Other Flashcards
Group Policy
Group Policy is a feature in Microsoft Windows that provides centralized management and configuration of operating systems, applications, and user settings
Group Policy - Types
Local Group Policy (applies to a single computer) and Active Directory Group Policy (applies to users and computers in an AD domain)
Group Policy - gpupdate Command
It refreshes Group Policy settings on a local machine. Using gpupdate /force forces a policy update
Group Policy - Policy Scope
A GPO can control settings such as security policies, user environment, software installation, and network settings
STP (Spanning Tree Protocol)
STP is used in network switches to prevent loops by blocking redundant paths and ensuring a loop-free topology
STP - Root Bridge
The Root Bridge is the central switch in an STP network, which is selected based on the lowest bridge ID (priority and MAC address)
NTFS
File Compression
FAT32
Compatibility
VLAN (Virtual Local Area Network)
A VLAN is a logical subgroup within a physical network, created to segment traffic for security, performance, or management purposes. A switch can be configured to support multiple VLANs
PoE (Power over Ethernet)
PoE is a technology that allows Ethernet cables to deliver both data and electrical power to network devices like IP cameras or VoIP phones, simplifying network infrastructure
Least Privilege - Role-Based Access Control (RBAC)
RBAC assigns permissions based on user roles, ensuring that users have only the permissions necessary for their duties, which minimizes exposure to sensitive data and resources
Privilege Escalation
Privilege escalation is when a user gains higher access rights than they are authorized for. It directly contradicts the principle of least privilege and can lead to unauthorized actions
History Command - Searching History (linux)
You can use history | grep [search_term] to search your command history for a specific term, making it easy to find previously executed commands
History Command - Command Repetition (linux)
You can repeat the last command by typing !! or by using Ctrl + P to scroll backward in the history
Cached Credentials - Logoff Scenario
What happens when a user logs off and their laptop is offline but has cached credentials?
A: If the laptop is offline, the system will authenticate the user using the cached credentials, allowing the user to log in even without a network connection
Clearing Cached Credentials
Cached credentials can be cleared by going to “Credential Manager” in the Control Panel and removing the saved credentials for networked services
SNMP Security
SNMP can be secured by using SNMPv3, which includes authentication and encryption. Avoid using SNMPv1 and v2c as they lack security features
SNMP MIB (Management Information Base)
A MIB is a database that contains definitions of all objects that can be monitored via SNMP. It provides a structured framework for SNMP-managed objects like device stats or settings
DNS Cache
A DNS cache stores recently accessed domain names and their corresponding IP addresses to speed up future requests, reducing the time needed to resolve domain names
IP Address Subnetting
Subnetting divides a large network into smaller subnets, making it easier to manage traffic and allocate IP addresses efficiently
DNS Spoofing
DNS spoofing is a type of cyberattack where false DNS records are inserted into a DNS resolver’s cache, redirecting traffic to malicious websites
DHCP Leases
A DHCP lease is the time period for which an IP address is assigned to a device by a DHCP server. Once the lease expires, the device must request a new IP address
ICMP (Internet Control Message Protocol)
ICMP is used for sending control messages, such as error reports and status updates (e.g., ping or tracert), to help manage network traffic and troubleshoot network issues
Proxy Server
A proxy server acts as an intermediary between a user and the internet, filtering requests, providing anonymity, and sometimes caching data for improved performance
TTL (Time to Live)
TTL is a value in a packet header that determines how many hops the packet can make before being discarded. It prevents packets from circulating indefinitely in a network
DNS (Domain Name System)
DNS is a system that translates domain names (like www.example.com) into IP addresses, allowing users to access websites using easy-to-remember names instead of numeric IPs
VPN (Virtual Private Network)
A VPN creates a secure, encrypted connection over the internet, allowing users to send data securely and bypass regional restrictions or censorship
APIPA (Automatic Private IP Addressing)
APIPA is a feature in Windows that automatically assigns an IP address (169.254.x.x) to a device when it fails to obtain one from a DHCP server
DHCP (Dynamic Host Configuration Protocol)
DHCP automatically assigns IP addresses to devices on a network, simplifying IP address management and reducing configuration errors
ARP (Address Resolution Protocol)
ARP is a protocol used to map an IP address to its corresponding MAC address, enabling devices to communicate within a local network
TCP vs UDP
TCP (Transmission Control Protocol) is connection-oriented, providing reliable delivery, while UDP (User Datagram Protocol) is connectionless, offering faster but unreliable delivery
NAT (Network Address Translation)
NAT is a technique used to modify the IP address information in packet headers while routing them, typically for internal IP addresses to communicate with external networks
BGP (Border Gateway Protocol)
BGP is a routing protocol used to exchange routing information between different networks (Autonomous Systems) on the internet
Network Switch
A network switch is a device that connects multiple devices within a local area network (LAN) and uses MAC addresses to forward data only to the intended recipient
MAC Address vs IP Address
A MAC address is a unique hardware identifier assigned to a network interface card (NIC), whereas an IP address is a logical address used to identify a device on a network
NTFS (New Technology File System)
More modern, supports large files, file encryption, permissions, and journaling. It is more secure and reliable than FAT32
FAT32 (File Allocation Table 32)
Older file system, supports smaller file sizes (up to 4GB), and is compatible with many devices but lacks security features
Principle of Least Privilege
The principle of least privilege ensures that users and systems have only the minimum level of access required to perform their tasks, reducing the potential damage from accidental or malicious actions
Linux History Command
The history command displays a list of previously executed commands, allowing users to quickly repeat commands or review past actions
Cached Credentials
Cached credentials are locally stored login credentials on a device, allowing a user to log in to their computer even when the network is unavailable
Logging into Laptop with Cached Credentials
Cached credentials allow users to log into their laptop even when disconnected from the network, as the login information is saved locally