Test SYS-601 Flashcards
Scalability (Scaling out)
-Scalability is the capacity to increase resources to meet demand within similar cost ratios. Scaling out adds more resources in parallel to a system. Adding an additional CPU is an example of scaling out.
-Scalability means that if service demand doubles, costs do not more than double. Adding more resources such as RAM is an example of scaling out.
Scalability (Scaling Up)
-Giving important processes higher priority in a system is not scaling out, but more so scaling up. Scaling up is done by increasing existing resources.
-Freeing up CPU resources in a system by eliminating services is not scaling out, but more so scaling up. Scaling up is done by increasing existing resources.
What is the file
%SystemRoot%\System32\Drivers\etc\hosts
responsible for?
the file responsible for mapping IP addresses to domain names in Windows. It does not store passwords. The HOSTS file existed long before Domain Name System (DNS), and while all name resolution now functions through DNS, the HOSTS file is still present, and most operating systems check it before using DNS.
%SystemRoot%\System32\config\SAM
is where local users and passwords are stored as part of the Registry (Security Account Manager) on Windows machines.
/etc/passwd
- is where user account details and encrypted passwords are stored on Linux (on older systems), but this file is universally accessible.
-Consequently, passwords are moved to /etc/shadow, which is only readable by the root user on Linux.
What does the ARP cache show
The ARP cache shows the MAC address of the interface associated with each IP address the local host has communicated with recently.
What does ipconfig show
-Windows ipconfig shows the configuration assigned to network interface(s), including the hardware or media access control (MAC) address, IPv4 and IPv6 addresses.
-ipconfig shows whether the IP address is static or assigned by DHCP. If the address is DHCP-assigned, the output also shows the address of the DHCP server that provided the lease.
What is Ping used for
The admin can use the ping command to probe a host on a particular IP address or host name using the Internet Control Message Protocol (ICMP).
What does asymmetric encryption proves
Asymmetric encryption is ideal for proving identity, but it requires significant computing overhead and is inefficient for bulk encryption.
What are the drawback’s of asymmetric encryption
The drawback of asymmetric encryption is that it involves substantial computing overhead compared to symmetric encryption.
Symmetric encryption
Symmetric encryption is very fast. It is used for bulk encryption of large amounts of data. The main problem is secure key distribution and storage.
Stream cipher
In a stream cipher, each byte or bit of data in the plaintext is encrypted one at a time. This is suitable for encrypting communications where the total length of the message is not known.
Endpoint detection and response (EDR)
the product is to provide real-time and historical visibility into the compromise, contain the malware within a single host, and facilitate remediation of the host to its original state.
aims to provide enhanced protection, visibility, and control over endpoints
Next-generation endpoint
Next generation endpoint agents use cloud management, rather than reporting to an on-remises server;
Next-generation endpoint detection systems use artificial intelligence (AI) and machine learning to perform user and entity behavior analysis (UEBA)
What does Ba seline deviation reporting mean?
it means testing the actual configuration of hosts to ensure that their configuration settings match the baseline template.