902.4 Flashcards
Net Use Command Line
allows you to connect to, remove, and configure connections to shared resources, like mapped drives and network printers.
nslookup Command Line
Uses DNS server to find the corresponding IP address to a hostname you specify or the same thing in reverse
Which tools in Windows 10 would you use to browse all networks and shared folders to which a user has access? (3)
Network
File Explorer
This PC
Phishing is a form of what
Social Engineering
Trusted Platform Module (TPM) can generate a
hash value based on the components installed in the system.
What is the purpose of the Hash Value TPM creates?
can be used to verify that system components have not been modified when the system boots.
Pharming redirects one website’s traffic
to another, bogus website that is designed to look like the real website
How does Pharming affect the host and DNS server
- Changing the hosts file of a user’s computer
- Poison a DNS Server
Proxy Server
- Prevent access to specific websites
- Cache (save) frequently used web pages
Acceptable Use Policy
defines an employee’s rights to use company property.
Password Policy
identifies the requirements for passwords used to authenticate to companyowned systems.
All-in-one security appliance features(4)
- firewall
- email scanner
- content filter,
- intrusion prevention system.
VPN concentrator is
configured to accept VPN connections from individual hosts.
PPTP (Point to Point Tunneling Protocol)
is used with VPNs, which allow you to send data securely over a public network.
SSL VPN authenticates the server to the client
using public key cryptography and digital certificates.
- Also Encrypts the entire communication session
- & Uses port 443
A key fob can be issued to
an employee that presents a security code or PIN that changes at predetermined intervals.
When securing a Windows computer that is in a home office and not part of a domain
a best practice is to rename the Administrator account and disable the Guest account.
To connect to an administrative share, you
must use the UNC path Because administrative shares are not visible when browsing the network
By default, Windows automatically creates an administrative share
for every volume. With the share name being the volume letter plus the dollar sign (such as C$).
When evaluating the interaction between Share and NTFS permissions, remember
the most restrictive set of permissions takes precedence.
How to enable screen saver password on Windows 7
Personalization option in Control Panel
Hoax virus
preys on email recipients who are fearful and will believe most information if it is presented in a professional manner.
Hoax virus information emails are
a form of social engineering attack
A virtual private network uses which protocols? (3)
IPSec, PPTP, or L2TP
Malware Infection symptoms?
- Operating system lock ups
- Windows update failures
- Renamed system files
- Disappearing files
- Changed file permissions
- Access denied errors
Social engineering is an attack
an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems.
Phishing
attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization.
How does Pharming affect DHCP server?
-Exploiting DHCP servers to deliver the IP address of malicious DNS servers in DHCP leases