system do?

A

monitors all agents by polling them at regular intervals for information from their MIBs and displays the information for review.

24
Q

Many enterprise networks use some sort of NAT, but another option is to deploy a what?

A

proxy server.

24
Q

what is a SNMP trap?

A

it’s where the agent is capable of informing management system of notable events such as port failure. the threshold for triggering traps can be set for each value.

25
Q

what is the agent of a SNMP?

A

agent = a process running on a switch, router, server, or other SNMP compatible network device.

this agent maintains a database called MIB that holds statistics relating to the activity of the device.

MIB=management information base
example of MIB = the number of frames per second handled by a switch.

25
Q

what is syslog?

A
  1. forwarding messages to a remote log collector
  2. provides an open format for event data

application protocol and event-logging format enabling different appliances and software applications to send logs or event records to a central server. this makes reviewing logs more efficient than reviewing every device/appliance separately.

25
Q

On a SOHO network, devices on the LAN access the internet via the router using what? (2)

A

NAT, specifically,

  1. port-based NAT
  2. overloaded NAT

NAT=enables private IP networks to use the internet and cloud.

25
Q

an embedded system network is usually referred to as what?

A

OT operational technology

25
Q

What kinds of purpose-built internet security appliances might an enterprise network use?

A
  1. Firewalls
  2. IDS
  3. IPS
  4. Antivirus / Antimalware
  5. Spam gateways use: SPF, DKIM, DMARC
  6. Content Filters
  7. DLP

intrusion detection system
intrusion prevention system
data leak/loss prevention

25
Q

output and configuration of a PLC is performed by what?

A

a HMI

human machine interface.

25
Q

a syslog message comprises:

A
  1. a pri code = priority value
  2. a header containing a timestamp and host name
  3. a message part. contains a source tag + content
26
Q

IDS work how?

intrusion detection system

A

they have scripts that identify known malicious traffic patterns. can raise an alert when a match is made.

26
Q

what is the difference between an IDS and an IPS?

intrusion detection system
intrusion prevention system

A

IPS detects malicious traffic patters, but it goes a step further and takes action to block the source of the malicious packets instead of just notifying of their existence.

27
Q

What is a load balancer?

A

type of switch, router, or software that distributes client requests between different resources such as communications links or similarly configured servers.

provides fault tolerance and improves thoroughput.

28
Q

a load balancer can be deployed to do what?

A

distribute client requests across server nodes in a farm or pool.

can be used in any situation where you have multiple servers providing the same function.

29
Q

Where in a network would a load balancer be placed?

A

between the client (and virtual server) and the firewall (with the web servers with the information on the other side of the firewall)

30
Q

What kind of connectivity is usually / typically found in SCADA systems?

supervisory control and data acquisition.

A

WAN communications such as cellular or satellite to link the SCADA server to the field devices.

SCADA relating to ICD’s and PLC’s

30
Q

Embedded systems have typically been designed to operate within what kind of network?

A

closed networks, where the elements of the network are all known to the system vendor and there’s no wider connectivity to computer data networks.

31
Q

ICS comprises plant devices and equipment embedded with what?

industrial control system

A

PLC’s.

programmable logic controllers.

31
Q

How are PLC’s connected?

PLC=programmable logic controller (embedded in ICS)
ICS-industrial control systems

A

connected within a control loop
the whole process automation system can be governed by a control server.

32
Q

Where is all of the information generated by the control loop (of PLC’s embedded in ICS) stored?

ICS = industrial control system
PLC = programmable logic controller

A

the data historian

data historian = a database where all the information generated by the control loop is stored.

33
Q

IoT smart device network will generally use what 2 types of components?

A
  1. Hub / control system: Communications hub for wireless networking. Control system, many IoT cannot be operated directly using I/O devices.
  2. Smart Devices: IoT endpoints implement the function, such as a smart lightbulb, refrigerator, thermostat, or doorbell/video entry.
34
Q

Where would a SCADA be used?

supervisory control and data acquisition

A

takes the place of a control server in large-scale, multiple site ICS

ICS = industrial control systems
SCADA = type of industrial control system that manages large-scale, multiple-site devices and equipment spread over geographically large areas from a host computer.

34
Q

A typical ethernet link for an office workstation includes what 5 components?

A
  1. NIC port on host
  2. RJ45 terminated patch cord b/w host & wall port.
  3. Structured cable b/w wall port & patch panel. terminated to IDC block. (permanent link)
  4. RJ45 terminated patch cord between the patch panel port & a switch port.
  5. Network transceiver in the switch port.

IDC - insulation displacement connector

35
Q

What type of OS do most IoT use?

2

A

Linux
Android

36
Q

what 5 steps would you take to troubleshoot wired network connectivity?

A
  1. Are patch cords properly terminated & connected to network ports. known good / cable tester
  2. test the transceivers use loopback tool to test for bad port
  3. if no loopback available substitute known working hosts (different computer to link or swap ports at switch.)
  4. use a cable tester to verify structured cabling. solution may involve installing new permanent link or could be termination / external interference.
  5. verify ethernet speed/duplex configuration on switch interface and NIC. should be set to autonegotiate. update NIC device driver software.
36
Q

intermittent connectivity (wired network) might manifest as what?

A

port flapping.

36
Q

what often causes port flapping? (3)

(NIC / Switch interface transitions continually between up and down states.)

A

bad cabling
external interference
faulty NIC at the host end.

37
Q

When troubleshooting port flapping, what would you use to see how long a port remains in the up state?

port flapping = port transitions rapidly between up and down states.

A

switch configuration interface

38
Q

the transfer speed on a cabled link is most likely to be reduced because of what?

A
  1. mismatched duplex settings on a network adapted and switch port
38
Q

if there’s no configuration issue and slow network speeds persist, a variety of other problems are difficult to diagnose:

what steps should you take?

A
  1. establish what network activity they’re performing check the nominal link speed and use a utility to measure transfer rate independent of specific apps / network services.
  2. if issues isolated to single cable segment, cabling could be affected by external interference. check ends of cable for excessive untwisting of wire pairs or improper termination.
  3. could be a problem with network adapter driver. install update. if latest driver is installed, check whether the issue affects other hosts using the same NIC & driver version.
  4. Could be malware or faulty software remove the host from the network for scanning.
  5. establish scope of problem: are network speeds only an issue for a single user, for everyone on the same switch, or for all users connecting to the internet.
39
Q

what typically causes external interference? (regarding cabling affecting ethernet speeds.)

4

A
  1. nearby power lines
  2. fluorescent lighting
  3. motors
  4. generators.
39
Q

poorly installed cabling and connector termination can also cause a type of interference called what?

A

crosstalk

40
Q

If you have access to a network tap and cabling interference is a problem, what kind of information might you see from the network tap?

A

high numbers of damaged frames.

41
Q

Troubleshooting Wireless connectivity:

If the user is looking for a network name that is not shown in the list of available wireless networks SSID not found, what might be the cause?

2

A
  1. User is out of range
  2. SSID broadcast might be suppressed. (Connection must be configured manually on the client)
42
Q

Troubleshooting Wireless connectivity:

Why might an access point not be able to communicate with devices that only support older TCP/IP standards?

A

if the access point isn’t operating in compatibility mode.

this can cause a lack of wifi connectivity.

43
Q

Troubleshooting Wireless connectivity:

if the RSSI is too low, what will the adapter do?

received signal strength indicator

A

drop the connection entirely and try to use a different network.

43
Q

Troubleshooting Wireless connectivity:

if a device is within the supported range but the signal is weak or you can only get an intermittent connection, what is likely the problem?

(3)

A
  1. likely getting interference from another radio source broadcasting at the same frequency.
  2. interference from a powerful electromagnetic source such as a motor or microwave oven.
  3. something blocking the signal
43
Q

Troubleshooting Wireless connectivity:

radio waves do not pass easily through what kind of objects that can block or degrade signals?

A

metal
dense objects
concrete
mirrors

44
Q

Troubleshooting VOIP Issues:

Problems with the timing and sequence of packet delivery are defined as:

2

A
  1. latency
  2. jitter
45
Q

Troubleshooting VOIP Issues:

what typically causes jitter?

amount of variation in delay over time

A

network congestion

which affects packet processing on routers and switches.

46
Q

Troubleshooting VOIP Issues:

VOIP calls can only be established using what kind of mechanism across the network?

A

QoS

quality of service

46
Q

Troubleshooting Limited Connectivity:

what 3 steps should you take in the event of limited connectivity

physical connection without IP lease from DHCP server

A
  1. establish scope of the issue
  2. check configuration of patch cords
  3. check VLAN configuration
46
Q

Troubleshooting Limited Connectivity:

Establish Scope of the Issue: If the issue is affecting multiple users, what is likely the issue?

A

the problem is likely to be the DHCP server itself.

DHCP leases may take a few hours to expire, so a problem with the DHCP server may take a few hours to manifest as different clients try to renew their leases over time.

47
Q

Troubleshooting Limited Connectivity:

Establish the scope of the issue: If the DHCP server is down, what are the 3 most likely causes?

A
  1. The server could be offline
  2. Server could have run out of available leases
  3. forwarding between the server and clients could be improperly configured.
48
Q

Troubleshooting Limited Connectivity:

check configuration of patch cords: what should you check for?

A

ensure the wall port is connected to an appropriate port on a switch via the patch panel.

if not connected to an appropriate switch port, it’s unlikely to connect to expected services such as default gateway, DHCP and DNS

48
Q

Troubleshooting Limited Connectivity:

VLAN configuration: what should you look for?

A

Check the VLAN ID, it can have the same effect as connecting the host to the wrong switch port.