| Term 
 | Definition 
 
        | Lightweight Directory Access Protocol: An application protocol that follows a tree, hierarchical data structure and is used to query and modify directory services and runs over TCP/ICP. It is also used by other services for authentication.   Port Used○ SSL 636
   What is a not a good use for LDAP?○ Relational Data
   |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A distributed file system created by Sun that allows a user on a client computer to access files over a network as if it were connected directly to it.
 |  | 
        |  | 
        
        | Term 
 
        | Network File Systems - AFS |  | Definition 
 
        | Apple File Protocol Allows client workstations to access files from a remote file server.
 |  | 
        |  | 
        
        | Term 
 
        | Network File Systems - SMB |  | Definition 
 
        | Server Message Block Used to provide shared access to files, printers, serial ports and
 miscellaneous communications between nodes on a network.
 |  | 
        |  | 
        
        | Term 
 
        | Network File Systems - NAS vs SAN |  | Definition 
 
        | NAS = Network Attached Storage SAN = Storage Area Network
 ○ Differences
 ■ A NAS is a single storage device that operates on a data files. A SAN is a local
 network of multiple devices that operate on disk blocks.
 ■ A SAN uses fiber channel interconnects. A NAS uses Ethernet and TCP/IP
 connections.
 ○ Similarities
 ■ Both provide networked storage solutions
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Simple Network Management Protocol: Used to manage devices on IP networks (i.e. Routers, Switches, Servers,
 Workstations, etc.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Management Information Base: Used to describe the structure of the management data of a device subsystem
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Used to define a single object instance |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Used to define multiple related object instances grouped in MIB tables |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A network node that implements an SNMP interface and allows unidirectional or bidirectional access to specific information
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Same as IP Address but can represent different network address types |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 32-bit number used to track information such as the number of octets sent and received on an interface and repeats back to 0 once it hits 232.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 32-bit number that can increase or decrease at will but never exceed 232 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 32-bit number that measures time in hundredths of a second |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Allows any other ASN.1 encoding to be stuffed into an octet string |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 32-bit number that is used to specify enumerated types within the context of a single managed object.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Represents decimal values in the range of 0232 1
 inclusive
 |  | 
        |  | 
        
        | Term 
 
        | SPAM - Business Impact Volume |  | Definition 
 
        | Consumption of computer and network resources |  | 
        |  | 
        
        | Term 
 
        | SPAM - Business Impact threats |  | Definition 
 
        | ■ Financial theft ■ Identity theft
 ■ Data and intellectual property theft
 ■ Viruses/Malware
 ■ Pornography
 ■ Fraud
 ■ Deceptive marketing
 |  | 
        |  | 
        
        | Term 
 
        | SPAM Business Impact Cost |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | SPAM Business Impact Economics |  | Definition 
 
        | Email is cheap to send ● A small number of spammers can saturate a market
 ● The small number of gullible people provide necessary profits for
 spammers to continue spamming
 ● New spammers go into business every day
 |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | Email disguised to look legitimate |  | 
        |  | 
        
        | Term 
 
        | SPAM: Where did the name SPAM come from? |  | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | ○ A network protocol used to provide bidirectional interactive text-oriented communication.
 ○ Port 23
 ○ Security Issues:
 ■ Does not encrypt traffic
 ○ Uses:
 ■ Debugging network services
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | ○ A software utility on UNIX systems that allows users to login on another host via the network
 ○ Port 513
 ○ Security Issues:
 ■ Does not encrypt traffic
 ■ Corrupt clients can forge information to gain access to remote client
 ■ Exposes NFS directories to untrusted machines
 ○ Uses:
 ■ To share account information between all Unix machines on network to trust all
 other machines.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Remote Shell ○ Allows shell commands to be executed as another user on a remote computer.
 ○ Port 514
 ○ Security Issues:
 ■ Does not encrypt traffic
 ○ Uses:
 ■ To send remote commands to machines within a network. Has been replaced by
 SSH.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Remote Copy ○ Used to remotely copy one or more files from one computer to another.
 ○ Port 513
 ○ Security Issues:
 ■ Does not encrypt traffic
 ○ Uses:
 ■ To send data to another machine within a network quickly as it doesn’t need to
 encrypt and decrypt the data.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Secure Copy ○ Used to securely transfer files between a local and remote host computer.
 ○ Port 22
 ○ Security Issues:
 ■ ???
 ○ Uses:
 ■ Securely allows the transfer files by encrypting all traffic.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Secure Shell ○ Used to send remote commands, login credentials and other secure network services
 between two networked computers all while being encrypted.
 ○ Port 22
 ○ Security Issues:
 ■ Data streams could be hijacked and unauthorized data could be inserted in data
 stream due to insufficient data integrity protection from CRC32
 ○ Uses:
 ■ Used to securely login and send sensitive encrypted commands two and from
 computers on a network
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Secure File Transfer Protocol Provides file access, transfer and management functions over data stream. It assumes its
 current connection is already encrypted, but does not encrypt the data itself.
 |  | 
        |  | 
        
        | Term 
 
        | Remote Access: Public Key Cryptography |  | Definition 
 
        | A class of algorithms which requires two separate keys, one secret, one public. The public key is used to encrypt plain text or verify digital signatures and the private key is used to
 decrypt text or create digital signatures.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | ○ Port 25 (non-encrypted) ○ Port 587 (secure TLS)
 ○ Port 465 (secure SSL)
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | ○ Port 110 (non-encrypted) ○ Port 995 (secure SSL)
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | ○ Port 143 (non-encrypted) ○ Port 143 (secure TLS)
 ○ Port 993 (secure SSL)
 |  | 
        |  | 
        
        | Term 
 
        | Mail Services: Where is SMTP Used ? |  | Definition 
 
        | Used for all mail servers |  | 
        |  | 
        
        | Term 
 
        | Mail Services: Where is POP used ? |  | Definition 
 
        | Used by 3rd party mail service providers (GMAIL, Yahoo, Hotmail, etc.) |  | 
        |  | 
        
        | Term 
 
        | Mail Services: Where is IMAP used ? |  | Definition 
 
        | Used by private organizations |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | does not sync changes on the client with the server |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | doesn’t need to store content on the server as it gets pulled down to the client |  | 
        |  | 
        
        | Term 
 
        | Mail Services: IMAP con ? |  | Definition 
 
        | stores content on the server and it is synced with the client |  | 
        |  | 
        
        | Term 
 
        | Mail Services: IMAP pro ? |  | Definition 
 
        | syncs all changes on the client with the server |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A desktop sharing system that allows one to remotely control another computer. |  | 
        |  | 
        
        | Term 
 
        | What ports is used for VNC ? |  | Definition 
 
        | ○ 5900 (via a server) ○ 5800 (via a browser)
 |  | 
        |  | 
        
        | Term 
 
        | What type of security does VNC have ? |  | Definition 
 
        | The RFB protocol is not natively encrypted and requires additional methods to secure a connection (SSH, VPN, etc.)
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | ● RFB Protocol ○ Allows for remote access to graphical user interfaces.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | An extension of a private network across a public network that allows a computer to send/receive data across shared or public network as if directly connected to the private
 network.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Tells the enduser’s browser what network adapter to use first when accessing websites
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Linking two locations as if they were on the same private network, encapsulating the data during the transfer and unpacking it on the receiving end all while being encrypted during
 transfer.
 |  | 
        |  | 
        
        | Term 
 
        | Web Servers: What does it do ? |  | Definition 
 
        | ○ Accepts HTTP requests from clients ○ Provides HTTP responses to clients
 ○ Logs requests and responses
 |  | 
        |  | 
        
        | Term 
 
        | Web Servers: Types of Web Servers ? |  | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | ■ Platforms Supported: Windows, Novell, Linux, Macintosh, zOS ■ Features
 ● SSL Secure Socket Layer Provides
 communication privacy
 ● TLS Transport Layer Security Protocol
 that ensures privacy between
 communicating applications and their users on the Internet
 ● Logging Visible
 via the browser, visitors
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | ■ Platforms Supported: Windows ■ The world wide web publishing service serves out web pages
 ■ Services:
 ● AppHostSVC
 ○ Application Host Helper Service
 ■ Stores configuration history and application pool
 mappings
 ● FTPSVC/MSFTPSVC
 ○ FTP Publishing Services
 ■ Allows IIS to become FTP server
 ● W3SVC
 ○ World Wide Web Publishing Service
 ■ Provides web connectivity and administration of IIS
 ● WAS
 ○ Windows Process Activation Service
 ■ Provides process activation, resource and health
 management services for message activated applications
 ● WMSVC
 ○ Web Management Service
 ■ Web Management Service Enables
 remote
 |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | Informational Status messages and headers (i.e. Continue, Switching Protocols,
 etc.)
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Successful Status messages indicating that a client’s request was received,
 understood and accepted (i.e. Reset Content, Partial Content, Accepted, etc.)
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Redirection Status code indicating that further action needs to be taken by the
 user in order to fulfill the client’s request (i.e. Moved Permanently, Use Proxy, etc.)
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Client Error Status code indicating that an error on the client’s end has occurred
 (I.e. Forbidden, Not Found, Request Timeout etc.)
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Server Error Status code indicating that an error on the server has occurred (i.e.
 Internal Server Error, Service Unavailable, Gateway Timeout, etc.)
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | 200 OK The request has succeeded
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Forbidden The server understood the request, but is refusing to fulfill it. Typically
 due to permissions on indexing
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Not Found The server did not find anything matching the requestURI
 |  | 
        |  | 
        
        | Term 
 
        | What is HTML in relation to HTTP |  | Definition 
 
        | HTML is a document containing statements pointing to text, images or other types of documents which is viewed through HTTP within a browser |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | Commonly used alternate webserver
 HTTP port as alternative to port 80 (i.e.
 secondary webserver,
 etc.)
 |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | ○ Preexisting data files
 ○ Contents loaded on request
 ○ Faster web delivery
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | ○ Content generated by another program (script) ○ Creates/retrieves the requested information
 ○ Slower web delivery
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | ○ URL = Uniform Resource Locator ○ The path component to a local file system resource or internal/external program name on
 the web server
 |  | 
        |  | 
        
        | Term 
 
        | HTML Stateless Connections: |  | Definition 
 
        | A communication protocol that treats every request as an independent transaction. It does not require the server to retain session information or status for the duration of multiple
 requests.
 |  | 
        |  | 
        
        | Term 
 
        | HTML Persistent Connections: |  | Definition 
 
        | Using a single TCP connection to send/receive multiple HTTP requests/responses as opposed to a new connection for every request. This allows for less resources to be
 consumed on the server.
 |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 
        | TCP/UDP SSH, and other secure protocols
 |  | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  | 
        
        | Term 
 | Definition 
 | 
        |  |