Week 2 - Physical Infrastructure Services Flashcards
What’s a server operating system?
It’s a regular OS but it’s optimized for server functions like more network connections and more RAM capacity
What’s the benefit of server operating systems in terms of security and services?
They’re usually more secure and come with additional services that don’t need to be set up separately
What are the 2 ways you can run your service?
D, V
- Dedicated hardware
- Virtualized instance (on a server)
In Linux, the most popular remote access tool is?
OpenSSH
What’s the command to install an SSH client on a machine you’re connecting from? (for remote connection on Linux)
sudo apt-get install openssh-client
What’s the command to install an SSH server on the machine you’re connecting to to establish a remote connection on Linux?
sudo apt-get install openssh-server
What are 2 popular tools to use on Windows for remote access connections via CLI command line interface?
WinRM
Putty
What’s a popular tool to use to remote access the GUI on another machine?
RDP (remote desktop protocol)
What are the 3 simple steps you take to setup OpenSSH remote access on 2 Linux machines?
- Install an SSH client on machine you’re connecting from
- Install an SSH server on machine you’re connecting to
- Test connection by using ssh server’s IP address username until it asks for a password
SSH is included with what server operating systems? (2)
- Linux
- Mac
What does RMM stand for?
Remote Monitoring and Management
What are some uses for RMM? (4)
Helps, Remote, Creates, Automates
- Helps maintain the network by sending periodic status reports about the health of each endpoint (installed on each device)
- Remote install of security patches and updates
- Creates a ticket if problems occur to send to IT staff
- Automates routine maintenance
RDP is available on which operating systems? (2)
- Windows
- Mac
RDP uses what network port?
3389
What’s the downside to RDP? (2)
Doesn’t enforce, Uses a single
- Doesn’t enforce strong sign-in credentials (vulnerable to stolen credentials and brute force attacks)
- Uses a single dedicated port that makes it vulnerable to on-path cyber attacks
What are 2 ways VPNs can be implemented?
s on ns, on nr
- software running on networked servers
- on network routers with VPN features enabled
VPNs work well for what size organizations?
small to medium, maybe not adequate for large
VPNs aren’t ideal to use with contractors and vendors because they need to provide…?
restricted levels of network access
What has largely replaced FTP (file transfer protocol) tools?
Cloud storage platforms like Google Drive, Microsoft OneDrive, Dropbox
(comes with asynchronous file transfers, encryption, security, authentication, file share with many)
For what type of organization would cloud-based storage not be an ideal option for?
Organizations that need to follow certain privacy laws and regulations or have other security concerns
(they can use SSH or HTTPS protocols for FTP applications)