Virtual Networking Flashcards
What is a Bridged network?
networking devices that create a single network from multiple communication networks.
ex: switch
What is a NAT network?
connecting two networks together, and translating the private addresses, before packets are forwarded to another network
ex: router
What is a Host-Only network?
a network that is completely contained within the host computer
ex: network connection between the virtual machine and the host computer
A __________ __________ may be used in place of username/password credentials
Digital signature
To access a server using SSH, two components are needed. They are
- remote server (sshd service must be running and offering services at port 22)
- should not be blocked by the firewall.
In SSH, what is used to ensure that
you can be sure that you are connecting to the intended server.?
cryptography
If you want to access Linux servers through SSH from a Windows computer, you need to install an SSH client like?
Putty
How can you SSH between Linux machines in the command line?
1) type ssh followed by the IP address of the other Linux machine
2) type ssh followed by the name of the other Linux machine
3) type removeserver ssh followed by the name of the other Linux machine
In the command line type ssh followed by the ip address of the other Linux machine.
What are two different ways to start an ssh session under a specific user?
- ssh Username@remoteserver
- ssh remoteserver -l username
After connecting to the remote server, what is stored in the file ~/.ssh/known_hosts?
public key fingerprint
What does it mean if the remote host key fingerprint does not match the key fingerprint that is stored locally?
Potentially dangerous situation.
Instead of being connected to the intended server, you might be connected to the server of an evildoer
What are the two requirements for starting graphical
applications through an SSH connection?
■ An X server must be running on the client computer.
■ The remote host must be allowed to display screens on the local computer.
(The X server is the software component that creates the graphical screens.)
The easiest way to allow the remote host to draw graphical screens on your computer is by?
adding the -X option to the ssh command.
ex use: ssh -X linda@server2
What happens when you do the following: As root, open the configuration file /etc/ssh/ssh_config and make sure it includes the following line:
ForwardX11 yes
The next time you use the ssh command, X forwarding will be available by default to draw graphical screens
You can use ____ to copy files and subdirectories to remote hosts, and subdirectories as well.
scp
ex: scp /etc/hosts server2:/tmp
or
scp -r server2:/etc/ /tmp
When a public/private key-based authentication the public key is stored in?
the home directory of the target user on the SSH server.
When a public/private key-based authentication the private key need to?
The private key needs to be kept private and will never be distributed
When using public/private key-based authentication, the user who wants to connect to a server generates what?
a public/private key pair
When authenticating using key pairs, the user generates a _______ derived from the
private key sent to the server. Server proves to match the public key that is stored on the server, the user is authenticated.
hash
What command do you use to create a key pair?
ssh-keygen
Before you can use screen, you need to install it. To do
this you need what use what command?
yum install -y screen
followed by
screen
What does the screen -r command do?
gives a list of all currently available screen sessions
What does the screen -ls command do?
shows you all screen sessions that are currently running
You can select the screen session you want to connect to by adding the number
What does the screen -ls command do?
shows you all screen sessions that are currently running
You can select the screen session you want to connect to by adding the number
What is needed to validate that a user is who he claims to be?
Authentication information
_________ __________ is used to identify the user on a Linux system, such as username, home directory location, and so on?
Account information:
Typically, the Lightweight Directory Access Protocol (LDAP) is used to provide the _________ ________.
account information
Encrypted passwords for Authentication information is stored on an ______ ________ or can me managed using _______
an LDAP server or using Kerberos.
Encrypted passwords for Authentication information is stored on an ______ ________ or can me managed using _______
an LDAP server or using Kerberos.
Name an authentication protocol designed for secure network login without the need for users to reauthenticate when accessing new services.
Kerberos
In Kerberos, tickets are issued by a central key server, which is known as the?
Key Distribution Center (KDC)
What command is used to copy the public key over to the target server?
ssh-copy-id