Section 15 OBJ 2.4: Network Services Flashcards

1
Q

File Server

A

Can be configured to allow the clients on the network to access the network and be able to read and write to its disk (file share)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Print Server

A

a server that could be a physical workstation or network infrastructure that provides printing functionality

Windows based file and print server:
relies on NETBIOS (137, 139) or SMB (445)

Linux or Unix based file and print server:
Samba - Provides the ability for a Linux or Unix server to be able to host files or printers that can then be used by Windows clients running the SMB protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IP-based File and Print Server / Cloud Printing

A

allows for printing anywhere in the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Web Server

A

Any server that provides access to a website, generally through HTTP or HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet Information Services (IIS)

A

Extensible web server software, created by Microsoft (HTTP, HTTP/2, HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Apache

A

Most popular way to run a webserver these days
Can use Linux, Unix, Mac, and Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NGINX

A

Reverse proxy, load balancer, mail proxy, and HTTP cache
faster than IIS and Apache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uniform Resource Locator (URL)

A

combines the fully qualified domain name (FQDN) with a protocol at the beginning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Email Server

A

Servers that are set up to compose a message and send it to another user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Simple Mail Transfer Protocol (SMTP)

A

Specifies how emails should be delivered from one mail domain to another
Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Post Office Protocol version 3 (POP3)

A

Older email protocol where you connect to your server, download messages, and process them on your local machine
port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Message Access Protocol (IMAP)

A

Mail retrieval protocol capable of retrieving emails and keeping a copy on the server. Can also manage status of each email
Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Microsoft Exchange

A

Mailbox server environment designed for Windows based domain environments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Authentication

A

occurs when a person’s identity is established with proof and is confirmed by the system

Five methods of authentication:
- something you know
- something you are
- something you have
- something you do
- somewhere you are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.1x

A

Standardized framework used for port based authentication on wired and wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Lightweight Directory Access Protocol

A

a database used to centralize information about clients and objects on the network
port 389 unencrypted
port 636 encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Active Directory

A

used to organize and manage the network, including clients, servers, devices, users, and groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Remote Authentication Dial-In User Service (RADIUS)

A

provides centralized administration of dial-up, VPN, and wireless authentication services for 802.1x and the EAP
operates at the application layer
Uses UDP
Combines authentication and authorization
Does not support all network protocols
Has cross-platform compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Terminal Access Control Access-Control System Plus (TACACS+)

A

proprietary version of RADIUS from Cisco that can perform the role of an authenticator in 802.1x networks
Uses TCP
Separates authentication, authorization, and accounting
Supports all network protocols
Exclusive to Cisco devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Authorization

A

Occurs when a user is given access to a certain piece of data or certain areas of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Kerberos

A

Authentication protocol used by Windows to provide for two-way (mutual) authentication using a system of tickets

22
Q

Accounting

A

Ensures the tracking of data, computer usage, and network resources is maintained
Typically kept in a log file

23
Q

Telnet

A

Sends text-based commands to remote devices and is a very old networking tool
Not secure because everything is sent in plain text
Port 23

24
Q

Secure Shell (SSH)

A

Encrypts everything that is being sent and received between the client and the server
Port 22

25
Q

Remote Desktop Protocol (RDP)

A

Provides graphical interface to connect to another computer over a network connection
Use remote desktop gateway (RDG) to create a secure connection tunnel into the RDP
Port 3389

26
Q

Virtual Network Computing (VNC)

A

designed for thin client architectures
Port 5900

27
Q

Terminal Emulator (TTY)

A

Any kind of software that replicates the TTY I/O functionality to remotely connect to a device

28
Q

Syslog

A

Enables different appliances and software applications to transmit logs to a centralized server
It is the de facto standard for logging events
When mentioned, it can refer to the protocol, server, or the log entries themselves

Old Syslog:
Relied on UDP
Lacked security controls

New Syslog:
Uses TCP
Uses TLS
Uses MD5 and SHA1

29
Q

Simple Network Management Protocol (SNMP)

A

TCP/IP protocol that aids in monitoring network-attached devices and computers

3 components:
Managed Devices - computers and other network-attached devices monitored through the use of agents by a network management system
Agent - software that is loaded on a managed device to redirect information to the network management system
Network Management Systems - running on one or more servers to control the monitoring of network attached computers

30
Q

Proxy Server

A

Devices that create a network connection between an end user’s client machine and a remote resource (web server)
Can cache websites to save bandwidth
Increased security by whitelisting and blacklisting sites
Increase auditing capabilities by keeping logs

31
Q

Load Balancer/Content Switch

A

Distributes traffic across a number of servers inside a server farm or cloud infrastructure

32
Q

Denial of Service (DoS)

A

a continuous flooding of requests to crash the system

33
Q

Distributed Denial of Service (DDoS)

A

Multiple machines simultaneously launch attacks on the server to force it offline

34
Q

Blackholing/Sinkholing

A

Identifies any attacking IP address and routes their traffic through a null interface

35
Q

Intrusion Prevention System (IPS)

A

Works for small-scale attacks against DoS

36
Q

Elastic Cloud

A

Allows to scale up the demand as needed

37
Q

Access Control List (ACL)

A

Rule sets placed on the firewalls, routers and other network devices that permit or allow traffic through a particular interface
Actions always performed top-down in an ACL, so specific rules on top, generic on bottom

38
Q

Firewall

A

Inspect and control traffic trying to enter or leave a network

Types include:
Packet-filtering
Stateful
Proxy
Dynamic packet-filtering
Kernel Proxy

39
Q

Unified Threat Management (UTM)

A

Provides the ability to conduct security functions within a single device or network appliance

40
Q

Information Technology (IT)

A

Includes computers, servers, networks, and cloud platforms

41
Q

Operational Technology (OT)

A

Communications network designed to implement an ICS
Technology that interacts with the real world, no computer needed

42
Q

Industrial Control Systems (ICS)

A

Provides the mechanisms for workflow and process automation by controlling machinery using embedded devices

43
Q

Fieldbus

A

Digital serial data communication protocol used in OT networks to link different programmable logic controllers (PLCs)

44
Q

Programmable Logic Controller (PLC)

A

Type of digital computer used in industrial settings that enables automation and assembly lines, autonomous field operations, robotics, and other applications

45
Q

Human-Machine Interface (HMI)

A

Can be a local control panel or software that runs on a computer

46
Q

Supervisory Control and Data Acquisition (SCADA)

A

Type of ICS used to manage large scale multi-site devices and equipment in a geographic region from a host computer

47
Q

Embedded System

A

Computer system that is designed to perform specific or dedicated functions
Considered static environments, where frequent changes are not allowed

48
Q

Real-time Operating System (RTOS)

A

Type of OS that prioritizes deterministic execution of operations that ensure consistent response for time critical tasks

49
Q

System-on-a-Chip

A

processor integrates the platform functionality of multiple logic controllers on a chip
ex: raspberry-pi

50
Q

Legacy system

A

computer system that is no longer supported by its vendor and is no longer provided with security updates and patches
Must identify legacy systems and put mitigations in place

51
Q

Proprietary System

A

System that is owned by its developer or vendor