Networking 2.4 - services provided by network hosts Flashcards

1
Q

Internet of Things (IoT) characteristics (4)

A

1 Incorporates remote sensors
2 Powers home automation and wearable technology
3 Collects and analyzes data using Wi-Fi, Bluetooth, and cloud computing
4 Gains on-board computing power from microcontrollers
* A frequent use for IoT is to automate climate control and security systems, which means devices must detect temperature, light levels, and movement. An Internet of Things (IoT) device is a “smart” device with an embedded microcontroller and connectivity features. The purpose of IoT is to add automation, data collection, and remote control capabilities to physical objects like doorbells, cameras, speakers, appliances, houses, and cars. IoT has rapidly expanded past the consumer market to find uses in industry, healthcare, and transportation as well. A networked IoT technology consists of four main components:

Sensing Technology: Sensors integrated in the devices gather data from their environment, such as temperature, gases, location, the operation of some industrial machines, or human biometric data.
IoT Gateways: Gateways bridge the gap between IoT devices (internal network) and end users (external network). The gateway sends the data acquired by the sensors in the IoT device to the connected user or the cloud.
Cloud Server/Data Storage: The gathered data comes in the cloud after passing via the gateway, where it is stored and subjected to data analysis. The user receives the processed data through an application UI and has the option to take various actions based on the resulting data.
Mobile App: The end user monitors, controls, retrieves data, and takes a particular action on IoT devices from a remote location using remote controls such as mobile phones, tablets, computers, and other devices that have a mobile app loaded.
IoT devices use a number of different protocols to communicate, including:

Bluetooth Low Energy (BLE)
Light-Fidelity (Li-Fi)
Near Field Communication (NFC)
QR codes and barcodes
Radio Frequency Identification (RFID)
Thread
Wi-Fi and Wi-Fi Direct
Z-wave
ZigBee
ANT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Supervisory Control and Data Acquisition (SCADA) characteristics

A

1 Incorporates remote sensors
2 Governs critical infrastructure like utilities, transportation, and water treatment
3 Collects and analyzes data using field units, HMIs, and microprocessors
* legacy *
SCADA is designed to collect field data, transmit it to a centralized location, and display it to an operator through a human-readable interface. SCADA is a system of software and hardware elements that allows organizations to control automated processes locally or at remote locations; to monitor, gather, and process data; to directly interact with devices like sensors or valves; and to record events into a log file.
SCADA is part of the larger category of industrial control systems (ICS), which is a combination of electrical and mechanical components that act together to monitor, control, and safely execute an industrial process in an area like mining, utilities, manufacturing, or transportation.

The main components of SCADA are field instrumentation (including sensors), field controllers, human-machine interfaces (HMIs), a network connection, and a means of aggregating the collected data, whether remotely or on-premises. Microprocessors in the field instruments convert the sensor input into usable data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A major weakness of both IoT devices and SCADA is that neither was designed to …

A

accommodate secure networking, easy firmware updates, or regular security patching. These are typically after-market considerations handled by third-party applications, not the device or component manufacturers. ICS began as highly specialized hardware and software that ran in physically secured locations without network connections. As IT evolved, legacy ICS systems had new IT capabilities layered on top to provide remote monitoring or “smart” automation. Because ICS components have extremely long lifecycles (decades instead of years), they did not anticipate modern cyber security concerns. For that reason, SCADA and IoT systems are targeted by unique cyber attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If you are unable to access a website using its fully qualified domain name (FQDN), but you can browse the same website using its IP address, then the ________ server is down

A

Domain Name System (DNS) server for the website is down. A DNS server provides name resolution over the Internet and allows you to use an FQDN instead of an IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet appliances include (6)

A

1 UTM - Unified Threat Management
2 IDS - Intrusion Detection System
3 IPS devices - Intrusion Prevention system
4 spam gateways - examine/filter all incoming mail
5 load balancers - ensure that servers do not become overburdened
6 proxy server - forwards requests & caches web data

DNS is NOT an appliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

UTM

A

Unified Threat Management (UTM) devices are Internet appliances. They provide a single point on the network from which multiple security functions are managed. This single point of presence is in contrast to several independent software and devices, such as antivirus, antispam, firewall, IDS, and IPS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

UTM

A

An intrusion detection system (IDS) is an Internet appliance. It typically sits outside the network and watches packets coming through the network and sets off an alarm if a packet (or series of packets) contains something that violates a defined set of rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IPS

A

An intrusion prevention system (IPS) is an Internet appliance that sits inline in the network. While it performs many of the same duties as an IDS, an IPS also prevents the offending traffic instead of just detecting it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spam gateways

A

are installed behind a firewall and examine all incoming mail to filter out email that is likely to be fraudulent or a phishing email. These gateways can help minimize the risks that spam can pose to organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Load balancers

A

are a used by organizations to ensure that servers do not become overburdened from their workload and go down, causing loss of availability. Multiple servers participate in a load-balanced solution, thereby distributing the load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A proxy server

A

acts as an intermediary between an endpoint device, such as a computer, and another server from which a user or client is requesting a service. The proxy server may exist in a firewall server or on a separate server, which forwards requests through the firewall. A proxy server caches web data and images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A web server

A

hosts web pages, web services, and web applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Dynamic Host Configuration Protocol (DHCP) server

A

is responsible for the assignment of IP addresses. IP addresses may be assigned at random (dynamically) or by permanent assignment (static) based on a pool of available addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Domain Name System (DNS)

A

server maintains the mapping of the relationship between the name of a domain (www.whatever.com) and the corresponding IP address where the domain is hosted. Like a telephone directory or an address book.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

File server (also referred to as fileshare server)

A

makes documents, spreadsheets, and other files available over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Print server

A

manages access to printers over the network. Print jobs are sent to the printer using the printer’s IP Address.

17
Q

Mail server

A

manages user e-mail accounts, serves as a central collection point for incoming emails, delivers e-mail to individual user accounts, and forwards outgoing emails. Eg Microsoft Exchange, Gmail, and Outlook.

18
Q

Syslog Server

A

Syslog, or System Logging Protocol is a standard protocol that is used to send system log or event messages to a designated server, creating a centralized location where administrators can monitor and respond to any notable events.

19
Q

Authentication server

A

validates the credentials of a user or device attempting to access the network
- username/password, biometrics, and tokens. These servers can provide Authentication, authorization, accounting (AAA) services to ensure that connecting users are valid users, have access only to the services they need, and can track their actions to ensure that their behavior is appropriate.
Eg RADIUS