S14 - Network Services Flashcards

(62 cards)

1
Q

What can be done to a server for file share

A

Can be configured to allow the clients on the network to access the network and be able to read and write to its disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define print server

A

another server that could be a physical workstation or network infrastructure that provides printing functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 common types of file and printer server

A

Windows-based / Linux or Unix-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does windows-based file and printer server rely on

A

NetBIOS protocol or SMB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Function of Sambda

A

Provides the ability for a linux or unix server to be able to host files or printers that can then be used by windows clients running the SMB protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do IP-based File and Print Server / Cloud printing allow for

A

Printing from anywhere in the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define web server

A

any server that provides access to a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Internet Information Services (IIS)

A

Web server software created by Microsoft (HTTP,HTTP/2,HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Function of apache

A

Most popular way to run a web server these days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Function of NGINX

A

Reverse proxy, load balancer, mail proxy and HTTP cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What makes something a FQDN, provide an example

A

the whole url:
[https:// : protocol]
[www : server].
[google: domain/name].
[com: top level domain]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Simple Mail Transfer Protocol (SMTP) function

A

specifies how emails should be delivered from one mail domain to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Post Office Protocol 3 (POP3) definition

A

older email protocol that operates over port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet Message Access Protocol (IMAP) function

A

Mail retrieval protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Microsoft Exchange (widely used in corporate environment)

A

Mailbox server env designed for windows-based domain envs, using pop3/imap/smtp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do the As in AAA server stand for

A

authentication, authorization, accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define 802.1x

A

Standardised framework used for port-based authentication on wired and wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define authentication

A

Occurs when a person’s identity is established with proof and is confirmed by the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

define Lightweight directory access protocol (LDAP)

A

A database used to centralise info about clients and objects on the network, port 389 (unencrypted), port 636 (encrypted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

function of Active Directory (AD)

A

Used to organise and manage the network, including clients, servers, devices, users and groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Function of Remote authentication Dial-In User service (RADIUS)

A

Provides centralised admin of dial-up, VPN, and wireless authentication services for 802.1x and the EAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Function of Terminal Access Controller Access-Control System Plus (TACACS+)

A

Proprietary version of RADIUS that can perform the role of an authenticator in 802.1x networks, CISCO only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define Authorisation

A

Occurs when a user is given access to a certain piece of data or certain areas of a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Function of Kerberos

A

Authentication protocol used by windows to provide 2-way authentication using a system of tickets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Define accounting
Ensures tracking of data, computer usage, network resources are maintained
26
Define non-repudiation
when you have proof that someone has taken an action
27
What can be used to create a secure connection to tunnel into the RDP
Remote Desktop Gateway (RDG)
28
Function of Virtual Network Computing (VNC) over port 5900
Remote connection method designed for thin client architectures
29
Define Terminal Emulator (TTY)
Any kind of software that replicates the TTY I/O functionality to remotely connect to a device
30
Function of Syslog-ng
Enables different appliances and software application to transmit logs to a centralised server, VERY COMMON
31
What can syslog refer to
Protocol used/server/log entries
32
Function of Simple network management protocol (SNMP)
TCP/IP protocol that aids in monitoring network-attached devices and computers
33
Define managed devices
Computer and other network-attached devices monitored through the use of agents by a network management system
34
Define agents
Software that is loaded on a managed device to redirect info to the network management system
35
Define Network management system (NMS)
Software running on one or more server to control the monitoring or network-attached devices and computers
36
Define in-band communication
Where data is sent over the same network that's carrying the corporate data
37
Define out-of-band
Second network where all the management occurs where the main network is used solely for corporate data transfers, added security by doing this
38
Define proxy server
Devices that create a network connection between an end user's client machine and a remote resource (web server)
39
Function of a load balancer/content switch
Distributes incoming requests across a number of servers inside a server farm or a cloud infrastructure e.g. 3 servers with 600 bits of data, load balancer would spread it evenly, each server dealing with 200 bits
40
Why is a load balancer such an important preventative measure
One of the key things that allows for defence against a DOS/DDOS attack
41
Define Blackholing/Sinkholing
Identifies any attacking IP addresses and routers their traffic through a knoll interface
42
Function of Intrusion Prevention System (IPS)
Works for small-scale attacks against DoS
43
Function of elastic cloud
allows to scale up the demand as needed
44
Define Access Control List (ACL)
Rule sets placed on the firewalls, routers and other network devices that permit or allow traffic through a particular interface
45
Explain ACL in terms of rules
Work top down, meaning that the most specific most be placed at the top
46
Basic explanation of firewall
Inspects and controls the traffic that is trying to enter of leave a network's boundary
47
Define Unified threat management (UTM)
Provides the ability to conduct security function within a single device or network appliance
48
Define IT
Includes computers, servers, networks and cloud platforms
49
Define operation technology (OT)
Communications network designed to implement and ICS, tech that interacts with the real world
50
Define Industrial Control System (ICS)
Provides the mechanisms for workflow and process automation by controlling machinery using embedded devices
51
What do multiple ICSs create
Distributed Control System (DCS)
52
Define Fieldbus
Digital serial data communication protocol used in OT networks to link different PLCs
53
Define Programmable logic controller (PLC)
Type of digital computer used in industrial settings that enables automation and assembly lines, autonomous field operations, robotics and other applications
54
Define Human-Machine Interface (HMI)
Can be a local control panel or software that runs on a computers
55
Define Supervisory control and data acquisition (SCADA)
Type of ICS used to manage largescale multi-site devices and equipment in a geographic region from a host computer
56
ICS,DCS,SCADA in terms of size
ICS : single plant/system DCS: small connection of the ICS system in a single area SCADA: different ICS and DCS plants in a WAN
57
Define Embedded system
A computer system that is designed to perform specific and designated functions
58
What type of environment are embedded system considered
Static, where frequent changes aren't allowed
59
Define Programmable Logic Controller (PLC)
Type of digital computer used in industrial or outdoor settings
60
Define Real-time Operating System (RTOS)
Type of OS that prioritises deterministic execution of operations that ensure consistent response for time-critical tasks
61
Define System-on-a-chip
Processor integrates the platform for functionality of multiple logical controllers onto a single chip
62
What should be done when working with legacy systems
Identify them and put mitigations in place to keep operating such systems as they no longer receive patches