General Knowledge Flashcards
nslookup
Command Line Tool used to query DNS. Map an IP address to a Domain name.
*obtain Domain Names
*IP address mapping details
*DNS records
Dig
Linux Command Line Tool similar to NSlookup
nmap
Command Line Tool used to analyze the Network for all open/ closed ports.
Active Directory
Active Directory (AD) is Microsoft’s proprietary directory service. It runs on Windows Server and enables administrators to manage permissions and access to network resources. Active Directory stores data as objects. A centralized Database.
Objects:
*Resources (Printers)
*Users (Groups)
*Computers
Domain Services (AD)
Active Directory Domain Services (AD DS). This is the main service of AD which stores directory information and handles the interaction of the User with the Domain. It controls which users have access to each resource or Group Policy.
Domain Controller
A domain controller is a SERVER that responds to authentication requests and verifies users on computer networks. The primary function of domain controllers is to authenticate and validate users on a network, including group policies, user credentials, and computer names to determine and validate user access. A domain controller, is simply a server running Active Directory that authenticates users and devices. Multiple domain controllers can be deployed within a domain to provide fault tolerance and load balancing.
*OS (Windows or Linux)
*LDAP
*Network Time Service (NTP)
*Network Authentication Protocol (Kerberos)
DNS
Domain Name System. The Phonebook of the Internet that connects Web Browsers with Website. Humans access information online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so browsers can load Internet resources.
NTP
Network Time Protocol. An internet protocol used to synchronize with computer clock time sources in a network. It belongs to and is one of the oldest parts of the TCP/IP suite.
NTPD
Network Time Protocol Daemon. An Operating System Program that maintains the System Time in synchronization with Time Servers using the NTP.
Group Policy
Group Policy is a feature of Active Directory that allows administrators to define and enforce settings and configurations for users and computers within a domain. Group Policy settings can control security policies, software deployment, desktop configurations, and more.
Virtual Machine
A virtual machine (VM) is a digital version of a physical computer. Virtual machine software can run programs and operating systems, store data, connect to networks, and do other computing functions, and requires maintenance such as updates and system monitoring. The only difference is that it resides inside a computer. There can be multiple virtual machines that reside inside one physical computer.
Hypervisor
Also known as a Virtual Machine Monitor (VMM) - is a software that creates and runs the virtualization. It allows multiple operating systems (OS) to run simultaneously on the same hardware, each within its own isolated virtual environment.
Type 1 (Bare Metal) - runs directly on the Physical Hardware of the Host system.
Type 2 (Hosted) - runs on top of an existing OS, known as the Host OS.
Hypervisors play a crucial role in virtualization technology, enabling organizations to achieve better resource utilization, scalability, flexibility, and cost savings by consolidating multiple workloads onto a single physical server infrastructure. They are widely used in data centers, cloud computing environments, and desktop virtualization solutions.
Email Flow
1 - Bob composes Message via Email Client
2 - Sends Email
3 - Client connects to Email Server (SMTP)Data is routed through Network Connection
4 - SMTP receives Email and relays data to Recipient Email server
5 - Susan email server receives Email data and processes spam filtering, virus scanning, recipient validation
6 - Email is delivered to mailbox or mail queue
7 - Email client downloads Email from Server
8 - Susan reads Email message
Risk Tolerance
Risk tolerance refers to an individual’s or entity’s willingness and ability to endure fluctuations in the value of their investments or to accept the potential loss of capital in pursuit of higher returns.
Risk tolerance refers to the general level of risk the firm is WILLING TO ACCEPT, not the precise financial impact threshold for action.
Encryption Algorithm
An encryption algorithm provides a structured method for converting plaintext into ciphertext. A good algorithm ensures data remains confidential and secure from unauthorized access.
*Confidential
Digital Signatures
Digital signatures validate the authenticity and integrity of a message or document, ensuring it hasn’t been tampered with since being signed.
*Integrity
Cipher Block
Refers to a fixed-size portion of data that an encryption algorithm processes. (Encryption Algorithm)
Hash Function
A hash function takes input and returns a fixed-size string, typically used for verifying data integrity, but it does not encrypt data for the purpose of confidentiality.
*Integrity
Endpoint Protection
Includes installing Antivirus, Anti-malware, and firewall software on systems or devices. This software helps protect systems and devices from known vulnerabilities.
Patching
Patching is a mitigation technique that can help prevent exploitation of known vulnerabilities on systems and devices by updating them with the latest security fixes and enhancements. Patching involves applying patches or updates to all software and systems, not just those that provide host security like firewalls.
Least Privilege
Least privilege is a mitigation technique that limits users to the level of access and privilege they need to do their work. This can limit the extent of an attack by limiting the attacker’s access and privilege to those of the compromised user. Least privilege involves applying predefined rules and permissions, such as roles, groups, and functions and enforcing the rules and permissions through mechanisms such as passwords, tokens, and biometrics.
*Applicable to Users, not Applications
End to End Encrypted Email
Implementation of end-to-end encrypted email ensures emails are decipherable only by the intended recipient, safeguarding sensitive content.
Host Based Firewall
Host-based firewall is a hardening technique that can help protect a system or device from unauthorized or malicious network traffic. Host-based firewalls by use software to filter and control incoming and outgoing network traffic by using predefined rules and policies. The policies and rules are based on criteria such as source and destination IP address, port number, protocol. Host-based firewall involves installing software on a system or device.
Encryption
Encryption is a mitigation technique that involves using mathematical algorithms to transform data into an unreadable format. Encryption can protect data from unauthorized access or modification, as only those who have the secret key or algorithm can decrypt the data. Encryption will not stop data from entering a host machine.