Newer stuff Flashcards Preview

Practice areas for Network + N10-007 > Newer stuff > Flashcards

Flashcards in Newer stuff Deck (39)
Loading flashcards...
1
Q

What is nslookup and dig used for

A

looking up info from DNS servers

2
Q

netstat -a

A

-a parameter will show all ports but will not show process names or per-protocol statistics.

3
Q

netstat -b

A

-b shows the process name that opened the port

4
Q

netstat -s

A

-s shows statistic for each protocol.

5
Q

netstat -r

A

-r shows the routing table

6
Q

netstat -e

A

-e shows ethernet/interface statistics

7
Q

Name 2 types of type 1 hyper visors

A

VMWare ESX Server and Microsoft Hyper-V

8
Q

3 Network Components used in a hybrid cloud deployment

A

Private Link MPLS VLAN

9
Q

reciprocal arrangement

A

A reciprocal arrangement is a mutually-beneficial agreement between two companies to provide the other with agreed-upon aid in the case of disaster or failure

10
Q

A service level agreement (SLA)

A

a contractual agreement setting out the detailed terms under which an ongoing service is provided, such as scope, quality, and responsibilities that are agreed upon between the service provider(s) and the customer.

11
Q

A business continuity plan (BCP)

A

a collection of processes that enable an organization to maintain normal business operations in the face of some adverse event.

12
Q

A continuity of operations plan (COOP)

A

collection of processes that enable an organization to maintain normal business operations in the face of some adverse event.

13
Q

Protocols that can be used to remotely manage system or network devices

A

HTTP HTTPS Telnet SSH

14
Q

True or false wireless AP’s are layer 2 devices

A

True

15
Q

Name 2 VOIP End Points

A

Computer and Smartphone
A Voice over Internet Protocol (VoIP) endpoint can be implemented as software running on a computer or smartphone, or as a dedicated traditional hardware handset. For smartphones, many VoIP vendors provide installable applications.

16
Q

2 cellular technologies required for international Travel

A

TDMA and GSM

17
Q

CNAME Canonical Name records

A

Is Used to represent an alias for a host

18
Q

NS Name Server records

A

records identify authoritative DNS name servers for the zone

19
Q

MX Mail Exchange record

A

is used to identify and email server for the domain

20
Q

SOA Start Of Authority record

A

identifies the primary DNS name server that is authoritative for the zone and is responsible for resolving names

21
Q

A record

A

Is used to resolve a host name to an IPv4 Address

22
Q

AAAA record

A

resolves a host name to a IPv6 Address

23
Q

SRV record

A

Used to identify a record that is providing a network service or protocol

24
Q

PTR record

A

is found in reverse lookup zones and is used to resolve an ip address to a host name

25
Q

TXT Record

A

a TXT record is used to store any free-form text that may be needed to support other network services

26
Q

EAP-TLS

A

EAP-TLS, as both supplicant and server are configured with certificates, this provides mutual authentication.

27
Q

PEAP

A

PEAP only requires a server-side public key certificate. The supplicant does not require a certificate.

28
Q

EAP-FAST

A

(EAP-FAST) uses a Protected Access Credential (PAC) to set up the tunnel, which is generated for each user from the authentication server’s master key.

29
Q

CHAP

A

Challenge Handshake Authentication Protocol (CHAP) is an authentication scheme developed for dial-up networks that uses an encrypted three-way handshake to authenticate the client to the server.

30
Q

Host-to-Host Layer

A

Transport

31
Q

White Box Test

A

The tester has detailed information about the target system prior to starting the test.

32
Q

Grey Box Test

A

The tester has the same amount of information that would be available to a typical insider in the organization.

33
Q

Black Box Test

A

The tester has no prior knowledge of the system

34
Q

Singe Blind Test

A

Either the attacker has prior knowledge about the target system or the administrator knows that the test is being performed

35
Q

Double Blind Test

A

The tester does not have prior information about the system, and the administrator has no knowledge that the test is being performed

36
Q

Independent access point architecture

A

In the early days of wireless networking, large organizations implemented independent access points throughout their facilities. Each AP stood alone, providing separate wireless networks using its own independent configuration. (Intelligent AP)

37
Q

Hub-and-Spoke Infrastructure

A

In a hub-and-spoke configuration, a wireless controller is connected to all access points using wired links. The individual access points contain very little embedded intelligence and are sometimes referred to as lightweight access points (Lightweight AP).

38
Q

Distributed Wireless Mesh Infrastructure

A

Newer wireless networks can be deployed using a distributed wireless mesh architecture. These networks still use a controller, but they move some of the network intelligence from the controller out to the individual access points. In this configuration, the controller is no longer a bottleneck. The APs are smart enough to communicate directly with each other to create more efficient data paths for network traffic (Intelligent AP)

39
Q

Pharming

A

Stealing Credentials