General Knowledge Flashcards
nslookup
Command Line Tool used to query DNS. Map an IP address to a Domain name.
*obtain Domain Names
*IP address mapping details
*DNS records
Dig
Linux Command Line Tool similar to NSlookup
nmap
Command Line Tool used to analyze the Network for all open/ closed ports.
Active Directory
Active Directory (AD) is Microsoft’s proprietary directory service. It runs on Windows Server and enables administrators to manage permissions and access to network resources. Active Directory stores data as objects. A centralized Database.
Objects:
*Resources (Printers)
*Users (Groups)
*Computers
Domain Services (AD)
Active Directory Domain Services (AD DS). This is the main service of AD which stores directory information and handles the interaction of the User with the Domain. It controls which users have access to each resource or Group Policy.
Domain Controller
A domain controller is a SERVER that responds to authentication requests and verifies users on computer networks. The primary function of domain controllers is to authenticate and validate users on a network, including group policies, user credentials, and computer names to determine and validate user access. A domain controller, is simply a server running Active Directory that authenticates users and devices. Multiple domain controllers can be deployed within a domain to provide fault tolerance and load balancing.
*OS (Windows or Linux)
*LDAP
*Network Time Service (NTP)
*Network Authentication Protocol (Kerberos)
DNS
Domain Name System. The Phonebook of the Internet that connects Web Browsers with Website. Humans access information online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources.
NTP
Network Time Protocol. An internet protocol used to synchronize with computer clock time sources in a network. It belongs to and is one of the oldest parts of the TCP/IP suite.
NTPD
Network Time Protocol Daemon. An Operating System Program that maintains the System Time in synchronization with Time Servers using the NTP.
Group Policy
Group Policy is a feature of Active Directory that allows administrators to define and enforce settings and configurations for users and computers within a domain. Group Policy settings can control security policies, software deployment, desktop configurations, and more.
Virtual Machine
A virtual machine (VM) is a digital version of a physical computer. Virtual machine software can run programs and operating systems, store data, connect to networks, and do other computing functions, and requires maintenance such as updates and system monitoring. The only difference is that it resides inside a computer. There can be multiple virtual machines that reside inside one physical computer.
Hypervisor
Also known as a Virtual Machine Monitor (VMM) - is a software that creates and runs the virtualization. It allows multiple operating systems (OS) to run simultaneously on the same hardware, each within its own isolated virtual environment.
Type 1 (Bare Metal) - runs directly on the Physical Hardware of the Host system.
Type 2 (Hosted) - runs on top of an existing OS, known as the Host OS.
Hypervisors play a crucial role in virtualization technology, enabling organizations to achieve better resource utilization, scalability, flexibility, and cost savings by consolidating multiple workloads onto a single physical server infrastructure. They are widely used in data centers, cloud computing environments, and desktop virtualization solutions.
Email Flow
1 - Bob composes Message via Email Client
2 - Sends Email
3 - Client connects to Email Server (SMTP)Data is routed through Network Connection
4 - SMTP receives Email and relays data to Recipient Email server
5 - Susan email server receives Email data and processes spam filtering, virus scanning, recipient validation
6 - Email is delivered to mailbox or mail queue
7 - Email client downloads Email from Server
8 - Susan reads Email message
Risk Tolerance
Risk tolerance refers to an individual’s or entity’s willingness and ability to endure fluctuations in the value of their investments or to accept the potential loss of capital in pursuit of higher returns.
Risk tolerance refers to the general level of risk the firm is WILLING TO ACCEPT, not the precise financial impact threshold for action.
Encryption Algorithm
An encryption algorithm provides a structured method for converting plaintext into ciphertext. A good algorithm ensures data remains confidential and secure from unauthorized access.
*Confidential
Digital Signatures
Digital signatures validate the authenticity and integrity of a message or document, ensuring it hasn’t been tampered with since being signed.
*Integrity
Cipher Block
Refers to a fixed-size portion of data that an encryption algorithm processes. (Encryption Algorithm)