Week 2 - Physical Infrastructure Services Flashcards
What’s a server operating system?
It’s a regular OS but it’s optimized for server functions like more network connections and more RAM capacity
What’s the benefit of server operating systems in terms of security and services?
They’re usually more secure and come with additional services that don’t need to be set up separately
What are the 2 ways you can run your service?
D, V
- Dedicated hardware
- Virtualized instance (on a server)
In Linux, the most popular remote access tool is?
OpenSSH
What’s the command to install an SSH client on a machine you’re connecting from? (for remote connection on Linux)
sudo apt-get install openssh-client
What’s the command to install an SSH server on the machine you’re connecting to to establish a remote connection on Linux?
sudo apt-get install openssh-server
What are 2 popular tools to use on Windows for remote access connections via CLI command line interface?
WinRM
Putty
What’s a popular tool to use to remote access the GUI on another machine?
RDP (remote desktop protocol)
What are the 3 simple steps you take to setup OpenSSH remote access on 2 Linux machines?
- Install an SSH client on machine you’re connecting from
- Install an SSH server on machine you’re connecting to
- Test connection by using ssh server’s IP address username until it asks for a password
SSH is included with what server operating systems? (2)
- Linux
- Mac
What does RMM stand for?
Remote Monitoring and Management
What are some uses for RMM? (4)
Helps, Remote, Creates, Automates
- Helps maintain the network by sending periodic status reports about the health of each endpoint (installed on each device)
- Remote install of security patches and updates
- Creates a ticket if problems occur to send to IT staff
- Automates routine maintenance
RDP is available on which operating systems? (2)
- Windows
- Mac
RDP uses what network port?
3389
What’s the downside to RDP? (2)
Doesn’t enforce, Uses a single
- Doesn’t enforce strong sign-in credentials (vulnerable to stolen credentials and brute force attacks)
- Uses a single dedicated port that makes it vulnerable to on-path cyber attacks