6 - Windows Network Protocols Flashcards

1
Q

Describe the “idea” behind RPC.

A
  • The idea behind RPC is that a computer program can call and execute a subroutine on a remote system just like it would call a local subroutine.
  • HOWEVER - the network communication details are hidden from the user.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the four steps in RPC.

A
  1. A client makes a request to execute a procedure on the remote server. The client is suspended until the procedure results are back.
  2. The procedure’s parameters are passed over the network to the server.
  3. The procedure then executes on the server.
  4. The results are then transferred back to the client.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RPC can be used in distributed environments and local environments.

[True / False]

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RPC is implemented in nearly all popular programming languages.

[True / False]

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the meaning of the abstraction provided by RPC.

A

The user doesn’t need to know the details of how the RPC interaction was handled over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 2 main goals of RPC?

A
  1. A program can use it to request a service from a computer on another network without having to understand the network itself.
  2. It can be beneficial because it hides the existence of the network from a program.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NetBIOS provides __________ on local networks.

A

Communication services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NetBIOS allows applications and computers on a local area network to communicate with network hardware on another network.

[TRUE / FALSE]

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Windows, the NetBIOS name can be up to how many characters long?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do software applications on a NetBIOS network locate and identify each other?

A

Through their NetBIOS names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What begins a NetBIOS session?

A

Two applications start a NetBIOS session when the client sends a command to “call” another client (the server) over TCP port 139.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In NetBIOS, what is referred to as the “session mode”?

A

The session mode is where both sides issue “send” and “receive” commands to deliver messages in both directions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What terminates a NetBIOS session?

A

A “hang-up” command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe how NetBIOS supports connection-less communications.

A
  1. Through UDP.
  2. Applications listen on UDP port 138 to receive NetBIOS datagrams.
  3. The datagram service sends/receives datagrams.
  4. The datagram service broadcasts datagrams.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does SMB stand for?

A

Server Message Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is SMB?

A
  1. SMB is a network file and resource sharing protocol that uses a client-server model.
  2. SMB clients such as PCs on a network connect to SMB servers to access resources such as files and directories or perform tasks like printing over the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What port do SMB clients use to connect to an SMB server?

A

port 445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Server Message Block is a ________ protocol, meaning it transfers multiple messages between the client and server to accomplish the request.

A

request-response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Name two advantages of SMB.

A
  1. SMB provides an authenticated intercommunication process mechanism to share the files or resources (files, folders, printers) within the server.
  2. SMB provides the clients to edit files, delete them, share the files, browse the network, print services, etc., over the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The SMB protocol needs _______ to make communication safe.

A

security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does the “Network Discovery” setting in Windows determine?

A

Network Discovery determines whether other computers and devices connected to the network can see and communicate with each other.

22
Q

What is one major disadvantage of enabling Network Discovery?

A

Data transmitted between the connected computers or devices can be intercepted by a third party.

23
Q

Name / describe 3 commands that can be used to perform Network Discovery in the Powershell CLI

A
  1. ipconfig
  2. arp -a (will display IPs along with MAC addresses)
  3. ping (will iindicate if the connection is still active)
24
Q

Within the context of Network Discovery, what could an invalid IP address be indicative of?

A

An invalid IP address is often a sign of malicious or rogue devices that might be carrying malware.

25
Q

What CLI command can be used to turn off Network Discovery?

A

netsh advfirewall firewall set rule group=”Network Discovery” new enable=No

26
Q

Net.exe is a file that is part of Microsoft Windows Operating System.

[TRUE / FALSE]

A

TRUE

27
Q

Describe some of the functionalities Net.exe may be used for.

A
  1. Starting, pausing, or stopping Windows services
  2. Adjusting network account requirements
  3. Mapping shared disk resources to drive letters, on local or remote client or server computers.
28
Q

What does the Net command prompt manage?

A

It manages almost any aspect of a network and its settings, including network shares, network print jobs, and network users.

29
Q

The net command is available from within the Command Prompt in all Windows operating systems.

[TRUE / FALSE]

A

TRUE

30
Q

What is the “NET ACCOUNTS” command used for?

A

Used to set the policy settings on local computers, such as Account policies, password policies and logon requirements for all accounts.

31
Q

What is “net /?” used for?

A

Used to get general help on the net command.

32
Q

When used without options, what does the “net accounts” command display?

A

Displays the current settings for password, logon limitations, and domain information.

33
Q

What command modifies local groups on computers?

A

NET LOCALGROUP

34
Q

When used without options, the NET LOCALGROUP command displays what?

A

the local groups on the computer

35
Q

High level - describe the process of DNS resolution.

A
  • The process of DNS resolution involves converting a host name (such as www.google.com) into a computer-friendly IP address (such as 192.168.1.1).
  • An IP address is given to each device on the Internet.
36
Q

In a typical DNS lookup, how many types of queries occur?

A

3

37
Q

Name the Query type.

A DNS client requires that a DNS server (typically a DNS recursive resolver) will respond to the client with either the requested resource record or an error message if the resolver can’t find the record.

A

Recursive query

38
Q

Name the Query type.

The DNS resolver knows the answer; it will either immediately return it or query the authoritative DNS Name Server which is guaranteed to have it.

A

Non-recursive query

39
Q

Name the query.

The DNS client will allow a DNS server to return the best answer it can. If the queried DNS server does not have a match for the query name, it will return a referral to a DNS server authoritative for a lower level of the domain name space. This process continues with additional DNS servers down the query chain until it’s returned or errors out.

A

Iterative query

40
Q

This is the fastest way for your system to find an IP address

A

cached DNS data

41
Q

How does cached data speed up queries?

A

Cached data can speed up queries because the information is immediately available, thus bypassing the entire DNS lookup process.

42
Q

___ is a web server software package designed for Windows Server.

A

IIS

(Internet Information Services)

43
Q

Name two functions of IIS.

A
  1. It is used for hosting websites and other content on the Web.
  2. It provides a visual means of creating, configuring, and publishing sites on the web.
44
Q

What website options does the IIS Manager allow Web Admins to modify?

A
  1. default pages
  2. error pages
  3. logging settings
  4. security settings
  5. performance optimizations
45
Q

The traffic going into the IIS web server is sometimes referred to as a web request.

[True / False]

A

True

46
Q

How are IIS web requests typically processed?

A

Requests are usually processed on a simple request-response basis.

47
Q

Describe was is meant by the “request-response” model.

A

The client sends a request, and a response is sent.

48
Q

Name the 2 layers of the IIS processing architecture.

A
  1. Kernel mode
  2. User mode
49
Q

With this mode, executed code cannot access hardware or reference memory, giving you a more secure environment to work within. If a mistake is made, the consequences are unlikely to be as devastating.

A

User mode

50
Q

With this mode, code can execute any command and has total access to connected equipment.

A

Kernel mode

51
Q

Name the 4 key features of IIS.

A
  1. Application Pools
  2. Authentication
  3. Security
  4. Remote management