Phase 2 Flashcards

(50 cards)

1
Q

What command puts the VyOS router into configuration mode?

A

conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What command is used to create a new configuration setting in VyOS (assume you are in configuration mode)?

A

set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What command is used to remove a configuration setting in VyOS (assume you are in configuration mode)?

A

del

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What command is used to display a configuration setting in VyOS (assume you are in configuration mode)?

A

show

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Match the following Regional Internet Registries to their respective regions.

ARIN-
LACNIC-
APNIC-
RIPE NCC-
AFRINIC-

A

– antarctica, canada, parts of the caribbean and USA
– most of the caribbean and all of latin america
– east asia, oceania, south asia, southeast asia
- europe, central asia, russia, and west asia
-Africa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Since modern Windows systems have PowerShell preinstalled, it really is no longer necessary to know the command line interface.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Many Linux commands will work in a Windows Command Shell by default

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Many Linux commands will work in Windows PowerShell by default.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All PowerShell scripts can run by default in Windows 10.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most PowerShell commands can be piped into other commands.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Using which combination of PowerShell commands can all the files in a directory have their filenames changed?

A

Get-ChildItem | Rename-Item

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Get-ChildItem is limited in that it cannot find Hidden Files.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Get-ChildItem is limited in that it cannot search through sub-directories.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the default file type for importing into an LDAP directory service?

A

ldif

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

LDAP is only available in a Linux environment, while Active Directory is available in Windows.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why would the IDS/IPS devices use NICs in promiscuous mode without having assigned IP addresses?

A

Makes it harder for hackers to know they are present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does port mirroring do on a router?

A

Copies all traffic destined for one port onto a second port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is promiscuous mode for a NIC?

A

Allows the NIC to pull all traffic that comes across it, even if it isn’t the source or estination address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What the Protocols to the following ports?

80-
443-
20,21-
25-
22-
53-

A

HTTP
HTTPS
FTP
SMTP
SSH
DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the following iptables rule do?

iptables -A INPUT -s 13.14.0.0/16 -j DROP

A

Drop all incoming traffic on the 13.14.0.0/16 address range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

We have ran out of IPv4 addresses. Which technology allows us to minimize the use of public IP addresses in our network?

22
Q

What does Port Forwarding allow us to do?

A

Expose an internal IP/Port by redirecting external communication requests on one address and port combination to the internal IP/Port

23
Q

What is the name of the attack where an adversary relays communication between two parties who believe they are communicating with each other?

A

Man-in-the-middle

24
Q

What is ARP?

A

Mapping between MAC addresses and IP addresses

25
Which of these is not an advantage of a proxy server?
Eliminates the need for routers
26
If I need to ensure secure traffic between my remote workers and the internal corporate network, which would be the best solution?
VPN tunnel
27
What is a DOS attack?
An attempt to overwhelm a resource to make it unavailable
28
What is a /23 network in octets?
255.255.254.0
29
What is 255.255.128.0 in CIDR notation?
/17
30
Identify the network devices by their function Hub- Switch- Router-
Hub – sends packets to all other devices attached Switch– sends packets to devices using the hardware address of the device Router– sends packets between computer networks
31
What is Network Address Translation?
Manages internal (private) IP addresses and maps them to an external (Public) IP address and port
32
Which of these holds configurations and other settings for applications in a Windows system?
Registry
33
Which configuration tool can be used to force a safe boot in Windows?
msconfig
34
Active Directory and LDAP can not be used on the same domain
False
35
PowerShell can be used to administer local users and groups on a workstation remotely.
True
36
Microsoft Accounts can be used to keep some applications in sync across devices.
True
37
All Active Directory domains must act completely independently and cannot share information across domains.
False
38
In which directory is the hosts file in a Windows 10 System?
\windows\system32\drivers\etc\
39
Which two ports are standard for LDAP servers?
389, 636
40
A non-privileged account is put into a Domain Admin GPO group inappropriately. Will the user acquire any administrative privileges?
Yes, if the Domain Admin Group allows administrative privileges not explicitly denied by the user's other groups.
41
I am partitioning a 1 Terabyte hard drive solely for Windows use. Which file format would be the best option?
NTFS
42
43
44
45
45
46
47
47
48