• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/61

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

61 Cards in this Set

  • Front
  • Back
What are the steps that occur between the client and DHCP server, so that the client can obtain an IP address.
Discover (client)
Offer (server)
Request (client)
Ack/Nack (server)

Page 6
What is a Nack and what are some possible reasons for receiving one.
Nack = Non Acknowledgement (server)
It is possible to receive a Nack message from the DHCP server when the servers database is full (all IPs are being used), when the client requests the wrong address due to subnet error, or when the clients lease has expired and it cannot be renewed.

Page 5
What are the benefits of DHCP.
DHCP provides:
Centralized Administration of IPs
Flexible
Scalable
Seamless

Page 3-4
What is the DHCP Scope, and what are two ways to make the scope more specific.
The Scope refers to the range of available IPs on the DHCP server.
You can further specify your scope with Exclusions and Reservations.

Page 16-19
What is an Exclusion in a DHCP scope.
It is a group of IPs that will be Excluded from the IP scope to be offered out to clients. Static IPs on the network should be contained inside these exclusions.

Page 17
What is a Reservation in a DHCP scope.
A Reservation is a reserved IP address within the available DHCP scope. They tie a IP address to a MAC address.
A reservation cannot be within an Exclusion

Page 19
What is the IP address associated with APIPA
169. . .

Page 11
What is the length of time between the automatic checks for the DHCP server
5 minutes

page 12
How long can the lease time be set for a particular IP
Unlimited
What are the two records associated with the DHCP server
(A) Record
PTR Record

Page 33
What is the A Record, and when is it used.
The A Record is an association of the Hostname with the IP, from a client (Win 2k and on), and from the DHCP server (pre Win 2k)

Page 33
What is the PTR Record, and when is it used.
The Pointer (PTR) record is used as an association of the IP address with the Hostname, and comes from the DHCP server.

Page 33
What are the four ways of managing the DHCP database.
Backing up and Restoring
Reconciliation
Compacting
Removal

page 39
What is DHCP Database Reconciliation.
Reconciliation is a verification between the Database values and the Registry values.
This should be ran whenever the database does not have the most recent values, or the database is correct but the console displays them incorrectly

Page 42
What is DHCP Database Compacting.
Compacting is recovering unused space. This is done through the JETPACK.EXE command:
jetpack.exe (target) (destination)

Page 43
What is the Root Domain annotated by.
A Period
What are the Three Main DNS zones
Primary
Secondary
Stub

Page 67
What are the properties of a Primary Zone
The Primary Zone hosts a read/write copy of DNS.

Page 67
What are the properties of a Secondary Zone
The Secondary Zone hosts a read-only copy of DNS from the primary zone.

Page 67
What are the properties of a Stub Zone
A Stub Zone contains only the records that are necessary to identify who the authoritative DNS server is in its zone.

Page 68
What are the two type of Active Directory Integrated Zones.
Forward look up zone
Reverse look up zone

Page 69
What is a Forward Look up zone.
Associates Hostname to IP

Page 70
What is a Reverse Look up zone.
Associates IP to Hostname

Page 70
What are the benefits of an Active Directory Integrated Zone
Fault Tolerance
Security
Zones Multimaster
Efficient Replication
What is Multimastering
Means all AD Integrated Zones zone files are read/write, meaning that they can be updated on whatever domain controller has the zone file

Page 69-70
What is an iterative query
A DNS query where the DNS server will give its best answer referring to INSIDE Servers

Page 82-83, 106
What is a recursive query
A DNS query where the DNS server will get a definitive answer by referring to OUTSIDE Servers

Page 84-85, 106
What is a delegation record
This record is stored in the parent zone, and has the name of the authority in a child zone.
It tells the DNS server of the parent zone who the DNS authority is of a child zone.
Example:
(who is the authority of the Command....the CO)

Page 81
What is a glue record
This record is stored on the Name server of the parent zone, and serves as the "A" record for the DNS authority of a child zone
Example:
(What is the authority of the Commands name....CAPT John Smith)

Page 81
What are the 3 DNS security zone levels
Low
Medium
High

Page 125-127
What would be the reason that a recursive query does not work.
Root Hints
What 2 IPCONFIG commands help you with DNS cache, what do they do.
ipconfig /displaydns - views cache
ipconfig /flushdns - purges cache

Page 124
If you use the NSLOOKUP command prompt entry and provide the hostname, what are you requesting.
The IP address or addresses associated with the host name.

Page 107
Considering network security, what is authorization.
Authorization is what a user can do after being authenticated to the network.

page 146
What 2 fundamentals can help you have effective security
Security Baselines and Incremental Templates

page 152
What is the principle of least privilege
This principle states that no user or object should be given anymore privileges than are needed.

page 154
Does the principle of least privilege apply to the network administrator.
Yes

page 154
What feature can the administrator use, so that he can complete his job, but maintain the principle of least privilege.
Run As

page 155
What are the 3 MMC Snap-ins that help maintain and manage network security
Security Configuration and Analysis
Security Templates
Group Policy

page 163-168
What command line entry can used to configure and analyze your network, instead of the mmc snap in
Secedit

page 166
Instead of waiting for the default waiting time before policy refreshes, what command can you use to instantly refresh policies.
Gpupdate

page 168
Can the Microsoft Baseline Security Analyzer be used across multiple computers.
yes

page 169
what does the word Cipher refer to
Encryption

page 162
Can a compressed file be encrypted too
No

Page 161
What are the 3 states of data, and which does encryption protect
The 3 States are:
Storage, Process, Transit
Encryption protects data in the storage state.

page 161
What File System is required to grant permissions and encryption to files and folders
NTFS

page 148, 160
What are the two IPsec protocols
AH (authentication header) Protocol
ESP (encapsulating security payload) Protocol

page 182
What is the AH Protocol
the AH Protocol is a security protocol under IPsec which provides authentication, integrity, and anti replay, but not confidentiality for the whole packet being transported.

page 182
What is the ESP Protocol
the ESP protocol provides everything the AH protocol provides including Confidentiality, however it only protects the data portion of a packet being transported

page 182
What is IKE (internet key exchange)
allows two peers to determine a secret key by exchanging unencrypted values over a public network

page 184
what does the NETSH command do
it can display or modify the local or remote network configurations (win 2k3 server). Can either be static or dynamic
What is feature can you quickly use to show which applications and processes are running on the system.
Task Manager

Page 280-282
In order for the performance monitor to be able to send messages when there are alerts, what services must be on.
the Alerter Service must be started on the machine that is monitoring.
the Messenger service must be started on the machine that is receiving the message.

page 287
What tab is used to schedule the start and stop of an alert.
The schedule tab.

page 288
What is the difference between Netmonitor Lite and standard
Netmonitor lite - monitors traffic to and from itself.
Netmonitor standard - monitors all traffic across the network, and see where other network monitors are running

page 290
The repair button, to run an automatic series of commands to troubleshoot network connectivity can be located where
under the support tab of the network interface window

page 296
Which account runs most of the services.
the Local system account.

page 302
What are two important Ipconfig commands that are ran during a network repair
ipconfig /flushdns and ipconfig /registerdns

page 296
What is needed to connect a client to a network.
IP Address, Default Gateway, DNS

Page 296
What is Netdiag.
It is a command that can help the administrator isolate network connectivity problems.
What are the two basic approaches to troubleshooting your network.
Outside In or Inside Out