Lesson 2 - Hands On IT and Cyber Flashcards

This is to give the learner practical hands on IT and Cyber knowledge.

1
Q

What is the difference between TCP and UDP, and when should you use each?

A

TCP is connection-based and ensures data delivery, ideal for reliable communication; UDP is faster and used for real-time applications like streaming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you configure a firewall to allow traffic on a specific port?

A

Define inbound/outbound rules, specify protocol (TCP/UDP), and allow traffic on the specific port in the firewall settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the role of a DNS server in a network?

A

A DNS server translates domain names into IP addresses, allowing users to connect to websites using human-readable addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do you set up network segmentation for improved security?

A

Divide the network into smaller segments using VLANs or subnets, and apply access controls between segments to minimize attack surfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the principle of least privilege, and how does it apply to system security?

A

Users and systems should only have the minimum permissions necessary to perform their tasks, reducing the risk of insider threats or compromised accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How do you perform basic network troubleshooting using ping and traceroute?

A

Ping checks connectivity between devices; traceroute tracks the path data takes to a destination, helping diagnose network issues or bottlenecks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of using a hypervisor in virtualization?

A

A hypervisor allows multiple virtual machines (VMs) to run on a single physical server, improving resource utilization and flexibility in system management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between symmetric and asymmetric encryption, and where is each used?

A

Symmetric encryption uses one key for both encryption and decryption (faster, used for data at rest); asymmetric encryption uses two keys (public/private) and is used in SSL/TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does multi-factor authentication (MFA) enhance system security?

A

MFA requires multiple verification methods (e.g., password + a one-time code), making it harder for attackers to gain access with compromised credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you create a secure SSH connection to a remote server?

A

Install an SSH client, generate a key pair (public/private), upload the public key to the server, and connect using SSH with your private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you implement secure password policies for user accounts?

A

Enforce complexity requirements (uppercase, lowercase, numbers, symbols), regular password changes, and disallow common passwords across systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a VPN secure remote access to a network?

A

A VPN encrypts data transmitted between the user’s device and the network, ensuring confidentiality and integrity of the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the common steps for setting up a LAMP stack?

A

Install Linux, Apache (web server), MySQL (database), and PHP (backend language), then configure each to work together to serve dynamic websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the role of an IDS (Intrusion Detection System) in network security?

A

An IDS monitors network traffic for suspicious activities or known attack patterns and alerts administrators of potential breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do you implement role-based access control (RBAC) in IT systems?

A

Define roles based on job functions, assign permissions to roles rather than individuals, and regularly review access rights to maintain security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does patch management improve system security?

A

Regularly applying patches and updates fixes vulnerabilities, ensuring that systems are protected against known exploits.

17
Q

What are the key steps in securing a wireless network?

A

Use strong encryption (WPA2/WPA3), disable SSID broadcasting, set up MAC filtering, and use a strong administrative password on the router.

18
Q

How do load balancers enhance the reliability of IT systems?

A

Load balancers distribute incoming traffic across multiple servers, ensuring no single server is overwhelmed, improving uptime and performance.

19
Q

What is the purpose of a DMZ in network architecture?

A

A DMZ isolates external-facing services (web servers) from the internal network, creating an extra layer of security to protect sensitive systems.

20
Q

How do you configure a RAID array for redundancy?

A

Choose the appropriate RAID level (e.g., RAID 1 for mirroring or RAID 5 for distributed parity), configure the drives in the RAID controller, and monitor for drive failures.

21
Q

How does a web application firewall (WAF) protect web servers?

A

A WAF filters and monitors HTTP traffic to and from a web application, preventing attacks such as SQL injection, cross-site scripting (XSS), and DDoS.

22
Q

What is the difference between a private key and a public key in asymmetric encryption?

A

A public key is used to encrypt data and can be shared openly, while the private key is used to decrypt the data and must be kept secret.

23
Q

How do you secure data at rest on a server?

A

Use encryption (AES-256 or similar), implement strong access controls, and ensure regular backups are securely stored.

24
Q

What are the key benefits of using containers in system architecture?

A

Containers isolate applications, ensuring consistency across environments and enabling efficient resource usage and rapid deployment.

25
Q

How do you secure API communications in a web service?

A

Use HTTPS, require API keys or OAuth for authentication, validate inputs to prevent injection attacks, and implement rate limiting to mitigate DDoS attacks.

26
Q

How do you troubleshoot common DNS issues?

A

Check for proper DNS server configuration, verify DNS propagation, ensure the DNS cache is cleared, and test using tools like nslookup or dig.

27
Q

How do you configure logging for security monitoring on Linux servers?

A

Set up logging with rsyslog or journalctl, configure log rotation with logrotate, and monitor logs for suspicious activity or errors.

28
Q

How do you harden an operating system against attacks?

A

Disable unused services, apply security patches, enforce strong passwords, implement firewalls, and regularly audit the system for vulnerabilities.

29
Q

What is the role of a SIEM (Security Information and Event Management) system?

A

A SIEM collects, analyzes, and correlates security data from multiple sources, providing real-time alerts and insights to identify potential security threats.

30
Q

Sharing underlying hardware between virtual machines

A

Multi-tenancy

31
Q

What is the term for how you make cloud computing instances larger?

A

Vertical Scaling