Lesson 2 - Hands On IT and Cyber Flashcards
This is to give the learner practical hands on IT and Cyber knowledge.
What is the difference between TCP and UDP, and when should you use each?
TCP is connection-based and ensures data delivery, ideal for reliable communication; UDP is faster and used for real-time applications like streaming.
How do you configure a firewall to allow traffic on a specific port?
Define inbound/outbound rules, specify protocol (TCP/UDP), and allow traffic on the specific port in the firewall settings.
What is the role of a DNS server in a network?
A DNS server translates domain names into IP addresses, allowing users to connect to websites using human-readable addresses.
How do you set up network segmentation for improved security?
Divide the network into smaller segments using VLANs or subnets, and apply access controls between segments to minimize attack surfaces.
What is the principle of least privilege, and how does it apply to system security?
Users and systems should only have the minimum permissions necessary to perform their tasks, reducing the risk of insider threats or compromised accounts.
How do you perform basic network troubleshooting using ping and traceroute?
Ping checks connectivity between devices; traceroute tracks the path data takes to a destination, helping diagnose network issues or bottlenecks.
What is the purpose of using a hypervisor in virtualization?
A hypervisor allows multiple virtual machines (VMs) to run on a single physical server, improving resource utilization and flexibility in system management.
What is the difference between symmetric and asymmetric encryption, and where is each used?
Symmetric encryption uses one key for both encryption and decryption (faster, used for data at rest); asymmetric encryption uses two keys (public/private) and is used in SSL/TLS.
How does multi-factor authentication (MFA) enhance system security?
MFA requires multiple verification methods (e.g., password + a one-time code), making it harder for attackers to gain access with compromised credentials.
How do you create a secure SSH connection to a remote server?
Install an SSH client, generate a key pair (public/private), upload the public key to the server, and connect using SSH with your private key.
How do you implement secure password policies for user accounts?
Enforce complexity requirements (uppercase, lowercase, numbers, symbols), regular password changes, and disallow common passwords across systems.
How does a VPN secure remote access to a network?
A VPN encrypts data transmitted between the user’s device and the network, ensuring confidentiality and integrity of the connection.
What are the common steps for setting up a LAMP stack?
Install Linux, Apache (web server), MySQL (database), and PHP (backend language), then configure each to work together to serve dynamic websites.
What is the role of an IDS (Intrusion Detection System) in network security?
An IDS monitors network traffic for suspicious activities or known attack patterns and alerts administrators of potential breaches.
How do you implement role-based access control (RBAC) in IT systems?
Define roles based on job functions, assign permissions to roles rather than individuals, and regularly review access rights to maintain security.
How does patch management improve system security?
Regularly applying patches and updates fixes vulnerabilities, ensuring that systems are protected against known exploits.
What are the key steps in securing a wireless network?
Use strong encryption (WPA2/WPA3), disable SSID broadcasting, set up MAC filtering, and use a strong administrative password on the router.
How do load balancers enhance the reliability of IT systems?
Load balancers distribute incoming traffic across multiple servers, ensuring no single server is overwhelmed, improving uptime and performance.
What is the purpose of a DMZ in network architecture?
A DMZ isolates external-facing services (web servers) from the internal network, creating an extra layer of security to protect sensitive systems.
How do you configure a RAID array for redundancy?
Choose the appropriate RAID level (e.g., RAID 1 for mirroring or RAID 5 for distributed parity), configure the drives in the RAID controller, and monitor for drive failures.
How does a web application firewall (WAF) protect web servers?
A WAF filters and monitors HTTP traffic to and from a web application, preventing attacks such as SQL injection, cross-site scripting (XSS), and DDoS.
What is the difference between a private key and a public key in asymmetric encryption?
A public key is used to encrypt data and can be shared openly, while the private key is used to decrypt the data and must be kept secret.
How do you secure data at rest on a server?
Use encryption (AES-256 or similar), implement strong access controls, and ensure regular backups are securely stored.
What are the key benefits of using containers in system architecture?
Containers isolate applications, ensuring consistency across environments and enabling efficient resource usage and rapid deployment.
How do you secure API communications in a web service?
Use HTTPS, require API keys or OAuth for authentication, validate inputs to prevent injection attacks, and implement rate limiting to mitigate DDoS attacks.
How do you troubleshoot common DNS issues?
Check for proper DNS server configuration, verify DNS propagation, ensure the DNS cache is cleared, and test using tools like nslookup or dig.
How do you configure logging for security monitoring on Linux servers?
Set up logging with rsyslog or journalctl, configure log rotation with logrotate, and monitor logs for suspicious activity or errors.
How do you harden an operating system against attacks?
Disable unused services, apply security patches, enforce strong passwords, implement firewalls, and regularly audit the system for vulnerabilities.
What is the role of a SIEM (Security Information and Event Management) system?
A SIEM collects, analyzes, and correlates security data from multiple sources, providing real-time alerts and insights to identify potential security threats.
Sharing underlying hardware between virtual machines
Multi-tenancy
What is the term for how you make cloud computing instances larger?
Vertical Scaling