Newer stuff Flashcards
What is nslookup and dig used for
looking up info from DNS servers
netstat -a
-a parameter will show all ports but will not show process names or per-protocol statistics.
netstat -b
-b shows the process name that opened the port
netstat -s
-s shows statistic for each protocol.
netstat -r
-r shows the routing table
netstat -e
-e shows ethernet/interface statistics
Name 2 types of type 1 hyper visors
VMWare ESX Server and Microsoft Hyper-V
3 Network Components used in a hybrid cloud deployment
Private Link MPLS VLAN
reciprocal arrangement
A reciprocal arrangement is a mutually-beneficial agreement between two companies to provide the other with agreed-upon aid in the case of disaster or failure
A service level agreement (SLA)
a contractual agreement setting out the detailed terms under which an ongoing service is provided, such as scope, quality, and responsibilities that are agreed upon between the service provider(s) and the customer.
A business continuity plan (BCP)
a collection of processes that enable an organization to maintain normal business operations in the face of some adverse event.
A continuity of operations plan (COOP)
collection of processes that enable an organization to maintain normal business operations in the face of some adverse event.
Protocols that can be used to remotely manage system or network devices
HTTP HTTPS Telnet SSH
True or false wireless AP’s are layer 2 devices
True
Name 2 VOIP End Points
Computer and Smartphone
A Voice over Internet Protocol (VoIP) endpoint can be implemented as software running on a computer or smartphone, or as a dedicated traditional hardware handset. For smartphones, many VoIP vendors provide installable applications.
2 cellular technologies required for international Travel
TDMA and GSM
CNAME Canonical Name records
Is Used to represent an alias for a host
NS Name Server records
records identify authoritative DNS name servers for the zone
MX Mail Exchange record
is used to identify and email server for the domain
SOA Start Of Authority record
identifies the primary DNS name server that is authoritative for the zone and is responsible for resolving names
A record
Is used to resolve a host name to an IPv4 Address
AAAA record
resolves a host name to a IPv6 Address
SRV record
Used to identify a record that is providing a network service or protocol
PTR record
is found in reverse lookup zones and is used to resolve an ip address to a host name
TXT Record
a TXT record is used to store any free-form text that may be needed to support other network services
EAP-TLS
EAP-TLS, as both supplicant and server are configured with certificates, this provides mutual authentication.
PEAP
PEAP only requires a server-side public key certificate. The supplicant does not require a certificate.
EAP-FAST
(EAP-FAST) uses a Protected Access Credential (PAC) to set up the tunnel, which is generated for each user from the authentication server’s master key.
CHAP
Challenge Handshake Authentication Protocol (CHAP) is an authentication scheme developed for dial-up networks that uses an encrypted three-way handshake to authenticate the client to the server.
Host-to-Host Layer
Transport
White Box Test
The tester has detailed information about the target system prior to starting the test.
Grey Box Test
The tester has the same amount of information that would be available to a typical insider in the organization.
Black Box Test
The tester has no prior knowledge of the system
Singe Blind Test
Either the attacker has prior knowledge about the target system or the administrator knows that the test is being performed
Double Blind Test
The tester does not have prior information about the system, and the administrator has no knowledge that the test is being performed
Independent access point architecture
In the early days of wireless networking, large organizations implemented independent access points throughout their facilities. Each AP stood alone, providing separate wireless networks using its own independent configuration. (Intelligent AP)
Hub-and-Spoke Infrastructure
In a hub-and-spoke configuration, a wireless controller is connected to all access points using wired links. The individual access points contain very little embedded intelligence and are sometimes referred to as lightweight access points (Lightweight AP).
Distributed Wireless Mesh Infrastructure
Newer wireless networks can be deployed using a distributed wireless mesh architecture. These networks still use a controller, but they move some of the network intelligence from the controller out to the individual access points. In this configuration, the controller is no longer a bottleneck. The APs are smart enough to communicate directly with each other to create more efficient data paths for network traffic (Intelligent AP)
Pharming
Stealing Credentials