Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
61 Cards in this Set
- Front
- Back
What are the steps that occur between the client and DHCP server, so that the client can obtain an IP address.
|
Discover (client)
Offer (server) Request (client) Ack/Nack (server) Page 6 |
|
What is a Nack and what are some possible reasons for receiving one.
|
Nack = Non Acknowledgement (server)
It is possible to receive a Nack message from the DHCP server when the servers database is full (all IPs are being used), when the client requests the wrong address due to subnet error, or when the clients lease has expired and it cannot be renewed. Page 5 |
|
What are the benefits of DHCP.
|
DHCP provides:
Centralized Administration of IPs Flexible Scalable Seamless Page 3-4 |
|
What is the DHCP Scope, and what are two ways to make the scope more specific.
|
The Scope refers to the range of available IPs on the DHCP server.
You can further specify your scope with Exclusions and Reservations. Page 16-19 |
|
What is an Exclusion in a DHCP scope.
|
It is a group of IPs that will be Excluded from the IP scope to be offered out to clients. Static IPs on the network should be contained inside these exclusions.
Page 17 |
|
What is a Reservation in a DHCP scope.
|
A Reservation is a reserved IP address within the available DHCP scope. They tie a IP address to a MAC address.
A reservation cannot be within an Exclusion Page 19 |
|
What is the IP address associated with APIPA
|
169. . .
Page 11 |
|
What is the length of time between the automatic checks for the DHCP server
|
5 minutes
page 12 |
|
How long can the lease time be set for a particular IP
|
Unlimited
|
|
What are the two records associated with the DHCP server
|
(A) Record
PTR Record Page 33 |
|
What is the A Record, and when is it used.
|
The A Record is an association of the Hostname with the IP, from a client (Win 2k and on), and from the DHCP server (pre Win 2k)
Page 33 |
|
What is the PTR Record, and when is it used.
|
The Pointer (PTR) record is used as an association of the IP address with the Hostname, and comes from the DHCP server.
Page 33 |
|
What are the four ways of managing the DHCP database.
|
Backing up and Restoring
Reconciliation Compacting Removal page 39 |
|
What is DHCP Database Reconciliation.
|
Reconciliation is a verification between the Database values and the Registry values.
This should be ran whenever the database does not have the most recent values, or the database is correct but the console displays them incorrectly Page 42 |
|
What is DHCP Database Compacting.
|
Compacting is recovering unused space. This is done through the JETPACK.EXE command:
jetpack.exe (target) (destination) Page 43 |
|
What is the Root Domain annotated by.
|
A Period
|
|
What are the Three Main DNS zones
|
Primary
Secondary Stub Page 67 |
|
What are the properties of a Primary Zone
|
The Primary Zone hosts a read/write copy of DNS.
Page 67 |
|
What are the properties of a Secondary Zone
|
The Secondary Zone hosts a read-only copy of DNS from the primary zone.
Page 67 |
|
What are the properties of a Stub Zone
|
A Stub Zone contains only the records that are necessary to identify who the authoritative DNS server is in its zone.
Page 68 |
|
What are the two type of Active Directory Integrated Zones.
|
Forward look up zone
Reverse look up zone Page 69 |
|
What is a Forward Look up zone.
|
Associates Hostname to IP
Page 70 |
|
What is a Reverse Look up zone.
|
Associates IP to Hostname
Page 70 |
|
What are the benefits of an Active Directory Integrated Zone
|
Fault Tolerance
Security Zones Multimaster Efficient Replication |
|
What is Multimastering
|
Means all AD Integrated Zones zone files are read/write, meaning that they can be updated on whatever domain controller has the zone file
Page 69-70 |
|
What is an iterative query
|
A DNS query where the DNS server will give its best answer referring to INSIDE Servers
Page 82-83, 106 |
|
What is a recursive query
|
A DNS query where the DNS server will get a definitive answer by referring to OUTSIDE Servers
Page 84-85, 106 |
|
What is a delegation record
|
This record is stored in the parent zone, and has the name of the authority in a child zone.
It tells the DNS server of the parent zone who the DNS authority is of a child zone. Example: (who is the authority of the Command....the CO) Page 81 |
|
What is a glue record
|
This record is stored on the Name server of the parent zone, and serves as the "A" record for the DNS authority of a child zone
Example: (What is the authority of the Commands name....CAPT John Smith) Page 81 |
|
What are the 3 DNS security zone levels
|
Low
Medium High Page 125-127 |
|
What would be the reason that a recursive query does not work.
|
Root Hints
|
|
What 2 IPCONFIG commands help you with DNS cache, what do they do.
|
ipconfig /displaydns - views cache
ipconfig /flushdns - purges cache Page 124 |
|
If you use the NSLOOKUP command prompt entry and provide the hostname, what are you requesting.
|
The IP address or addresses associated with the host name.
Page 107 |
|
Considering network security, what is authorization.
|
Authorization is what a user can do after being authenticated to the network.
page 146 |
|
What 2 fundamentals can help you have effective security
|
Security Baselines and Incremental Templates
page 152 |
|
What is the principle of least privilege
|
This principle states that no user or object should be given anymore privileges than are needed.
page 154 |
|
Does the principle of least privilege apply to the network administrator.
|
Yes
page 154 |
|
What feature can the administrator use, so that he can complete his job, but maintain the principle of least privilege.
|
Run As
page 155 |
|
What are the 3 MMC Snap-ins that help maintain and manage network security
|
Security Configuration and Analysis
Security Templates Group Policy page 163-168 |
|
What command line entry can used to configure and analyze your network, instead of the mmc snap in
|
Secedit
page 166 |
|
Instead of waiting for the default waiting time before policy refreshes, what command can you use to instantly refresh policies.
|
Gpupdate
page 168 |
|
Can the Microsoft Baseline Security Analyzer be used across multiple computers.
|
yes
page 169 |
|
what does the word Cipher refer to
|
Encryption
page 162 |
|
Can a compressed file be encrypted too
|
No
Page 161 |
|
What are the 3 states of data, and which does encryption protect
|
The 3 States are:
Storage, Process, Transit Encryption protects data in the storage state. page 161 |
|
What File System is required to grant permissions and encryption to files and folders
|
NTFS
page 148, 160 |
|
What are the two IPsec protocols
|
AH (authentication header) Protocol
ESP (encapsulating security payload) Protocol page 182 |
|
What is the AH Protocol
|
the AH Protocol is a security protocol under IPsec which provides authentication, integrity, and anti replay, but not confidentiality for the whole packet being transported.
page 182 |
|
What is the ESP Protocol
|
the ESP protocol provides everything the AH protocol provides including Confidentiality, however it only protects the data portion of a packet being transported
page 182 |
|
What is IKE (internet key exchange)
|
allows two peers to determine a secret key by exchanging unencrypted values over a public network
page 184 |
|
what does the NETSH command do
|
it can display or modify the local or remote network configurations (win 2k3 server). Can either be static or dynamic
|
|
What is feature can you quickly use to show which applications and processes are running on the system.
|
Task Manager
Page 280-282 |
|
In order for the performance monitor to be able to send messages when there are alerts, what services must be on.
|
the Alerter Service must be started on the machine that is monitoring.
the Messenger service must be started on the machine that is receiving the message. page 287 |
|
What tab is used to schedule the start and stop of an alert.
|
The schedule tab.
page 288 |
|
What is the difference between Netmonitor Lite and standard
|
Netmonitor lite - monitors traffic to and from itself.
Netmonitor standard - monitors all traffic across the network, and see where other network monitors are running page 290 |
|
The repair button, to run an automatic series of commands to troubleshoot network connectivity can be located where
|
under the support tab of the network interface window
page 296 |
|
Which account runs most of the services.
|
the Local system account.
page 302 |
|
What are two important Ipconfig commands that are ran during a network repair
|
ipconfig /flushdns and ipconfig /registerdns
page 296 |
|
What is needed to connect a client to a network.
|
IP Address, Default Gateway, DNS
Page 296 |
|
What is Netdiag.
|
It is a command that can help the administrator isolate network connectivity problems.
|
|
What are the two basic approaches to troubleshooting your network.
|
Outside In or Inside Out
|