TripAdvisor RD 3 Flashcards
What does the OSI model stand for?
Open Systems Interconnection
Which layer of the OSI model is responsible for routing data between networks?
Network Layer (Layer 3)
What does TCP stand for in networking?
Transmission Control Protocol
What is the purpose of DHCP in networking?
Assigns IP addresses automatically to devices
In the OSI model, which layer deals with MAC addresses and switches?
Data Link Layer (Layer 2)
What is the main function of the Physical Layer in the OSI model?
Handles the physical connection between devices (cables, signals)
What does DNS do in a network?
Translates domain names into IP addresses
Which protocol is used for securing communication over the internet?
HTTPS (Hypertext Transfer Protocol Secure)
What is NAT in networking?
Network Address Translation – translates private IPs to public IPs
What does VLAN stand for in networking?
Virtual Local Area Network
What is the role of the default gateway in a network?
Directs traffic from the local network to external networks
Which network tool shows the path packets take to reach a destination?
Tracert (Windows) / Traceroute (Linux/macOS)
What does UDP stand for, and what is it used for?
User Datagram Protocol – used for faster, less reliable communication
What does IP stand for, and what does it handle?
Internet Protocol – handles routing and addressing
What are the key responsibilities of a network router?
Forwards data between networks
What is the difference between TCP and UDP?
TCP is reliable with error correction; UDP is faster but less reliable. TCP is connection-orientated while UDP is connection-less.
UDP - Gaming, Video Streaming
TCP - Web Browsing, file transfers
What is a firewall’s primary function in a network?
Monitors and controls incoming and outgoing network traffic based on security rules
What does IPv4 stand for?
Internet Protocol version 4
What is CIDR notation used for in networking?
Defines the size of a network (e.g., 192.168.1.0/24)
Which OSI layer manages sessions between applications?
Session Layer (Layer 5)
How does ARP work in a network?
Resolves IP addresses to MAC addresses
What is the purpose of port 443 in networking?
Secure web traffic (HTTPS)
What network issue does Spanning Tree Protocol (STP) prevent?
Network loops
What is a subnet in IP networking?
A segmented portion of a larger network
What is the key role of the Transport Layer in the OSI model?
Ensures reliable data transmission (handles ports, error correction)
What is the difference between a switch and a router in networking?
A switch connects devices within a local network, while a router connects different networks
What does DNS stand for, and what is its primary function?
Domain Name System – translates domain names into IP addresses
What is multicast in networking?
Sends data to multiple recipients who subscribe to a group
What does a ‘broadcast’ mean in a network context?
Data sent to all devices on a local network
What is the purpose of VLAN tagging in networking?
Identifies and separates network traffic within a VLAN
What does an IP address conflict mean in networking?
Two devices on a network are assigned the same IP address
How does a ping command help in network troubleshooting?
Tests connectivity between two devices
What is the role of an access point (AP) in a network?
Provides Wi-Fi connectivity to wireless devices
What does RDP stand for, and what is it used for?
Remote Desktop Protocol – allows remote access to Windows desktops
What is a ‘subnet mask’ used for in networking?
Determines the network portion of an IP address
What is the function of the Presentation Layer in the OSI model?
Translates data between the application and lower layers (handles encryption, compression) (Layer 6)
What does ICMP stand for, and what is it used for?
Internet Control Message Protocol – used for network diagnostics (e.g., ping)
What is a ‘loopback address’ in IP networking?
127.0.0.1 – a special IP address that is used to test network functionality on a local machine. It points back to itself so you can do things like localhost hosting.
What network tool provides detailed information about a device’s network configuration?
Ipconfig (Windows) / Ifconfig (Linux/macOS)
What is Wireshark used for in networking?
Captures and analyzes network traffic at the packet level
What is port forwarding in networking?
Directs external traffic to a specific device or service on a local network
What does an Ethernet switch do in a network?
Connects devices within a LAN and forwards data to the correct destination based on MAC addresses
What does BGP stand for, and what does it handle?
Border Gateway Protocol – handles routing between autonomous systems on the internet by defining and publishing paths
How does DNS caching improve network performance?
Reduces DNS lookups by storing previous queries locally
What is the difference between public and private IP addresses?
Public IPs are accessible over the internet, private IPs are used within a local network
What is a proxy server’s role in networking?
Acts as an intermediary between a client and the internet, often used for security and performance optimization
What is a firewall rule?
A security policy defining which traffic is allowed or blocked by the firewall
What is an IPsec VPN used for?
Secure communication over an untrusted network, such as the internet
What is the purpose of the Application Layer in the OSI model?
Provides network services to end-user applications like browsers and email clients
What is the role of SNMP in network management?
Simple Network Management Protocol – used to monitor and manage network devices
What is a MAC address used for in networking?
Identifies a device on a local network
What does SSH stand for, and what is it used for?
Secure Shell – used for secure remote access to devices
What is the primary purpose of a VPN in a network?
Provides a secure, encrypted connection over the internet
What does BYOD stand for in a corporate network?
Bring Your Own Device
What is Intune used for in device management?
Manages devices and apps in a corporate network
What is the function of BitLocker in Windows devices?
Encrypts hard drives for data protection
How does conditional access improve security in networks?
Allows access based on predefined security conditions like device compliance
What does MFA stand for, and why is it important?
Multi-Factor Authentication – adds an extra layer of security
What is the purpose of endpoint security in network management?
Protects devices in a network from threats like malware and unauthorized access
What is a cloud service provider?
A company that provides cloud computing resources like storage, servers, or databases
What does SaaS stand for in cloud computing?
Software as a Service
What is the purpose of a hypervisor in virtualization?
Manages virtual machines on a physical server
What does IaaS stand for in cloud services?
Infrastructure as a Service
What is PowerShell used for in Windows environments?
Automates administrative tasks and configurations
What is the role of a domain controller in a network?
Manages authentication and user access within a domain
What is Active Directory?
A Microsoft service for managing and organizing users, devices, and resources in a network
What is a script block in PowerShell?
A collection of commands or code executed as a single unit
What does RBAC stand for in Intune management?
Role-Based Access Control
What does Azure AD stand for, and what is its role?
Azure Active Directory – manages identity and access for users and services in the cloud
What is a compliance policy in Intune?
A set of security requirements devices must meet to access corporate resources
How does autopilot simplify device deployment in Windows?
Automates the setup and configuration of new devices
What does JAMF specialize in?
Managing Apple devices like iPhones and MacBooks
What is the purpose of Microsoft Defender ATP?
Provides advanced threat protection and monitoring for devices
What is mobile application management (MAM) in Intune?
Controls how corporate apps and data are used on mobile devices
What is a security baseline in Intune?
Predefined security settings applied to devices to ensure compliance with best practices
What is the primary function of a VPN gateway?
Connects two networks securely over the internet
What does MDM stand for in device management?
Mobile Device Management
What is an Azure resource group used for?
Organizing and managing related Azure resources
What does cloud elasticity refer to?
The ability to scale resources up or down based on demand
What is the purpose of a virtual private cloud (VPC)?
Creates an isolated virtual network within a public cloud
What is the purpose of encryption in cybersecurity?
Protects data by converting it into an unreadable format without the proper key
What does DDoS stand for in cyberattacks?
Distributed Denial of Service
What is a honeypot in network security?
A decoy system designed to lure attackers and study their behavior
What is Zero Trust in cybersecurity?
A security model where no user or device is trusted by default
What is phishing in the context of cybersecurity?
A fraudulent attempt to steal sensitive information by posing as a trustworthy entity
What is the role of a network firewall in cloud environments?
Filters and monitors incoming and outgoing traffic to protect cloud resources
What is the role of VPN in remote work?
Ensures secure access to corporate resources from remote locations
What does IDS stand for in network security?
Intrusion Detection System
What is the purpose of a DMZ in network architecture?
A buffer zone between internal networks and external threats, often used for web servers
Host web servers that are publicly facing.
What is an API gateway used for?
Acts as a central hub that manages and routes client requests to various backend services while providing security, load balancing, caching, and monitoring.
What is a bastion host in cloud security?
a specially configured server designed to provide secure access to an internal network from an external network, serving as a controlled entry point for administrators or users.
What is the role of a load balancer in networking?
Distributes incoming traffic across multiple servers to ensure high availability
What does SSL stand for, and why is it important?
Secure Sockets Layer – used to encrypt data over the internet
What is the purpose of backup and disaster recovery in IT?
Ensures data can be restored in case of failure or data loss
What is social engineering in the context of cybersecurity?
Manipulating people into revealing sensitive information
What is a public key in encryption?
A key used to encrypt data, which can only be decrypted by a corresponding private key
What is SaaS used for in business environments?
Provides access to software applications over the internet without local installation
What is the difference between an SSD and an HDD?
SSDs (Solid State Drives) are faster, more durable, and energy-efficient than HDDs (Hard Disk Drives), which use mechanical parts and are generally slower and less resilient.
What is DevOps, and why is it important in IT?
A practice combining software development and IT operations for faster, more reliable releases
What is the role of a CDN in content delivery?
A content delivery network improves speed and availability of content by distributing it across multiple locations
What is the structure of a PowerShell cmdlet?
Verb-Noun
Give an example of a cmdlet that retrieves a list of processes in PowerShell.
Get-Process
How do you filter running services in PowerShell?
Piping your commands
Get-Service | Where-Object { $_.Status -eq ‘Running’ }
How do you create a new user in Azure Active Directory (Azure AD) using PowerShell?
New-AzureADUser -DisplayName “John Doe” -UserPrincipalName “john.doe@domain.com” -PasswordProfile $PasswordProfile
What cmdlet retrieves all Azure AD users?
Get-AzureADUser
How do you install the Azure PowerShell module?
Install-Module -Name Az
What PowerShell cmdlet allows you to list all installed modules?
Get-Module -ListAvailable
How do you set an alias for the cmdlet Get-ChildItem in PowerShell?
Set-Alias ll Get-ChildItem
What is a pipeline in PowerShell?
A mechanism for passing the output of one cmdlet as input to another cmdlet
How do you write the names of running services to a text file in PowerShell?
Get-Service | Where-Object { $_.Status -eq ‘Running’ } | Out-File “RunningServices.txt”
What is the -Name parameter used for in PowerShell?
It is used to filter results by name
How can you kill a process by its name in PowerShell?
(Get-Process -Name “notepad”).Kill()
What cmdlet is used to view the properties of a process in PowerShell?
Get-Process | Get-Member
How do you create a custom function in PowerShell?
Define it with function Function-Name { }
What is a script block in PowerShell?
A chunk of code that can be executed as a single unit
How do you open the PowerShell profile for editing?
notepad $PROFILE
What is the PowerShell cmdlet to check the current execution policy?
Get-ExecutionPolicy
How do you set the PowerShell execution policy to allow running remote scripts?
Set-ExecutionPolicy RemoteSigned
How do you format output as a table in PowerShell?
Get-Process | Format-Table
How do you format output as a list in PowerShell?
Get-Service | Format-List
What is a PowerShell variable prefixed with?
$
How do you define a global variable in PowerShell?
$Global:VariableName = “Value”
What cmdlet would you use to create a new Azure resource group?
New-AzResourceGroup
How do you handle errors in PowerShell scripts?
By using Try, Catch blocks
What is the purpose of Conditional Access Policies in Azure AD?
To control access to resources based on specific conditions
What cmdlet lists all aliases in PowerShell?
Get-Alias
What are the four main cmdlets in PowerShell for managing objects?
Get-, Set-, New-, Remove-
How do you create a custom alias that persists across PowerShell sessions?
Add the alias to your profile using Add-Content $PROFILE
How do you retrieve all properties of a running process using PowerShell?
Get-Process | Select-Object -Property *
How can you loop through a list of services using PowerShell?
By using the foreach statement
What is device enrollment in Intune?
The process of enrolling devices for management, which can be automated or user-initiated.
What is Windows Autopilot?
A tool that automates the setup of new Windows 10/11 devices for management.
What is Apple Device Enrollment?
A method for enrolling Apple devices like iPhones or iPads using Apple Business Manager or manual enrollment.
What are compliance policies in Intune?
Security settings that devices must meet to comply with organizational requirements.
What are configuration profiles in Intune?
Profiles used to manage specific settings on enrolled devices.
What is Conditional Access in Intune?
A security feature that restricts access to corporate resources based on device compliance.
How does Intune handle app deployment?
It allows pushing apps to devices, including Office 365, line-of-business apps, and custom apps.
What is Mobile Application Management (MAM) in Intune?
A feature that protects corporate data at the app level without full device management.
What are security baselines in Intune?
Predefined security settings that ensure devices meet a basic security standard.
What is Microsoft Defender ATP integration in Intune?
A security feature that integrates with Defender ATP for compliance and threat detection.
What is Windows Autopilot used for?
Simplifying deployment of new Windows devices by preconfiguring them for users.
What are firewall configurations in Intune security policies?
Rules that manage inbound and outbound traffic on enrolled devices.
What is the role of antivirus policies in Intune?
Enforcing protection on devices using Defender for Endpoint.
How does Intune enforce disk encryption?
By managing BitLocker for Windows and FileVault for macOS.
What is the difference between Intune and JAMF?
JAMF excels in managing Apple devices, while Intune manages cross-platform environments.
What is Microsoft Endpoint Manager?
A suite that includes Intune and Configuration Manager (SCCM) for managing devices.
What are Intune compliance policies?
Rules ensuring that devices meet security standards such as encryption and password requirements.
How does Azure AD Conditional Access integrate with Intune?
It ensures only compliant devices can access sensitive resources.
What is Mobile Application Management without device enrollment?
A feature that controls corporate data in apps without full device management.
What are device configuration profiles in Intune?
Settings that manage Wi-Fi, VPN, and email configurations on devices.
What is Windows Autopilot deployment?
A zero-touch deployment method for pre-configuring new Windows devices.
What is Intune Role-Based Access Control (RBAC)?
A system using Azure AD roles to control access to device management features.
What is the importance of reports in Intune?
They provide data on compliance, device health, and app usage.
How does Intune integrate with Microsoft Defender for Endpoint?
By enforcing security policies on devices through Defender integration.
What is the role of Windows device enrollment in Intune?
It automatically enrolls devices using methods like Azure AD Join or Windows Autopilot.
How does Bring Your Own Device (BYOD) enrollment work in Intune?
It allows users to enroll personal devices while limiting corporate control.
What is the purpose of device restrictions in Intune?
To control specific device features like camera or Bluetooth.
What is the function of email profiles in Intune?
Automatically configuring email settings for devices.
What is the significance of PowerShell scripts in Intune?
They allow custom configurations that are not covered by native Intune settings.
How does Windows Autopilot streamline device setup?
By automating the configuration process and enrolling devices in Intune.