• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/56

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

56 Cards in this Set

  • Front
  • Back
What is a database system that translates a computer's fully qualified domain name into an IP address?
Domain Name System (DNS)
What type of file preceded DNS when the internet was very young, that functioned similar to DNS. The file contained a list of IP addresses for every computer on the Internet?
HOSTS file
In a HOSTS file, what symbol indicates a line is a comment?
#
When do HOSTS files update on every system?
2AM every morning
Where is the first place the OS looks to resolve a name?
HOSTS file
what is the maximum number of characters in a DNS name?
255
What is the term that describes the complete domain name for a specific computer or host on the internet?
Fully Qualified Domain Name (FQDN)
What are the 2 parts that make up a FQDN?
-Hostname
&
-Top level domain
What would the host name be for www.indiana.edu?
www
what would be the top level domain for www.indiana.edu?
.edu
what would be the domain for www.indiana.edu?
indiana.edu
what are the 3 ways that a computer tries to resolve a name?
-Broadcast
-HOSTS file
-Querying a DNS server
Using an internet domain name to find an IP address is known as what?
Forward lookup zone
what command can you run from a command prompt to resolve an internet domain name?
nslookup
Explain how you would troubleshoot a possible dns problem?
-type ipconfig /flushdns
-ping a well-known website like www.google.com
-if it times out ping a known ip address
-if you get a response then the dns server is down
What are secondary zones used for?
To take over in the event that the DNS server for the primary zone goes down
What naming resolution system was created by Microsoft that broadcast its name to a small network?
NetBIOS
Microsoft runs NetBIOS over what?
TCP/IP
NetBIOS over TCP/IP is known as what?
CIFS
If a windows system needs to access a another computers folders or files what does it use?
CIFS
If a windows system need to access the internet what does it use?
DNS server
What are the 3 groups that CIFS organizes windows computers into?
-workgroup
-windows domain
-active directory
How do you view NetBIOS cache?
nbtstat -n
What is an authentication protocol for TCP/IP that has no connection to PPP?
Kerberos
Kerberos uses what port?
TCP port 88
What are the 2 processes of the Key Distribution Center in Kerberos?
-Authentication Server (AS)
-Ticket-Granting Service
What machine is the Key Distribution Center installed on?
Domain Controller
Briefly explain the kerberos process.
-client sends request that includes hash to the authenticating server.
-Server replies with a ticket granting ticket and time stamp.
-client sends the ticket granting ticket to the ticket granting server
-ticket granting server sends a token to the client that allows access to resources
The token in kerberos is known as what?
SID (security identifier)
Any encryption that uses the same key for both encryption and decryption is called what?
symmetric-key algorithm
Someone that wants to decrypt a symmetric key algorithm must have what 2 things?
-key
-algorithm
Most symmetric-key algorithms are what?
Block ciphers
What type of symmetric key algorithm uses a block cipher with a 64 bit block and a 56 bit key?
Data Encryption Standard (DES)
What type of symmetric key algorithm is used in a number of TCP/IP applications and uses a stream cipher?
Rivest Cipher 4 (RC4)
What type of symmetric key algorithm uses a 128 bit block cipher with a 128, 192, or 256 bit key?
Advanced Encryption Standard (AES)
What are some drawbacks to symmetric key encryption?
-Anyone with key can encrypt or decrypt
-Need to send the key to the other person
What type of encryption uses one key to encrypt and a different key to decrypt?
Asymmetric-Key Algorithm
Which key in asymmetric key cryptography is used to encrypt the data?
Public key
What term describes the guarantee that data is originally sent and came from a trusted source?
Nonrepudiation
What are the 3 mechanisms that enable nonrepudiation?
-Hashing
-PKI
-Digital signatures
What is a mathematical function that you run on a string of binary digits of any length that results in a value of some fixed length that is irreversible?
Hash
The result of a hash is known as what?
checksum or digest
what is an encrypted link between two computers?
Tunnel
What is a PPP wrapper that applications can use to accept one of many types of authentication that has significant use in wireless networks?
Extensible authentication protocol (EAP)
What form of authentication is used in wireless networks with a shared secret code that's stored on both the wirless access point and the wirless client and uses AES encryption?
EAP-PSK (personal shared key)
What is a standardized type of digital signature that includes the digital signature of a third party, a person or a company that guarantees that who is passing out this certificate truly is who they say they are?
Digital certificate
What is the name of the most popular certificate authority?
VeriSign
What secure TCP/IP application is used to query the state of network devices, such as CPU usage, network utilization, and uses agents to collect information from a MIB?
Simple network management protocol (SNMP)
What port numbers does SNMP use?
161
162
The philosophy of AAA means what?
-Authentication
-Authorization
-Accounting
What are 2 standards that implement AAA?
-RADIUS
-TACACS+
What encryption protocol works at the Network layer and operates in transport mode and tunnel mode?
IPSec
In what mode does only the actual payload of the IP packet get encrypted?
Transport mode
In what mode is the entire IP packet encrypted into an IPsec endpoint and then encapsulated inside another IP packet?
Tunnel mode
What encryption was invented as a secure replacement for Telnet that uses RSA keys?
SSH
Why is SSH used?
For tunneling