Other Flashcards

1
Q

Group Policy

A

Group Policy is a feature in Microsoft Windows that provides centralized management and configuration of operating systems, applications, and user settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Group Policy - Types

A

Local Group Policy (applies to a single computer) and Active Directory Group Policy (applies to users and computers in an AD domain)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Group Policy - gpupdate Command

A

It refreshes Group Policy settings on a local machine. Using gpupdate /force forces a policy update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Group Policy - Policy Scope

A

A GPO can control settings such as security policies, user environment, software installation, and network settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

STP (Spanning Tree Protocol)

A

STP is used in network switches to prevent loops by blocking redundant paths and ensuring a loop-free topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

STP - Root Bridge

A

The Root Bridge is the central switch in an STP network, which is selected based on the lowest bridge ID (priority and MAC address)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NTFS

A

File Compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

FAT32

A

Compatibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VLAN (Virtual Local Area Network)

A

A VLAN is a logical subgroup within a physical network, created to segment traffic for security, performance, or management purposes. A switch can be configured to support multiple VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PoE (Power over Ethernet)

A

PoE is a technology that allows Ethernet cables to deliver both data and electrical power to network devices like IP cameras or VoIP phones, simplifying network infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Least Privilege - Role-Based Access Control (RBAC)

A

RBAC assigns permissions based on user roles, ensuring that users have only the permissions necessary for their duties, which minimizes exposure to sensitive data and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privilege Escalation

A

Privilege escalation is when a user gains higher access rights than they are authorized for. It directly contradicts the principle of least privilege and can lead to unauthorized actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

History Command - Searching History (linux)

A

You can use history | grep [search_term] to search your command history for a specific term, making it easy to find previously executed commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

History Command - Command Repetition (linux)

A

You can repeat the last command by typing !! or by using Ctrl + P to scroll backward in the history

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cached Credentials - Logoff Scenario

A

What happens when a user logs off and their laptop is offline but has cached credentials?
A: If the laptop is offline, the system will authenticate the user using the cached credentials, allowing the user to log in even without a network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Clearing Cached Credentials

A

Cached credentials can be cleared by going to “Credential Manager” in the Control Panel and removing the saved credentials for networked services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SNMP Security

A

SNMP can be secured by using SNMPv3, which includes authentication and encryption. Avoid using SNMPv1 and v2c as they lack security features

18
Q

SNMP MIB (Management Information Base)

A

A MIB is a database that contains definitions of all objects that can be monitored via SNMP. It provides a structured framework for SNMP-managed objects like device stats or settings

19
Q

DNS Cache

A

A DNS cache stores recently accessed domain names and their corresponding IP addresses to speed up future requests, reducing the time needed to resolve domain names

20
Q

IP Address Subnetting

A

Subnetting divides a large network into smaller subnets, making it easier to manage traffic and allocate IP addresses efficiently

21
Q

DNS Spoofing

A

DNS spoofing is a type of cyberattack where false DNS records are inserted into a DNS resolver’s cache, redirecting traffic to malicious websites

22
Q

DHCP Leases

A

A DHCP lease is the time period for which an IP address is assigned to a device by a DHCP server. Once the lease expires, the device must request a new IP address

23
Q

ICMP (Internet Control Message Protocol)

A

ICMP is used for sending control messages, such as error reports and status updates (e.g., ping or tracert), to help manage network traffic and troubleshoot network issues

24
Q

Proxy Server

A

A proxy server acts as an intermediary between a user and the internet, filtering requests, providing anonymity, and sometimes caching data for improved performance

25
Q

TTL (Time to Live)

A

TTL is a value in a packet header that determines how many hops the packet can make before being discarded. It prevents packets from circulating indefinitely in a network

26
Q

DNS (Domain Name System)

A

DNS is a system that translates domain names (like www.example.com) into IP addresses, allowing users to access websites using easy-to-remember names instead of numeric IPs

27
Q

VPN (Virtual Private Network)

A

A VPN creates a secure, encrypted connection over the internet, allowing users to send data securely and bypass regional restrictions or censorship

28
Q

APIPA (Automatic Private IP Addressing)

A

APIPA is a feature in Windows that automatically assigns an IP address (169.254.x.x) to a device when it fails to obtain one from a DHCP server

29
Q

DHCP (Dynamic Host Configuration Protocol)

A

DHCP automatically assigns IP addresses to devices on a network, simplifying IP address management and reducing configuration errors

30
Q

ARP (Address Resolution Protocol)

A

ARP is a protocol used to map an IP address to its corresponding MAC address, enabling devices to communicate within a local network

31
Q

TCP vs UDP

A

TCP (Transmission Control Protocol) is connection-oriented, providing reliable delivery, while UDP (User Datagram Protocol) is connectionless, offering faster but unreliable delivery

32
Q

NAT (Network Address Translation)

A

NAT is a technique used to modify the IP address information in packet headers while routing them, typically for internal IP addresses to communicate with external networks

33
Q

BGP (Border Gateway Protocol)

A

BGP is a routing protocol used to exchange routing information between different networks (Autonomous Systems) on the internet

34
Q

Network Switch

A

A network switch is a device that connects multiple devices within a local area network (LAN) and uses MAC addresses to forward data only to the intended recipient

35
Q

MAC Address vs IP Address

A

A MAC address is a unique hardware identifier assigned to a network interface card (NIC), whereas an IP address is a logical address used to identify a device on a network

36
Q

NTFS (New Technology File System)

A

More modern, supports large files, file encryption, permissions, and journaling. It is more secure and reliable than FAT32

37
Q

FAT32 (File Allocation Table 32)

A

Older file system, supports smaller file sizes (up to 4GB), and is compatible with many devices but lacks security features

38
Q

Principle of Least Privilege

A

The principle of least privilege ensures that users and systems have only the minimum level of access required to perform their tasks, reducing the potential damage from accidental or malicious actions

39
Q

Linux History Command

A

The history command displays a list of previously executed commands, allowing users to quickly repeat commands or review past actions

40
Q

Cached Credentials

A

Cached credentials are locally stored login credentials on a device, allowing a user to log in to their computer even when the network is unavailable

41
Q

Logging into Laptop with Cached Credentials

A

Cached credentials allow users to log into their laptop even when disconnected from the network, as the login information is saved locally