Lesson 2 - Hands On IT and Cyber Flashcards
This is to give the learner practical hands on IT and Cyber knowledge.
What is the difference between TCP and UDP, and when should you use each?
TCP is connection-based and ensures data delivery, ideal for reliable communication; UDP is faster and used for real-time applications like streaming.
How do you configure a firewall to allow traffic on a specific port?
Define inbound/outbound rules, specify protocol (TCP/UDP), and allow traffic on the specific port in the firewall settings.
What is the role of a DNS server in a network?
A DNS server translates domain names into IP addresses, allowing users to connect to websites using human-readable addresses.
How do you set up network segmentation for improved security?
Divide the network into smaller segments using VLANs or subnets, and apply access controls between segments to minimize attack surfaces.
What is the principle of least privilege, and how does it apply to system security?
Users and systems should only have the minimum permissions necessary to perform their tasks, reducing the risk of insider threats or compromised accounts.
How do you perform basic network troubleshooting using ping and traceroute?
Ping checks connectivity between devices; traceroute tracks the path data takes to a destination, helping diagnose network issues or bottlenecks.
What is the purpose of using a hypervisor in virtualization?
A hypervisor allows multiple virtual machines (VMs) to run on a single physical server, improving resource utilization and flexibility in system management.
What is the difference between symmetric and asymmetric encryption, and where is each used?
Symmetric encryption uses one key for both encryption and decryption (faster, used for data at rest); asymmetric encryption uses two keys (public/private) and is used in SSL/TLS.
How does multi-factor authentication (MFA) enhance system security?
MFA requires multiple verification methods (e.g., password + a one-time code), making it harder for attackers to gain access with compromised credentials.
How do you create a secure SSH connection to a remote server?
Install an SSH client, generate a key pair (public/private), upload the public key to the server, and connect using SSH with your private key.
How do you implement secure password policies for user accounts?
Enforce complexity requirements (uppercase, lowercase, numbers, symbols), regular password changes, and disallow common passwords across systems.
How does a VPN secure remote access to a network?
A VPN encrypts data transmitted between the user’s device and the network, ensuring confidentiality and integrity of the connection.
What are the common steps for setting up a LAMP stack?
Install Linux, Apache (web server), MySQL (database), and PHP (backend language), then configure each to work together to serve dynamic websites.
What is the role of an IDS (Intrusion Detection System) in network security?
An IDS monitors network traffic for suspicious activities or known attack patterns and alerts administrators of potential breaches.
How do you implement role-based access control (RBAC) in IT systems?
Define roles based on job functions, assign permissions to roles rather than individuals, and regularly review access rights to maintain security.