Lesson 6: Objectives Flashcards
What is a fileshare?
a server disk configured to allow clients to access it over the network.
What is a file-server?
a central machine provides dedicated file and print services to workstations.
A file server could be implemented using what kind of TCP/IP protocol?
FTP
(File Transfer Protocol)
Name a proprietary protocol that may be used to implement fileshare and print server roles.
File and Print Services for Windows Networks
What application protocol underpins file and printer sharing on Windows networks?
SMB
(Server Message Block)
The functionality of HTTP servers is often extended by support for:
(2)
- scripting
- programmable features (web applications).
SMB is sometimes referred to as what?
CIFS
(Common Internet File System)
How is the host location usually represented in a URL?
FQDN
(Fully Qualified Domain Name)
What are the steps involved in clients using HTTP to request resources from a HTTP server?
(3)
- Client connects to HTTP server using port 80
- Client submits a request for a resource (GET)
- Server either returns the requested data if it’s available or responds with an error code.
Which has more security TLS or SSL?
TLS is the upgraded version of SSL that fixes existing vulnerabilities.
When does FTP use TCP/21
(File Transfer Protocol)
to establish a connection
What is the current version of SMB?
SMB3
why does plain FTP pose a security risk?
because it’s unencrypted.
passwords are submitted in plaintext.
When does FTP use TCP/20?
(File Transfer Protocol)
to transfer data in active mode
What information might a URL (Uniform Resource Locator) include? (3)
- Protocol describing the access method or service type being used.
- Host Location/FQDN or IPv6 address (enclosed in brackets)
- File path specifying the directory and file name location of the resource (If necessary).
How are resources on the Internet are accessed?
Using an addressing scheme known as a URL (Uniform Resource Locator).
How would you encrypt a FTP session?
FTP-Secure (FTPS)
Secure Shell FTP (SFTP)
How do organizations typically acquire a web server or space on a server?
they will lease them from an ISP.
What is a web server?
provides client access using HTTP/HTTPS.
HTTP usually serves what?
HTML web pages.
What contributes to a lack of security for HTTP?
(2)
- all data is sent unencrypted
- there is no authentication of client or server
What 2 methods of security are provided by TLS (Transport Layer Security)
- certificates for authentication
- encryption to protect web communications and other app protocols.
what 2 types of mail servers and protocols are used to process email?
- mail transfer
- mailbox access protocols
To implement HTTPS:
(3)
- web server is installed with a digital certificate issued by a trusted CA
- certificate uses encrypted data to prove identity of server to client, assuming client trusts CA
- server + client use key pair in certificate and a chosen cipher suite within TLS protocol to set up encrypted tunnel.
CA Certificate Authority
What two things makes up HTTPS?
- HTTP
- TLS
mail transfer and mailbox access protocols:
What happens during step 4: remote IMAP server and Remote Mail Client?
- remote users mail client connects to its IMAP server (port 993) to download message
Name 5 application protocols secured by TLS?
- FTP
- POP3
- IMAP
- SMTP
- LDAP
mail transfer and mailbox access protocols:
What happens during step 1: local mail client?
(2)
- client submits new message to local SMTP server. (Port 587)
- message is copied to sent items folder on local IMAP server (port 993)
mail transfer and mailbox access protocols:
What happens during step 2: local SMTP Server
(2)
- local SMTP uses DNS to lookup MX record listing an IP address for the remote recipient domain
- establishes a session with remote SMTP server (port 25)
mail transfer and mailbox access protocols:
What happens during step 3: remote SMTP server?
(1)
- if remote server accepts the message, it copies it to the inbox folder of the users mailbox hosted on an IMAP server
how does SMTP discover the IP address of the recipient?
by using the domain name part of the recipients email address. the SMTP servers for the domain are registered in DNS using MX and host A/AAAA records.
mail exchanger
AAAA=maps IPv6 IP to domain name.
A=domain name to find the IP of a computer connected to the internet.
What is DTLS and where is it used most often?
Datagram transport layer security
1.TLS + UDP
2. Most often used in VPN solutions
What are the 4 steps of mail transfer and mailbox access protocols?
- Local Mail Client
2.Local SMTP Server and Local IMAP server - Remote SMTP server
- Remote IMAP Server and Remote Mail Client
SMTP specifies what?
how email is delivered from one mail domain to another.
what features does IMAP have that POP/POP3 doesn’t have?
(4)
- IMAP supports permanent connections to a server
- connects multiple clients to the same mailbox simultaneously.
- allows a client to manage the mailbox on the server (organize messages in folders and to control when they are deleted)
- create multiple mailboxes
Port TCP/587 is used for what?
mail clients to submit messages for delivery by a SMTP server.
Most (LDAP) directories are based on what standard?
(lightweight directory access protocol)
X.500 standard
What is LDAP?
(lightweight directory access protocol)
a TCP/IP protocol used to query and update an X.500 directory.
(Uses TCP and UDP)
AAA is often implemented using a protocol called what?
authentication, authorization, and accounting
RADIUS
remote authentication dial-in user service