Infrastructure Domain Flashcards

1
Q

I: WINDOWS COMMANDS

A
tasklist 
taskkill 
chckdsk
ipconfig 
netstat 
ping 
tracert 
nslookup
diskpart 
fsutil 
procexplorer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

I: LINUX COMMANDS

A
grep 
chmod
passwd 
whoami 
shutdown
ls
cd
mv 
mkdir 
rmdir 
cat /proc/mounts or mounts -l 
ps -aux 
df or du 
top or ps
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

I: LINUX TROUBLESHOOTING

A
lsof – list open files
pidstat – tasked managed by kernel
top – system info
ps – process status
tcpdump – capture network packets
iostat – input-output stats
ldd – list dynamic dependencies
nestat – network stats
free – avail memory
sar – system activity report
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

I: LINUX KERNAL

A

The Linux® kernel is the main component of a Linux operating system (OS) and is the core interface between a computer’s hardware and its processes. It communicates between the 2, managing resources as efficiently as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

I: LINUX BOOT PROCESS

A

Boot loader finds the kernel image on the disk and loads it into memory, to start the system.
The kernel initializes the devices and their drivers.
The kernel mounts the basis filesystem.
The kernel starts a program referred to as init
init sets the remainder of the system processes in motion.
init starts a method permitting you to log in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

I: WINDOWS SLOWNESS

A
Try the Performance troubleshooter.
Delete programs you never use.
Limit how many programs run at startup.
Clean up your hard disk.
Run fewer programs at the same time.
Turn off visual effects.
Restart regularly.
Change the size of virtual memory.
Paging/Swapping
Power Settings
Resource Monitor
Process Explorer, WinDirStat, Sysinternals Suite, Malwarebytes,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

I: WEBSITE ACCESS TROUBLESHOOTING

A

Ping

Tracert

Try a different web browser or the same browser in private browsing mode

Check if security software on your device blocks access to the site

Open the Developer Tools of your browser, usually with F12, and switch to the network tab

Reload the site in question and check if you get errors there

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

I: WEBSITE SLOW TROUBLESHOOTING

A

You’re Not Using a Content Delivery Network (CDN)

There’s Excessive Overhead in Your Database

Caching Issues Are Preventing Optimized Page Loading

Large Media Files Are Increasing Loading Times

Poorly Written Scripts Are Conflicting with Other Site Elements,

Your Site’s Code Is Too Bulky

Missing Files Are Causing Errors

Plugins Are Weighing Your Site Down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

I: EXTREME TRAFFIC

A

reduce server load by moving image and video to a CDN solution

adding more read replicas

introducing queue to process the asynchronous message

Introduce a more robust caching engine you can use caching

redis to reduce write requests

Scale your server if there are still issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

I: MONITORING TOOLS

A

Tools – AWS CloudWatch, SolarWinds, Nagios, OpsRamp, Kesaya, etc.

Host-Based 
cpu
memory
disk space
processes
Applications 
error/success rates
service failures and restarts
performance and latency of responses
resource usage
Network 
connectivity
error rates and packet loss
latency
bandwidth utilization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

I: SWAPPING

A

A process can be swapped temporarily out of memory to a backing store and then again brought back into the memory to complete its execution. Swapping is done so that other processes get memory for their execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

I: LAMP

A

Linux: The operating system (OS) makes up our first layer

Apache: The second layer consists of web server software, typically Apache Web Server

MySQL: Our third layer is where databases live

PHP: The scripting layer consists of PHP and/or other similar web programming languages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

I: 3-TIER WEB APP

A

Presentation tier is deployed to a computing device through a web browser or a web-based application

Application tier the application tier (logic tier) is written in a programming language such as Java and contains the business logic that supports the application’s core functions.

Data tier the data tier consists of a database and a program for managing read and write access to a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

I: FAULT TOLERANCE

A

is a form of full hardware redundancy.

Two (or more) systems operate in tandem, mirroring identical applications and executing instructions in lock step with one another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

I: BASTION

A

Bastion Host treated with special security considerations and connects to a secure zone, but it sits outside of your network security zone. The bastion host is intended to provide access to a private network from external networks such as the public internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

I: CLUSTER COMPUTING

A

Cluster computing is the process of sharing the computation tasks among multiple computers and those computers or machines form the cluster.

17
Q

I: PUPPET

A

Puppet – is a Configuration Management tool that is used for deploying, configuring and managing servers.

18
Q

I: CHEF

A

is an automation tool that provides a way to define infrastructure as code.

19
Q

I: GPU

A

GPUs – is a processor that is specially designed to handle intensive graphics rendering tasks, are most commonly used to drive high-quality gaming experiences, producing life-like digital graphics.

20
Q

I: SECURE ACCESS

A

Secure remote access is not a single technology, but rather a collection of technologies that together provide the security that organizations need when users are working from home or other remote locations. They include:

Endpoint Security 
Virtual Private Network (VPN) 
Zero Trust Network Access (ZTNA) 
Network access control (NAC) 
Single sign-on (SSO)
21
Q

I: SERVER HARDENING

A

Server hardening best practices

All servers should be established in a secure datacenter
Harden servers before connecting them to the internet or external networks
Avoid installing unnecessary software on a server
Compartmentalize servers with security in mind
Use the principle of least privilege when setting up superuser and administrative roles

22
Q

I: PAGING

A

occurs when some part of process is transferred to disk

23
Q

I: DISASTER RECOVERY

A

Disaster Recovery (DR) refers to the set of policies and procedures in place to ensure the continuity and recovery of mission critical systems in the event of a disruptive event such as a power outage, flood, or cyberattack

24
Q

I: JUMP SERVER

A

is sometimes called a “pivot server” for this reason: once you are logged in, you can “pivot” to the other servers. It is usually security hardened and treated as the single entryway to a server group from within your security zone, or inside the overall network.

25
Q

I: OS HARDENING

A

Use a patch management tool to apply OS updates and patches automatically

Remove unnecessary drivers, software, and services

Encrypt local storage

Limit registry and other systems permissions

Log appropriate activity, errors, and warnings