TripAdvisor RD 3 Flashcards

1
Q

What does the OSI model stand for?

A

Open Systems Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which layer of the OSI model is responsible for routing data between networks?

A

Network Layer (Layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does TCP stand for in networking?

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of DHCP in networking?

A

Assigns IP addresses automatically to devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the OSI model, which layer deals with MAC addresses and switches?

A

Data Link Layer (Layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main function of the Physical Layer in the OSI model?

A

Handles the physical connection between devices (cables, signals)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does DNS do in a network?

A

Translates domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol is used for securing communication over the internet?

A

HTTPS (Hypertext Transfer Protocol Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is NAT in networking?

A

Network Address Translation – translates private IPs to public IPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does VLAN stand for in networking?

A

Virtual Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of the default gateway in a network?

A

Directs traffic from the local network to external networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which network tool shows the path packets take to reach a destination?

A

Tracert (Windows) / Traceroute (Linux/macOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does UDP stand for, and what is it used for?

A

User Datagram Protocol – used for faster, less reliable communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does IP stand for, and what does it handle?

A

Internet Protocol – handles routing and addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the key responsibilities of a network router?

A

Forwards data between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between TCP and UDP?

A

TCP is reliable with error correction; UDP is faster but less reliable. TCP is connection-orientated while UDP is connection-less.

UDP - Gaming, Video Streaming
TCP - Web Browsing, file transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a firewall’s primary function in a network?

A

Monitors and controls incoming and outgoing network traffic based on security rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does IPv4 stand for?

A

Internet Protocol version 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is CIDR notation used for in networking?

A

Defines the size of a network (e.g., 192.168.1.0/24)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which OSI layer manages sessions between applications?

A

Session Layer (Layer 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does ARP work in a network?

A

Resolves IP addresses to MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of port 443 in networking?

A

Secure web traffic (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What network issue does Spanning Tree Protocol (STP) prevent?

A

Network loops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a subnet in IP networking?

A

A segmented portion of a larger network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the key role of the Transport Layer in the OSI model?

A

Ensures reliable data transmission (handles ports, error correction)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the difference between a switch and a router in networking?

A

A switch connects devices within a local network, while a router connects different networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does DNS stand for, and what is its primary function?

A

Domain Name System – translates domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is multicast in networking?

A

Sends data to multiple recipients who subscribe to a group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What does a ‘broadcast’ mean in a network context?

A

Data sent to all devices on a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the purpose of VLAN tagging in networking?

A

Identifies and separates network traffic within a VLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What does an IP address conflict mean in networking?

A

Two devices on a network are assigned the same IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How does a ping command help in network troubleshooting?

A

Tests connectivity between two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the role of an access point (AP) in a network?

A

Provides Wi-Fi connectivity to wireless devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What does RDP stand for, and what is it used for?

A

Remote Desktop Protocol – allows remote access to Windows desktops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a ‘subnet mask’ used for in networking?

A

Determines the network portion of an IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the function of the Presentation Layer in the OSI model?

A

Translates data between the application and lower layers (handles encryption, compression) (Layer 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What does ICMP stand for, and what is it used for?

A

Internet Control Message Protocol – used for network diagnostics (e.g., ping)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is a ‘loopback address’ in IP networking?

A

127.0.0.1 – a special IP address that is used to test network functionality on a local machine. It points back to itself so you can do things like localhost hosting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What network tool provides detailed information about a device’s network configuration?

A

Ipconfig (Windows) / Ifconfig (Linux/macOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is Wireshark used for in networking?

A

Captures and analyzes network traffic at the packet level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is port forwarding in networking?

A

Directs external traffic to a specific device or service on a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What does an Ethernet switch do in a network?

A

Connects devices within a LAN and forwards data to the correct destination based on MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What does BGP stand for, and what does it handle?

A

Border Gateway Protocol – handles routing between autonomous systems on the internet by defining and publishing paths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How does DNS caching improve network performance?

A

Reduces DNS lookups by storing previous queries locally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the difference between public and private IP addresses?

A

Public IPs are accessible over the internet, private IPs are used within a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is a proxy server’s role in networking?

A

Acts as an intermediary between a client and the internet, often used for security and performance optimization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is a firewall rule?

A

A security policy defining which traffic is allowed or blocked by the firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is an IPsec VPN used for?

A

Secure communication over an untrusted network, such as the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the purpose of the Application Layer in the OSI model?

A

Provides network services to end-user applications like browsers and email clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What is the role of SNMP in network management?

A

Simple Network Management Protocol – used to monitor and manage network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What is a MAC address used for in networking?

A

Identifies a device on a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What does SSH stand for, and what is it used for?

A

Secure Shell – used for secure remote access to devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is the primary purpose of a VPN in a network?

A

Provides a secure, encrypted connection over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What does BYOD stand for in a corporate network?

A

Bring Your Own Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is Intune used for in device management?

A

Manages devices and apps in a corporate network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is the function of BitLocker in Windows devices?

A

Encrypts hard drives for data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

How does conditional access improve security in networks?

A

Allows access based on predefined security conditions like device compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What does MFA stand for, and why is it important?

A

Multi-Factor Authentication – adds an extra layer of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the purpose of endpoint security in network management?

A

Protects devices in a network from threats like malware and unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is a cloud service provider?

A

A company that provides cloud computing resources like storage, servers, or databases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What does SaaS stand for in cloud computing?

A

Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is the purpose of a hypervisor in virtualization?

A

Manages virtual machines on a physical server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What does IaaS stand for in cloud services?

A

Infrastructure as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is PowerShell used for in Windows environments?

A

Automates administrative tasks and configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What is the role of a domain controller in a network?

A

Manages authentication and user access within a domain

66
Q

What is Active Directory?

A

A Microsoft service for managing and organizing users, devices, and resources in a network

67
Q

What is a script block in PowerShell?

A

A collection of commands or code executed as a single unit

68
Q

What does RBAC stand for in Intune management?

A

Role-Based Access Control

69
Q

What does Azure AD stand for, and what is its role?

A

Azure Active Directory – manages identity and access for users and services in the cloud

70
Q

What is a compliance policy in Intune?

A

A set of security requirements devices must meet to access corporate resources

71
Q

How does autopilot simplify device deployment in Windows?

A

Automates the setup and configuration of new devices

72
Q

What does JAMF specialize in?

A

Managing Apple devices like iPhones and MacBooks

73
Q

What is the purpose of Microsoft Defender ATP?

A

Provides advanced threat protection and monitoring for devices

74
Q

What is mobile application management (MAM) in Intune?

A

Controls how corporate apps and data are used on mobile devices

75
Q

What is a security baseline in Intune?

A

Predefined security settings applied to devices to ensure compliance with best practices

76
Q

What is the primary function of a VPN gateway?

A

Connects two networks securely over the internet

77
Q

What does MDM stand for in device management?

A

Mobile Device Management

78
Q

What is an Azure resource group used for?

A

Organizing and managing related Azure resources

79
Q

What does cloud elasticity refer to?

A

The ability to scale resources up or down based on demand

80
Q

What is the purpose of a virtual private cloud (VPC)?

A

Creates an isolated virtual network within a public cloud

81
Q

What is the purpose of encryption in cybersecurity?

A

Protects data by converting it into an unreadable format without the proper key

82
Q

What does DDoS stand for in cyberattacks?

A

Distributed Denial of Service

83
Q

What is a honeypot in network security?

A

A decoy system designed to lure attackers and study their behavior

84
Q

What is Zero Trust in cybersecurity?

A

A security model where no user or device is trusted by default

85
Q

What is phishing in the context of cybersecurity?

A

A fraudulent attempt to steal sensitive information by posing as a trustworthy entity

86
Q

What is the role of a network firewall in cloud environments?

A

Filters and monitors incoming and outgoing traffic to protect cloud resources

87
Q

What is the role of VPN in remote work?

A

Ensures secure access to corporate resources from remote locations

88
Q

What does IDS stand for in network security?

A

Intrusion Detection System

89
Q

What is the purpose of a DMZ in network architecture?

A

A buffer zone between internal networks and external threats, often used for web servers

Host web servers that are publicly facing.

90
Q

What is an API gateway used for?

A

Acts as a central hub that manages and routes client requests to various backend services while providing security, load balancing, caching, and monitoring.

91
Q

What is a bastion host in cloud security?

A

a specially configured server designed to provide secure access to an internal network from an external network, serving as a controlled entry point for administrators or users.

92
Q

What is the role of a load balancer in networking?

A

Distributes incoming traffic across multiple servers to ensure high availability

93
Q

What does SSL stand for, and why is it important?

A

Secure Sockets Layer – used to encrypt data over the internet

94
Q

What is the purpose of backup and disaster recovery in IT?

A

Ensures data can be restored in case of failure or data loss

95
Q

What is social engineering in the context of cybersecurity?

A

Manipulating people into revealing sensitive information

96
Q

What is a public key in encryption?

A

A key used to encrypt data, which can only be decrypted by a corresponding private key

97
Q

What is SaaS used for in business environments?

A

Provides access to software applications over the internet without local installation

98
Q

What is the difference between an SSD and an HDD?

A

SSDs (Solid State Drives) are faster, more durable, and energy-efficient than HDDs (Hard Disk Drives), which use mechanical parts and are generally slower and less resilient.

99
Q

What is DevOps, and why is it important in IT?

A

A practice combining software development and IT operations for faster, more reliable releases

100
Q

What is the role of a CDN in content delivery?

A

A content delivery network improves speed and availability of content by distributing it across multiple locations

101
Q

What is the structure of a PowerShell cmdlet?

A

Verb-Noun

102
Q

Give an example of a cmdlet that retrieves a list of processes in PowerShell.

A

Get-Process

103
Q

How do you filter running services in PowerShell?

A

Piping your commands

Get-Service | Where-Object { $_.Status -eq ‘Running’ }

104
Q

How do you create a new user in Azure Active Directory (Azure AD) using PowerShell?

A

New-AzureADUser -DisplayName “John Doe” -UserPrincipalName “john.doe@domain.com” -PasswordProfile $PasswordProfile

105
Q

What cmdlet retrieves all Azure AD users?

A

Get-AzureADUser

106
Q

How do you install the Azure PowerShell module?

A

Install-Module -Name Az

107
Q

What PowerShell cmdlet allows you to list all installed modules?

A

Get-Module -ListAvailable

108
Q

How do you set an alias for the cmdlet Get-ChildItem in PowerShell?

A

Set-Alias ll Get-ChildItem

109
Q

What is a pipeline in PowerShell?

A

A mechanism for passing the output of one cmdlet as input to another cmdlet

110
Q

How do you write the names of running services to a text file in PowerShell?

A

Get-Service | Where-Object { $_.Status -eq ‘Running’ } | Out-File “RunningServices.txt”

111
Q

What is the -Name parameter used for in PowerShell?

A

It is used to filter results by name

112
Q

How can you kill a process by its name in PowerShell?

A

(Get-Process -Name “notepad”).Kill()

113
Q

What cmdlet is used to view the properties of a process in PowerShell?

A

Get-Process | Get-Member

114
Q

How do you create a custom function in PowerShell?

A

Define it with function Function-Name { }

115
Q

What is a script block in PowerShell?

A

A chunk of code that can be executed as a single unit

116
Q

How do you open the PowerShell profile for editing?

A

notepad $PROFILE

117
Q

What is the PowerShell cmdlet to check the current execution policy?

A

Get-ExecutionPolicy

118
Q

How do you set the PowerShell execution policy to allow running remote scripts?

A

Set-ExecutionPolicy RemoteSigned

119
Q

How do you format output as a table in PowerShell?

A

Get-Process | Format-Table

120
Q

How do you format output as a list in PowerShell?

A

Get-Service | Format-List

121
Q

What is a PowerShell variable prefixed with?

A

$

122
Q

How do you define a global variable in PowerShell?

A

$Global:VariableName = “Value”

123
Q

What cmdlet would you use to create a new Azure resource group?

A

New-AzResourceGroup

124
Q

How do you handle errors in PowerShell scripts?

A

By using Try, Catch blocks

125
Q

What is the purpose of Conditional Access Policies in Azure AD?

A

To control access to resources based on specific conditions

126
Q

What cmdlet lists all aliases in PowerShell?

A

Get-Alias

127
Q

What are the four main cmdlets in PowerShell for managing objects?

A

Get-, Set-, New-, Remove-

128
Q

How do you create a custom alias that persists across PowerShell sessions?

A

Add the alias to your profile using Add-Content $PROFILE

129
Q

How do you retrieve all properties of a running process using PowerShell?

A

Get-Process | Select-Object -Property *

130
Q

How can you loop through a list of services using PowerShell?

A

By using the foreach statement

131
Q

What is device enrollment in Intune?

A

The process of enrolling devices for management, which can be automated or user-initiated.

132
Q

What is Windows Autopilot?

A

A tool that automates the setup of new Windows 10/11 devices for management.

133
Q

What is Apple Device Enrollment?

A

A method for enrolling Apple devices like iPhones or iPads using Apple Business Manager or manual enrollment.

134
Q

What are compliance policies in Intune?

A

Security settings that devices must meet to comply with organizational requirements.

135
Q

What are configuration profiles in Intune?

A

Profiles used to manage specific settings on enrolled devices.

136
Q

What is Conditional Access in Intune?

A

A security feature that restricts access to corporate resources based on device compliance.

137
Q

How does Intune handle app deployment?

A

It allows pushing apps to devices, including Office 365, line-of-business apps, and custom apps.

138
Q

What is Mobile Application Management (MAM) in Intune?

A

A feature that protects corporate data at the app level without full device management.

139
Q

What are security baselines in Intune?

A

Predefined security settings that ensure devices meet a basic security standard.

140
Q

What is Microsoft Defender ATP integration in Intune?

A

A security feature that integrates with Defender ATP for compliance and threat detection.

141
Q

What is Windows Autopilot used for?

A

Simplifying deployment of new Windows devices by preconfiguring them for users.

142
Q

What are firewall configurations in Intune security policies?

A

Rules that manage inbound and outbound traffic on enrolled devices.

143
Q

What is the role of antivirus policies in Intune?

A

Enforcing protection on devices using Defender for Endpoint.

144
Q

How does Intune enforce disk encryption?

A

By managing BitLocker for Windows and FileVault for macOS.

145
Q

What is the difference between Intune and JAMF?

A

JAMF excels in managing Apple devices, while Intune manages cross-platform environments.

146
Q

What is Microsoft Endpoint Manager?

A

A suite that includes Intune and Configuration Manager (SCCM) for managing devices.

147
Q

What are Intune compliance policies?

A

Rules ensuring that devices meet security standards such as encryption and password requirements.

148
Q

How does Azure AD Conditional Access integrate with Intune?

A

It ensures only compliant devices can access sensitive resources.

149
Q

What is Mobile Application Management without device enrollment?

A

A feature that controls corporate data in apps without full device management.

150
Q

What are device configuration profiles in Intune?

A

Settings that manage Wi-Fi, VPN, and email configurations on devices.

151
Q

What is Windows Autopilot deployment?

A

A zero-touch deployment method for pre-configuring new Windows devices.

152
Q

What is Intune Role-Based Access Control (RBAC)?

A

A system using Azure AD roles to control access to device management features.

153
Q

What is the importance of reports in Intune?

A

They provide data on compliance, device health, and app usage.

154
Q

How does Intune integrate with Microsoft Defender for Endpoint?

A

By enforcing security policies on devices through Defender integration.

155
Q

What is the role of Windows device enrollment in Intune?

A

It automatically enrolls devices using methods like Azure AD Join or Windows Autopilot.

156
Q

How does Bring Your Own Device (BYOD) enrollment work in Intune?

A

It allows users to enroll personal devices while limiting corporate control.

157
Q

What is the purpose of device restrictions in Intune?

A

To control specific device features like camera or Bluetooth.

158
Q

What is the function of email profiles in Intune?

A

Automatically configuring email settings for devices.

159
Q

What is the significance of PowerShell scripts in Intune?

A

They allow custom configurations that are not covered by native Intune settings.

160
Q

How does Windows Autopilot streamline device setup?

A

By automating the configuration process and enrolling devices in Intune.