Chapter 20: Operating System Networking and Network Troubleshooting Flashcards

(74 cards)

1
Q

DNS

A

Domain Name System. A hierarchical and distributed naming system that translates domain names (like www.example.com) into IP addresses (like 192.0.2.1), allowing browsers to load Internet resources. It acts as the “phonebook of the Internet,” enabling users to access websites using human-readable names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Alternate DNS Server

A

If you are having DNS issues set alternate DNS server to 8.8.8.8 or 8.8.4.4 (google public DNS servers) if you can connect your DNS server has an issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ns lookup

A

shows DNS server IP Address. type in web adress if you get a response DNS server is good. If you get time out message DNS server isn’t functional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Every widows system is a member of _____________

A

Every widows system is either a member of a work group or active directory domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Workgroup vs Active directory Domain

A

Workgroup is the most basic type of networking organization. No security, no central administration, old fashioned, but works perfectly fine for small networks.

Active Directory Domain Requires windows server system. Provide incredible security, substantial central administration, very expensive, enterprises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Net BIOS/Net BEUI

A

Original methodology by which Microsoft shared stuff.

Net BIOS - Naming system 15 characters

Net BEUI - What did communication and created connections between systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Net BT

A

Net BIOS over TCP/IP (Net BT) - Got rid of Net BEUI stuff and started using IP Addresses, but kepy naming convention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIFS

A

Common Internet File System - is a network file-sharing protocol that allows applications to read and write to files and request services from server programs in a computer network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SMB

A

Server Message Block - is a network file sharing protocol that enables applications and users to read, write, and request services from devices and servers on a network. It facilitates file sharing, printer sharing, and network browsing, and operates over TCP/IP protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Samba

A

Linux & macOS version of SMB protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

whoami command

A

tells you what user you are currently logged in as.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sharing within a work group

A

Right click folder -> share with “specific people” -> Everyone -> Change permissions to “read/write”

Best practice says give everyone read/write permissions and use NTFS protocol to place restrictions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Active Directory Requires:

A

Domain controller (dedicated server) and windows server system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain Accounts

A

Login credentials stored within the domain server rather than locally on any one computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OUs

A

Organizational units - Container that helps organize groups and users. Folders that network admins use to organize groups and users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Active directory users & computers

A

program used on the directory server in the domain to enable, delete, and modify users and groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Adding new computers to domain

A

Can be added in the active directory users & computers application, but more commonly you will simply go to the new computer and change it from workgroup to domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Domain Admin

A

Has authority to add any computer to domain. Has top authority to modify the Domain. Extremely powerful user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Groups

A

very useful for security purposes. Put users into groups. Helpful for adding rules to groups making new employee enrollment easier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Domain Accounts Perks

A

Allow single sign-on at any device in domain. Share base on domain accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

LAN Manager

A

Sharing methodology Microsoft original.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Unbuntu sharing via built in Samba

A

Settings -> sharing -> toggle on. Files -> other locations -> Shares files here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Apple sharing via built in Samba

A

Apple System Preferences -> make sure user appears as it does in domain -> sharing -> file sharing change to on -> options “share files & folders using SMB”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

net command

A

shows all net commands you can use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
net view command
shows all computers on a network
26
net view [PC Name] command
can see what specified pc is sharing
27
net share {sharename}={pathway to desired share object}
Makes the specified object shared on the network
28
net share
shows what you are sharing on the network.
29
net use v: \\mike10PC\mike
makes a map to the shared folder
30
Net user
shows users on the system
31
net user [name] [password] /add
adds a user
32
net user [name] /delete
remove user
33
Routers
devices that filter and forward traffic based on IP addresses and connect systems on a LAN
34
console port or serial port
have to use a cord in this port into a computer than use a terminal to configure switch
35
DB-9 Connector
has 5 dots along the top 4 along bottom and forms a trapezoid
36
Yost cable or rollover cable
A rollover cable (also known as a Yost cable, Cisco cable, or a console cable) is a type of null-modem cable that is used to connect a computer terminal to a network appliance's console port. Db-( on one end and RJ-45 looking adapter on other end. CISCO framework.
37
SoHo
Small office Home office (SoHo) - common house hold router.
38
First step when setting up a SoHo Router
Change default username and password as soon as possible.
39
Access router
Find the default gateway, use the default gateway IP address in your web browser. Opens an interface with router.
40
DHCP Exclusions
IP addresses outside the scope provided by the DHCP server or are reserved by the server. Addresses on this list will not be given out dynamically.
41
DHCP Server configuration
A static IP can be set on the router if needed or if it is provided by the internet service provider (ISP). DHCP servers must be configured to hand out a pool (or scope) of IP addresses.
42
Time Zone (Router)
You want to ensure your router is on the same time zone as you. in web browser on router interface: System settings -> Time settings -> check routers time zone
43
Diagnostics (Router)
Under the diagnostics section in the web browser on router interface you can check for firmware updates or upgrades. performing these tends to fix lots of problems.
44
Administration (Router)
Change usernames and passwords on router.
45
Local Management (Router)
When on allows anyone connected to LAN who knows router IP address to access it via browser.
46
Remote Management (Router)
How you get to your router on the WAN side. don't turn this on. opens your router up to too much unnecessary risk.
47
Firewall
Blocks traffic based on specified criteria.
48
ACL
Access control list. Limit access to something at a given time or under certain conditions.
49
Principle of Lease Privelage
Only give people enough so they can do what they need to do.
50
Deny and allow lists
Also called Black and white list. Black/Deny list: Blocks all the specified IP addresses in this list. White/Allow list: You can ONLY go to these IP addresses.
51
Stateless firewall
I don't care what's going on I'm going to block this IP address/port number.
52
Stateful firewall
If someone asks to go to a webpage that's fine, but if someone asks to go to a webpage 15 times in a short period firewall will step in in response.
53
Access Policy
set up one policy that defines a port number, time of day, etc. firewalls can be configured to block specific ports and applications
54
DMZ
Demilitarized Zone (DMZ) or screen subnet. Anything that comes from the internet send it to on particular system. Dangerous shouldn't do this.
55
Real DMZ
Your private LAN is separated from your public facing LAN, Webservers or File servers. your private network is behind a separate router with a much more aggressive firewall.
56
Network Edge Firewall
Found in router can stop ports and addresses
57
Host Firewall
Found on the operating system
58
Windows Defender Firewall
Windows OS Host based firewall. Control panel -> windows defender firewall.
59
Exception (firewall)
When you allow a program or port to have in-bound or out-bound permissions
60
Port Forwarding
Your NAT router is going to be looking for a specific port number and send it where you specify. Useful for when you want to access a device you own that is sitting behind a WAN Router.
61
QoS
Quality of Service (QoS) - a tool set that allows you to meter how much bandwidth a device uses.
62
UPnP
Universal Plug & Play (UPnP) - Makes device more visible in networking environment.
63
SMNP
Simple Network Management Protocol (SMNP) - to see much more intense details on devices on the network.
64
SoHo Routers: Service Access Management
Implementing a policy of strong and completely unique passwords Enabling Firewall settings Disabling or highly limiting remote management access
65
Managed vs Unmanaged Switch
Unmanaged Switch is cheaper, you plug into it and it does its job, but can configure it. cheaper. Managed switch is more expensive, but allows for configuration
65
How to Manage a switch
Find out how it gets it's IP Address, type IP address into web browser, configuration screen should open.
66
Guest Network
Provides a separate and isolated Wi-Fi Connection from your primary network.
66
VLANs
Virtual LANs - takes one physical switch and turns it into multiple LANs electronically
67
Can a computer on VLAN 1 and VLAN 2 communicate?
No. A computer plugged into VLAN 1 and another plugged into VLAN 2 will act as if they were on two totally different LANs despite the fact they are plugged into the same switch.
68
Port Security
You tell the switch to memorize the MAC address of every device currently plugged in. If any new device plugs into the switch it will disable the port or notify admin.
69
SDN
Software Defined Networking (SDN) - separates control plane from data plane on networking devices. Devices controlled by central server or device. provides dynamic scaleability.
70
What is the maximum number of characters in an FQDN?
Fully Qualified Domain Names (FQDs) - can have up to 255 characters, including dots.
71
Which is not a type of Windows firewall? -Domain -Enterprise -Private -Public
Enterprise is not a type of windows firewall.
72
Which exposes a LAN host to the Internet?
A demilitarized zone (DMZ) exposes a LAN host to the internet. A firewall blocks access to and from the internet. SMB is a file and print sharing protocol that works within a single network. A whitelist is a type of access control list (ACL)