Network Services Flashcards
What is the function of a file server?
File servers allow network clients to read/write files stored on a shared drive.
What protocol is commonly used for file sharing on Windows networks?
SMB (Server Message Block), which operates over port 445.
What is the purpose of a print server?
Print servers manage print jobs for shared network printers.
What is FTP, and what are its ports?
FTP is used for transferring files over the internet, operating on ports 20 and 21.
What is the difference between HTTP and HTTPS?
HTTP (port 80) is unencrypted, while HTTPS (port 443) uses SSL/TLS encryption for secure connections.
What is the purpose of a digital certificate in HTTPS?
It verifies the server’s identity and enables encrypted communication.
What is the function of Apache web server software?
Apache is an open-source web server, commonly used on Linux and Unix systems.
What is the function of SMTP?
SMTP is used for sending emails between servers (port 25).
What is the main advantage of IMAP over POP3?
IMAP syncs email across multiple devices, whereas POP3 downloads and deletes emails from the server.
What is Microsoft Exchange used for?
Exchange is an advanced email server used in corporate environments, supporting SMTP, POP3, and IMAP.
What are the components of AAA (Authentication, Authorization, Accounting)?
Authentication verifies identity, Authorization grants access, and Accounting tracks user activity.
What protocol is commonly used for centralized authentication in AAA systems?
RADIUS (Remote Authentication Dial-In User Service), which operates over UDP.
What is the function of Kerberos?
Kerberos provides mutual authentication and authorization in Windows domain environments.
What is the primary difference between Telnet and SSH?
Telnet is unencrypted, making it insecure, while SSH provides encrypted communication.
What is the function of RDP (Remote Desktop Protocol)?
RDP allows remote graphical access to Windows-based machines (port 3389).
What does VNC (Virtual Network Computing) provide?
VNC allows cross-platform remote desktop access (port 5900).
What is Syslog used for?
Syslog is used to log events from network devices to a centralized server.
What is SNMP used for?
SNMP monitors network-attached devices and gathers data for management.
What is the difference between in-band and out-of-band management?
In-band management shares the same network for regular data and management, while out-of-band uses a separate network for security.
How does web caching improve network efficiency?
Caching stores copies of frequently accessed web pages, reducing load time and bandwidth usage.
What security benefits do proxy servers offer?
Proxy servers can filter websites and block access to unsafe sites, enhancing network security.
How do proxy logs help in bandwidth management?
Proxy logs identify high-traffic sites, allowing admins to block non-essential sites to optimize bandwidth.
What is the main purpose of a load balancer?
A load balancer distributes incoming traffic across multiple servers to prevent overload on any single server.
How do load balancers improve user experience?
By balancing traffic, load balancers ensure faster response times and prevent server overload.
What is the primary purpose of Access Control Lists (ACLs)?
To control traffic flow by permitting or denying traffic based on criteria like IP addresses, port numbers, and protocols.
Where are Access Control Lists typically applied?
On firewalls, routers, and other network infrastructure devices.
Why is the order of rules important in ACL configuration?
ACL rules are processed top-down, and the first matching rule is applied, so more specific rules should be placed at the top.
Name three types of firewalls.
Packet-Filtering, Stateful, Proxy.
How do Stateful Firewalls differ from Packet-Filtering Firewalls?
Stateful firewalls track the state of connections, providing more advanced filtering, whereas packet-filtering firewalls examine individual packets without maintaining connection state.
What is the primary purpose of Unified Threat Management (UTM) devices?
To consolidate multiple security functions (firewall, antivirus, intrusion prevention, VPN, etc.) into a single device.
List two advantages of using UTM devices.
Cost savings and ease of use due to consolidation of multiple security functions.
What is a major disadvantage of using UTM devices?
Single point of failure—if the UTM fails, all security functions are lost.
How do Next-Generation Firewalls (NGFW) differ from Unified Threat Management (UTM) devices?
NGFWs consolidate security functions into a single, high-performance engine, offering better speed and efficiency than UTMs.
When would you choose a Next-Generation Firewall (NGFW) over a UTM?
When high-speed and network efficiency are top priorities.
What is the main difference between Information Technology (IT) and Operational Technology (OT)?
IT focuses on managing and processing data in traditional networks, while OT interacts with and controls physical processes in real-time.
What is an Industrial Control System (ICS)?
ICS automates and controls machinery and industrial processes like manufacturing, energy production, and healthcare.
What is prioritized in Industrial Control Systems (ICS)?
Availability and integrity are prioritized over confidentiality to ensure continuous operation and prevent downtime.
Name two key components of Industrial Control Systems (ICS).
Embedded devices and Distributed Control Systems (DCS).
What is the purpose of Fieldbus in ICS?
Fieldbus is a digital communication protocol used to link programmable logic controllers (PLCs) and sensors in OT.
What is Supervisory Control and Data Acquisition (SCADA)?
SCADA is a system used for managing large-scale, geographically dispersed industrial control systems, enabling data collection and remote management.
How does SCADA differ from ICS?
SCADA manages wide-area, multi-site control, while ICS is focused on controlling operations within a single facility.
How do SCADA systems collect and transmit data?
SCADA systems use wide-area networks (WANs) or cellular/satellite connections to transmit data from field devices to SCADA servers.
Provide an example of SCADA in action.
Smart meters in residential areas send data about electricity usage to a SCADA system for billing and grid monitoring.
What are two key technologies used in ICS?
Programmable Logic Controllers (PLCs) and Human-Machine Interfaces (HMIs).