902.4 Flashcards
Net Use Command Line
allows you to connect to, remove, and configure connections to shared resources, like mapped drives and network printers.
nslookup Command Line
Uses DNS server to find the corresponding IP address to a hostname you specify or the same thing in reverse
Which tools in Windows 10 would you use to browse all networks and shared folders to which a user has access? (3)
Network
File Explorer
This PC
Phishing is a form of what
Social Engineering
Trusted Platform Module (TPM) can generate a
hash value based on the components installed in the system.
What is the purpose of the Hash Value TPM creates?
can be used to verify that system components have not been modified when the system boots.
Pharming redirects one website’s traffic
to another, bogus website that is designed to look like the real website
How does Pharming affect the host and DNS server
- Changing the hosts file of a user’s computer
- Poison a DNS Server
Proxy Server
- Prevent access to specific websites
- Cache (save) frequently used web pages
Acceptable Use Policy
defines an employee’s rights to use company property.
Password Policy
identifies the requirements for passwords used to authenticate to companyowned systems.
All-in-one security appliance features(4)
- firewall
- email scanner
- content filter,
- intrusion prevention system.
VPN concentrator is
configured to accept VPN connections from individual hosts.
PPTP (Point to Point Tunneling Protocol)
is used with VPNs, which allow you to send data securely over a public network.
SSL VPN authenticates the server to the client
using public key cryptography and digital certificates.
- Also Encrypts the entire communication session
- & Uses port 443