Windows Networking Flashcards

1
Q

RPC

A

Remote Procedure Call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Will RPC work cross networks?

A

It can if not configured to be blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mailslots

A
One-way Interprocess Communication
Implemented in Kernel32.dll and msfs.sys
Acts as a file kept in memory
Useful for a single process sending broadcases to multiple processes
Max single message size of 424 bytes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RPC - Description

A

Applications load a DLL containing stub procedures for remote functions
The stub then calls RPC run-time procedures to locate where the remote procedure resides
The stub negotiates a transport mechanism
It then calls the procedure on the remote system with the parmeters
Reverse happens to return data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SMB

A

Server Message Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

CIFS

A

Common Internet File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SMB - Description

A

Primary remote file-access protocol on Windows Clients and Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIFS v1

A

cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CIFS v2

A

Encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIFS v3

A

Encrypted with AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SMB/CIFS CMD command

A

nbtstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NetBIOS

A

Network Basic Input/Output System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

RDN

A

Relative Distinguished Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SMB Port

A

445

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NetBIOS Ports

A

137-139

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port 139

A

SMB over NetBIOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port 137

A

NetBIOS Naming Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Port 138

A

NetBIOS Datagram Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SRM

A

Security Reference Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ntoskrnl

A

Security Reference Monitor Kernel Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

LSASS

A

Local Security Authority Subsystem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

SAM

A

Security Accounts Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

SAM database registry path

A

HKLM\SAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Winlogon

A

Interactive Logon Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CP

A

Credential Providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Netlogon

A

Network Logon Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Kernel Security Device Driver

A

KSecDD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Security Reference Monitor (SRM): Kernel Mode (ntoskrnl) Description

A

defines access token structure, performs object security access checks, generate security audit messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Local Security Authority Subsystem (LSASS): User-mode (lsass.exe) description

A

local system security policy, user authentication, sending security audit messages to Event Log. Loads Local Security Authority service (LSA, lsasrv.dll)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

LSASS policy database

A

registry area under HKLM\Security that stores security policy settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Security Accounts Manager (SAM): Loaded in LSASS (samsrv.dll) description

A

manages users and groups on local machine

32
Q

SAM database: HKLM\SAM description

A

local users and groups along with passwords (encrypted)

33
Q

Active Directory: Loaded in LSASS (ntdsa.dll) description

A

Contains a database with information about domain objects

34
Q

Authentication Packages description

A

DLLs that run through LSASS that verify user account credentials and respond to LSASS which generates a token

35
Q

Interactive Logon Mangaer (Winlogon): Winlogon.exe - description

A

Grabs secure attention sequence (SAS), manages interactive logon, creates first process

36
Q

Logon User Interface (LogonUI): LogonUI.exe - description

A

Provides user interface to authenticate to system

37
Q

Credential Providers (CP): COM objects running inside LogonUI - Description

A

Obtains different logon credentials, smartcard, user/pass, biometrics

38
Q

Network Logon Service (Netlogon): (Netlogon.dd) - Description

A

Secures channel to domain controller passes logon

39
Q

Kernel Security Device Driver (KSecDD): (Ksecdd.sys) - description

A

implements Advanced Local Procedure CAll (ALPC) interfaces which kernel components user to communicated with user-mode LSASS

40
Q

AppLocker: Driver (AppId.sys) Service (AppIdSvc.dll) - Description

A

Specifies which files, DLLs, scripts can be run by whom

41
Q

When does the machine Security Indentifier (SID) get generated

A

At Install

42
Q

SIDs are issued to what?

A

User Accounts, Groups, Domains, and Services

43
Q

SID-500

A

Admin Account

44
Q

SID-501

A

Guest Account

45
Q

User Accounts SIDs start where?

A

1000

46
Q

Where do you find the RID

A

Appended to the end of the SID

47
Q

How are local account SIDs generated

A

The Local Machine SID appended with a RID

48
Q

How are fomain account SIDs generated

A

The Active Directory SID appended with a RID

49
Q

Local logon uses what to verify username/password credentials by default

A
LAN Manager (LM) (msv1_0.dll),
Includes LM, NTLM, and NTLMv2 hashing methods
50
Q

Domain logon uses what protocol for authentication by default

A

Kerberos (kerberos.dll) Port 88

51
Q

As of Windows Vista, what is used to add extensible logon methods?

A

Credential Providers

52
Q

Active Directory Schema

A

defines objects that can be stored in Active Directory. Is a list of definitions that determine the kinds of objects and types of information about those objects can be stored in Active Directory.
Objects can be administered in the same manner as the rest of the objects in AD.

53
Q

Active Directory Schema 2 Object Types

A
Class object (schema class)
Attribute object (schema attribute)
54
Q

Global Catalog - description

A

The AD Domain relies on a global catalog database which contains a global listing of all objects in the forest.

55
Q

Global Catalog is held on DCs configured as what?

A

global catalog servers

56
Q

Global Catalog contains what subset of information?

A

User’s First and Last name

Distinguished name of the object so your client can contact the proper domain controller if you need more information

57
Q

Distinguished Name

A

The full address of an object in the directory

58
Q

AD Feature - Centralized Data Storage

A

All data in AD resides in a single, distributed data repository, allowing users easy access to the information from any location.
A single distributed data store requires less administration and duplication and improves the availability and organization of the data.

59
Q

AD Features - Scalability

A

AD enables you to scale the directory to meet business and network requirements through the configuration of domains and tress and the placement of domain controllers
AD allows millions of objects per domain and uses indexing technology and advanced replication techniques to speed performance.

60
Q

AD Features - Extensibility

A

The structure of the AD database (the schema) can be expanded to allow customized types of information

61
Q

AD Features - Manageability

A

Based on hierarchical organizational structures.
These organizational structures make it easier to control administrative privileges and other security settings, and to make it easier to locate network resources, such as files and printers.

62
Q

AD Features - Integration with DNS

A

AD uses DNS, an internet standard service that translates easily readable host names to numeric Internet Protocol (IP) addresses
Although separate and implemented differntly for different purposes, AD and DNS have the same hierarchical structure.
AD clients use DNS to locate domain controllers.
Primary DNS zones are stored in AD, enabling replication to other AD Domain Controllers.

63
Q

AD Features - Client Configuration Management

A

AD provides new technologies for managing client configuration issues, such as user mobility and hard disk failures, with a minimum of administration and user downtime.

64
Q

AD Features - Policy-Based Administration

A

In AD, policies are used to define the permitted actions and settings for user and computers across a given domain, or organizational unit.
Policy-based management simplifies tasks such as operating system updates, application installation, user profiles, and desktop-system lock down.

65
Q

AD Features - Replication of Information

A

AD provides multi-master replication technology to ensure information availability, fault tolerance, load balancing, and other performance benefits.
Multi-Master replication allows you to update the directory at any domain controller and replicates directory changes to any other domain controller.
Because multiple domain controllers are employed, replication continues, even if any single domain controller stops working.

66
Q

AD Features - Flexible, Secure Authentication and Authorization

A

AD authentication and authorization services provide protection for data while minimizing barriers to doing business over the internet.
AD supports multiple authentication protocols, such as Kerberos version 5 protocol, Secure Sockets Layer (SSL) version 3, and Transport Layer Security (TLS) using x.509 version 3 certificates.
AD provides security groups that span domains.

67
Q

Domains

A

A domain is a collection of computers and their associated security groups that are managed as a single entity.
The domain is the core unit of logical structure in Active Directory It can be used to store millions of objects (these objects are considered vital to the network)
Microsoft recommends:
using as few domains as possible
relying on Organizational Units (OUs) for structure
Domains can contain multiple nested OUs.

68
Q

Organizational Units

A

An Organizational Unit (OU) is a container which gives a domain hierarchy and structure.
It is used for ease of administration and to create an AD structure in the company’s geographic or organizational terms.
An OU can contain OUs, allowing for the creating of a multi-level structure

69
Q

Trees

A

A tree is a grouping or hierarchical arrangement of one or more domains.
Trees are created by adding one or child domains to a parent domain.
In a tree, all domains share the same contiguous namespace and naming structure.
By adding domains to a tree, you can retain the security configuration through the tree (domain), and allow for administration to be delegated to a single OU or a single domain.
The tree structure easily accommodates organizational changes.

70
Q

Forest

A

Are at the top of the Active Directory Structure.
A forest holds all objects, organizational units (OUs), domains, and attributes in its hierarchy
A forest is a grouping or hierarchical arrangement of one or more separate, completely independent domain trees.
Under a forest are one or more trees which hold domains, OUs, objects, and attributes.
Forests have the following characteristics:
All domains in a forest share a common schema.
All domains in a forest share a common global catalog.
All domains in a forest are linked by implicit two-way transitive trust.
Trees in a forest have different naming structures, according to their domains.
Domains in a forest operate independently, but the forest enables communication across the entire organization.

71
Q

Sites

A

An Active Directory site object represents a collection of IP subnets, usually constituting a physical Local Area Network (LAN).
Multiple sites are connected for replication by site links.

Typically, sites are used for:
Physical Location Determination: Enables clients to find local resources such as printers, shares, or domain controllers.
Replication: You can optimize replication between domain controllers by creating links.

By default, Active Directory uses automatic site coverage, though you can purposefully setup sites and resources.

72
Q

AD Structure - Domain Controllers

A

In Active Directory, You have multiple Domain Controllers which are equal peers.
Each DC in the Active Directory domain contains a copy of the AD database and synchronizes changes with all other DCs by multi-master replication.
Replication occurs frequently and on a pull basis instead of a push one.
A server requests updates from a fellow domain controller.
If information on one DC changes (e.g. a user changes their password), it sends signal to the other domain controllers to begin a pull replication of the data to ensure they are all up to date.
Servers not serving as DCs, but in the Active Directory domain, are called ‘member servers.’
Active Directory requires at least one Domain Controller, but you can install as many as you want (and it’s recommended you install at least two domain controllers in case one fails).

73
Q

DSADD

A

Add specific types of objects to the directory

74
Q

DSGET

A

display the selected properties of a specific object in the directory

75
Q

DSMOD

A

modify existing objects in the directory

76
Q

DSQUERY

A

query the directory according to specific criteria

77
Q

Describe GPO

A

GPO is divided into two major Nodes types, User and Computer. Computer node object relate to policies that affect the computer system, ie. startup scripts, firewall configuration, Name Resolution Policy. User nodes relate to user policies and are relevant to only the currently logged on user.