S14 - Network Services Flashcards

1
Q

What can be done to a server for file share

A

Can be configured to allow the clients on the network to access the network and be able to read and write to its disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define print server

A

another server that could be a physical workstation or network infrastructure that provides printing functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 common types of file and printer server

A

Windows-based / Linux or Unix-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does windows-based file and printer server rely on

A

NetBIOS protocol or SMB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Function of Sambda

A

Provides the ability for a linux or unix server to be able to host files or printers that can then be used by windows clients running the SMB protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do IP-based File and Print Server / Cloud printing allow for

A

Printing from anywhere in the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define web server

A

any server that provides access to a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Internet Information Services (IIS)

A

Web server software created by Microsoft (HTTP,HTTP/2,HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Function of apache

A

Most popular way to run a web server these days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Function of NGINX

A

Reverse proxy, load balancer, mail proxy and HTTP cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What makes something a FQDN, provide an example

A

the whole url:
[https:// : protocol]
[www : server].
[google: domain/name].
[com: top level domain]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Simple Mail Transfer Protocol (SMTP) function

A

specifies how emails should be delivered from one mail domain to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Post Office Protocol 3 (POP3) definition

A

older email protocol that operates over port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet Message Access Protocol (IMAP) function

A

Mail retrieval protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Microsoft Exchange (widely used in corporate environment)

A

Mailbox server env designed for windows-based domain envs, using pop3/imap/smtp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do the As in AAA server stand for

A

authentication, authorization, accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define 802.1x

A

Standardised framework used for port-based authentication on wired and wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define authentication

A

Occurs when a person’s identity is established with proof and is confirmed by the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

define Lightweight directory access protocol (LDAP)

A

A database used to centralise info about clients and objects on the network, port 389 (unencrypted), port 636 (encrypted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

function of Active Directory (AD)

A

Used to organise and manage the network, including clients, servers, devices, users and groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Function of Remote authentication Dial-In User service (RADIUS)

A

Provides centralised admin of dial-up, VPN, and wireless authentication services for 802.1x and the EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Function of Terminal Access Controller Access-Control System Plus (TACACS+)

A

Proprietary version of RADIUS that can perform the role of an authenticator in 802.1x networks, CISCO only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define Authorisation

A

Occurs when a user is given access to a certain piece of data or certain areas of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Function of Kerberos

A

Authentication protocol used by windows to provide 2-way authentication using a system of tickets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define accounting

A

Ensures tracking of data, computer usage, network resources are maintained

26
Q

Define non-repudiation

A

when you have proof that someone has taken an action

27
Q

What can be used to create a secure connection to tunnel into the RDP

A

Remote Desktop Gateway (RDG)

28
Q

Function of Virtual Network Computing (VNC) over port 5900

A

Remote connection method designed for thin client architectures

29
Q

Define Terminal Emulator (TTY)

A

Any kind of software that replicates the TTY I/O functionality to remotely connect to a device

30
Q

Function of Syslog-ng

A

Enables different appliances and software application to transmit logs to a centralised server, VERY COMMON

31
Q

What can syslog refer to

A

Protocol used/server/log entries

32
Q

Function of Simple network management protocol (SNMP)

A

TCP/IP protocol that aids in monitoring network-attached devices and computers

33
Q

Define managed devices

A

Computer and other network-attached devices monitored through the use of agents by a network management system

34
Q

Define agents

A

Software that is loaded on a managed device to redirect info to the network management system

35
Q

Define Network management system (NMS)

A

Software running on one or more server to control the monitoring or network-attached devices and computers

36
Q

Define in-band communication

A

Where data is sent over the same network that’s carrying the corporate data

37
Q

Define out-of-band

A

Second network where all the management occurs where the main network is used solely for corporate data transfers, added security by doing this

38
Q

Define proxy server

A

Devices that create a network connection between an end user’s client machine and a remote resource (web server)

39
Q

Function of a load balancer/content switch

A

Distributes incoming requests across a number of servers inside a server farm or a cloud infrastructure e.g. 3 servers with 600 bits of data, load balancer would spread it evenly, each server dealing with 200 bits

40
Q

Why is a load balancer such an important preventative measure

A

One of the key things that allows for defence against a DOS/DDOS attack

41
Q

Define Blackholing/Sinkholing

A

Identifies any attacking IP addresses and routers their traffic through a knoll interface

42
Q

Function of Intrusion Prevention System (IPS)

A

Works for small-scale attacks against DoS

43
Q

Function of elastic cloud

A

allows to scale up the demand as needed

44
Q

Define Access Control List (ACL)

A

Rule sets placed on the firewalls, routers and other network devices that permit or allow traffic through a particular interface

45
Q

Explain ACL in terms of rules

A

Work top down, meaning that the most specific most be placed at the top

46
Q

Basic explanation of firewall

A

Inspects and controls the traffic that is trying to enter of leave a network’s boundary

47
Q

Define Unified threat management (UTM)

A

Provides the ability to conduct security function within a single device or network appliance

48
Q

Define IT

A

Includes computers, servers, networks and cloud platforms

49
Q

Define operation technology (OT)

A

Communications network designed to implement and ICS, tech that interacts with the real world

50
Q

Define Industrial Control System (ICS)

A

Provides the mechanisms for workflow and process automation by controlling machinery using embedded devices

51
Q

What do multiple ICSs create

A

Distributed Control System (DCS)

52
Q

Define Fieldbus

A

Digital serial data communication protocol used in OT networks to link different PLCs

53
Q

Define Programmable logic controller (PLC)

A

Type of digital computer used in industrial settings that enables automation and assembly lines, autonomous field operations, robotics and other applications

54
Q

Define Human-Machine Interface (HMI)

A

Can be a local control panel or software that runs on a computers

55
Q

Define Supervisory control and data acquisition (SCADA)

A

Type of ICS used to manage largescale multi-site devices and equipment in a geographic region from a host computer

56
Q

ICS,DCS,SCADA in terms of size

A

ICS : single plant/system
DCS: small connection of the ICS system in a single area
SCADA: different ICS and DCS plants in a WAN

57
Q

Define Embedded system

A

A computer system that is designed to perform specific and designated functions

58
Q

What type of environment are embedded system considered

A

Static, where frequent changes aren’t allowed

59
Q

Define Programmable Logic Controller (PLC)

A

Type of digital computer used in industrial or outdoor settings

60
Q

Define Real-time Operating System (RTOS)

A

Type of OS that prioritises deterministic execution of operations that ensure consistent response for time-critical tasks

61
Q

Define System-on-a-chip

A

Processor integrates the platform for functionality of multiple logical controllers onto a single chip

62
Q

What should be done when working with legacy systems

A

Identify them and put mitigations in place to keep operating such systems as they no longer receive patches