CompTIA A+ (Anki) 4 Flashcards

1
Q

UTM

A

Unified Threat Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

__ combines multiple security features
Gives you the ability to control and manage consistent setting across devices like
Router
Firewall
Content filters
You may not be able to configure everything through it, but the devices can at least likely report back to it

A

UTM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IDS

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_ monitors the network and the systems on it for malicious activity
It monitors for anything out of the ordinary, it learns what the normal traffic tends to look like
The primary configurations are
Netowork based (NIDS)
Host based (HIDS)

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPS

A

Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_ is a network security/threat prevention technology

detects and prevents vulnerability exploits

A

IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_ Systems refers to an old, outdated, or unsupported system
Networks can consist of a mix of old and new hardware, software or services
systems tend not to be updated (generally the orignial vendor just doesn’t support it anymore)
can be expensive to maintain
often run proprietary software
may requie specialized programmes to maintain
they are still around because they were usually designed for a very specific purpose and there really isn’t anything else that is suitable to replace it
if its older it could be a security vulnerability

A

Legacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_ in ethernet netowork begins with ensuring that every system that needs to communicate has an address and that address is unique
Two systems cannot have the same address otherwise they will not be able to communciate

A

IP addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A _ address is assigned by some kind of entitiy or process and iti is assined automatically
the device requests an address and some kind of service responds and says here you go
Most systems in larger environements have this configuration

A

dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A _ address is something you manually configure and it does not change
It does not change until you or somebody changes it

A

static

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When it comes to the automatic configuration , the dynamic addresses, there is a service called __
It is a very common service and almost every internal networking environment will use this to handle the large numbers of clients that need addresses
When a client is confiugred to obtain an IP address automatically, then when it boots it issues out what’s known as a discover which is searching for some kind of service somewhere on the network
In most cases it is the server that has this service installed but other devices such as routers can supply the services
Something will respond and say yes, we have the service installed
Once you have that, what you configure is known as a scope and this is a pool of addresses from which clients can draw their configuration
It typically includes the IP address, a subnet mask and other optional values such as the DNS server they should use and the default gateway you should use. The reservation still allows a client to recieve its configuration automatically but they get the same address every time. When you set up a reservation, you set up a particular address to be assigned to the same client which is usually done by configuring the MAC address of that client so that it knows which client is wanting that address
A request is the client saying that I have discovered that there is a server. I see that there is an offer coming back from that server, I will request that address configuration then you will get what is known as a lease which is essentially the time duration for how long its valid. When that expires you go through the process again and get a new address configuration which could be a different address

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

APIPA

A

Automatic Private IP Addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When you are using DHCP, there is an option that you might consider to be a little bit of a fail safe. A DHCP server can go down so if you have clients reqeusting addresses from the server and the server is down then no address is being returned, the client will initalize itself with and address which is called, __
the address is always in the format of 169.254.x.x
the first two values indicate the network
More useful as a diagnostic tool
When you start seeing the address above, you know that there is an issue with DHCP and you can investigate accordingly

A

APIPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_ is more of a category than any kind of address assignment
It referes to all the addresses that are able to see each other within the same subnet or the same local area network without having to be routed to a different network
so even if the router went down, all of the systems within that network could still communicate with each other because they’d all be plugged into the same switch

A

Link Local Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_ is responsible for automatically assigning the IP address configuration to client systems
Typically includes the subnet mask, default gateway, DNS servers, and other optional values
An alternative to static confugration, static is not very efficient for large environments
It automates IP address configuration so that clients can obtain an IP address automatically and also obatin DNS server automatically

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In the DHCP process, the client initially boots up, if it is configured to obtain an IP address automattically. As soon as it sees this, it sends out what’s know as a _ packet which is the client asking if there are and DHCP servers available on the network

A

discover

17
Q

In the DHCP process, all of your servers with respond with _ becuase as the client is booting up and sending out this discover packet, it dos not yet have a discover packet, therefore, the only way it can communicate is to broadcast. Every system on the server hears the broadcast so if you have more than one server all of them will hear these discover packets and all of them will respond

A

offers

18
Q

In the DHCP, the client will _ one of the offers

A

request

19
Q

In the DHCP process, the server that issued the offer _ the request, all other servers withdraw their offers (lease duration begins)

A

acknowledges

20
Q

You can implement DHCP _ which are permanet IP address assignment that behave essentially like static address configuration but you can still handle it automatically so that you don’t have to visit each system and manually enter the address configuration
Used for specific DHCP clients and its applicable to any DHCP enabled device
Uses the MAC address of the client system to assign the reserved address
The MAC address is the only truly unique value so you do need to know the MAC address of the target system
The MAC address will always get that IP address
You need to make sure that the IP address you are assigning in it is not part of any other scope or pool
If it is it might end up getting assigned to someone else as well which will cause a duplicate
document which addresses you are going to

A

Reservations

21
Q

Since the DHCP process is boradcast based, that does make it susceptible to DHCP _ whereby an intruder can essentially initialize a DHCP server that is unathorized.
Somebody can hack into your network and fire up the DHCP server and start handing out invalid addresses to the client systems, maybe in attempt to reroute them so that they’re divulgin sensitive information. You can prevent this in most environments by implementing what’s known as an authorized DHCP server. This is a trusted response, so that if a client sees multiple offers coming in, it can actually see that this one is trusted, this one is not, okay?

A

snooping

22
Q

_ is the fourth revision of the Internet Protocol
Its primary function is to identify devices on a network
This is how we implement our IP addressing
Every device that wants to communicate needs to have an IP address
So the protocol was designed for packet-switched communication networks

The switch, the central connection device eg.
-my system is plugged into one of the physcial ports and it knows my IP address. Then the system that I want to communicate with is in some other physical port, so when I initiate communication by the intended IP address the switch knows where those two systems are and it builds a virtual circuit so that we can communicate. Once we are done communicating it breaks the circuit (packet switching)

Most widely deployed protocol for both internal LAN and Internet connectivity. We can use the same protocol internally as we do on the internet

A

IPv4

23
Q
_ is a 
32-bit address
yields approximately 4.3 billion addresses (232)
alot of the addresses were not used
exhausted the address space
A

IPv4

24
Q

_ is a
128-bit address
3.4x1038 addresses
Not readily interoperable with IPv4

A

IPv6

25
Q

Overview of the _
Every IP address has two sections which are the network address and the host address. The host address has a certain number of bits available to address your hosts. You can have alot of them or a large network. It might make more sense to take the single large network and subdivite it up into smaller units which generates a subnet address of the host address portion. You will still end up with a host address.

Can be used to make larger networks into smaller networks

A

subnet mask

26
Q

Key features of _ mask
sub -divides a large network into smaller networks
32-bit number that masks portions of the host IP address so that it believes there are fewer bits available to address the host systems. If there are fewer bits available you can only have a fewer number of hosts.
Network bits set to “1”
Host bits set to “0”

A

subnet

27
Q

Addresses are called _ addresses because we can all use them. In routers, We can all use the exact same configurations over and over again without needing to worry about duplicating them. One network can be isolated from another by routers.

they are never forwarded to the public internet

A

private

28
Q

In subnets, Class _ network means 8 bits are used to identify the network. 24 are then available to address your hosts. /8 means that there are eight ones in the subnet mask

A

A

29
Q

In subnets, Class _ 16 bits identify the network leaving 16 to address your host.

A

B

30
Q

In subnet, class _ has the first 24 bits set to 1 to identify the network and only 8 left to address the host

A

C

31
Q

In subnet, Class _ means that you can configure Classless Inter-Domain Routing. You can use any number after the /.
It can be any number between 1 and 32

A

CIDR