Virtual Networking Flashcards

1
Q

What is a Bridged network?

A

networking devices that create a single network from multiple communication networks.
ex: switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a NAT network?

A

connecting two networks together, and translating the private addresses, before packets are forwarded to another network
ex: router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Host-Only network?

A

a network that is completely contained within the host computer
ex: network connection between the virtual machine and the host computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A __________ __________ may be used in place of username/password credentials

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

To access a server using SSH, two components are needed. They are

A
  • remote server (sshd service must be running and offering services at port 22)
  • should not be blocked by the firewall.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In SSH, what is used to ensure that

you can be sure that you are connecting to the intended server.?

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If you want to access Linux servers through SSH from a Windows computer, you need to install an SSH client like?

A

Putty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can you SSH between Linux machines in the command line?

1) type ssh followed by the IP address of the other Linux machine
2) type ssh followed by the name of the other Linux machine
3) type removeserver ssh followed by the name of the other Linux machine

A

In the command line type ssh followed by the ip address of the other Linux machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are two different ways to start an ssh session under a specific user?

A
  • ssh Username@remoteserver

- ssh remoteserver -l username

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

After connecting to the remote server, what is stored in the file ~/.ssh/known_hosts?

A

public key fingerprint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does it mean if the remote host key fingerprint does not match the key fingerprint that is stored locally?

A

Potentially dangerous situation.

Instead of being connected to the intended server, you might be connected to the server of an evildoer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two requirements for starting graphical

applications through an SSH connection?

A

■ An X server must be running on the client computer.
■ The remote host must be allowed to display screens on the local computer.
(The X server is the software component that creates the graphical screens.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The easiest way to allow the remote host to draw graphical screens on your computer is by?

A

adding the -X option to the ssh command.

ex use: ssh -X linda@server2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens when you do the following: As root, open the configuration file /etc/ssh/ssh_config and make sure it includes the following line:
ForwardX11 yes

A

The next time you use the ssh command, X forwarding will be available by default to draw graphical screens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You can use ____ to copy files and subdirectories to remote hosts, and subdirectories as well.

A

scp
ex: scp /etc/hosts server2:/tmp
or
scp -r server2:/etc/ /tmp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When a public/private key-based authentication the public key is stored in?

A

the home directory of the target user on the SSH server.

17
Q

When a public/private key-based authentication the private key need to?

A

The private key needs to be kept private and will never be distributed

18
Q

When using public/private key-based authentication, the user who wants to connect to a server generates what?

A

a public/private key pair

19
Q

When authenticating using key pairs, the user generates a _______ derived from the
private key sent to the server. Server proves to match the public key that is stored on the server, the user is authenticated.

A

hash

20
Q

What command do you use to create a key pair?

A

ssh-keygen

21
Q

Before you can use screen, you need to install it. To do

this you need what use what command?

A

yum install -y screen
followed by
screen

22
Q

What does the screen -r command do?

A

gives a list of all currently available screen sessions

23
Q

What does the screen -ls command do?

A

shows you all screen sessions that are currently running

You can select the screen session you want to connect to by adding the number

24
Q

What does the screen -ls command do?

A

shows you all screen sessions that are currently running

You can select the screen session you want to connect to by adding the number

25
Q

What is needed to validate that a user is who he claims to be?

A

Authentication information

26
Q

_________ __________ is used to identify the user on a Linux system, such as username, home directory location, and so on?

A

Account information:

27
Q

Typically, the Lightweight Directory Access Protocol (LDAP) is used to provide the _________ ________.

A

account information

28
Q

Encrypted passwords for Authentication information is stored on an ______ ________ or can me managed using _______

A

an LDAP server or using Kerberos.

29
Q

Encrypted passwords for Authentication information is stored on an ______ ________ or can me managed using _______

A

an LDAP server or using Kerberos.

30
Q

Name an authentication protocol designed for secure network login without the need for users to reauthenticate when accessing new services.

A

Kerberos

31
Q

In Kerberos, tickets are issued by a central key server, which is known as the?

A

Key Distribution Center (KDC)

32
Q

What command is used to copy the public key over to the target server?

A

ssh-copy-id