TripAdvisor RD 3 Flashcards

(160 cards)

1
Q

What does the OSI model stand for?

A

Open Systems Interconnection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which layer of the OSI model is responsible for routing data between networks?

A

Network Layer (Layer 3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does TCP stand for in networking?

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of DHCP in networking?

A

Assigns IP addresses automatically to devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In the OSI model, which layer deals with MAC addresses and switches?

A

Data Link Layer (Layer 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main function of the Physical Layer in the OSI model?

A

Handles the physical connection between devices (cables, signals)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does DNS do in a network?

A

Translates domain names into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which protocol is used for securing communication over the internet?

A

HTTPS (Hypertext Transfer Protocol Secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is NAT in networking?

A

Network Address Translation – translates private IPs to public IPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does VLAN stand for in networking?

A

Virtual Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the role of the default gateway in a network?

A

Directs traffic from the local network to external networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which network tool shows the path packets take to reach a destination?

A

Tracert (Windows) / Traceroute (Linux/macOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does UDP stand for, and what is it used for?

A

User Datagram Protocol – used for faster, less reliable communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does IP stand for, and what does it handle?

A

Internet Protocol – handles routing and addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the key responsibilities of a network router?

A

Forwards data between networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between TCP and UDP?

A

TCP is reliable with error correction; UDP is faster but less reliable. TCP is connection-orientated while UDP is connection-less.

UDP - Gaming, Video Streaming
TCP - Web Browsing, file transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a firewall’s primary function in a network?

A

Monitors and controls incoming and outgoing network traffic based on security rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does IPv4 stand for?

A

Internet Protocol version 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is CIDR notation used for in networking?

A

Defines the size of a network (e.g., 192.168.1.0/24)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which OSI layer manages sessions between applications?

A

Session Layer (Layer 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does ARP work in a network?

A

Resolves IP addresses to MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the purpose of port 443 in networking?

A

Secure web traffic (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What network issue does Spanning Tree Protocol (STP) prevent?

A

Network loops

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a subnet in IP networking?

A

A segmented portion of a larger network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the key role of the Transport Layer in the OSI model?
Ensures reliable data transmission (handles ports, error correction)
26
What is the difference between a switch and a router in networking?
A switch connects devices within a local network, while a router connects different networks
27
What does DNS stand for, and what is its primary function?
Domain Name System – translates domain names into IP addresses
28
What is multicast in networking?
Sends data to multiple recipients who subscribe to a group
29
What does a 'broadcast' mean in a network context?
Data sent to all devices on a local network
30
What is the purpose of VLAN tagging in networking?
Identifies and separates network traffic within a VLAN
31
What does an IP address conflict mean in networking?
Two devices on a network are assigned the same IP address
32
How does a ping command help in network troubleshooting?
Tests connectivity between two devices
33
What is the role of an access point (AP) in a network?
Provides Wi-Fi connectivity to wireless devices
34
What does RDP stand for, and what is it used for?
Remote Desktop Protocol – allows remote access to Windows desktops
35
What is a 'subnet mask' used for in networking?
Determines the network portion of an IP address
36
What is the function of the Presentation Layer in the OSI model?
Translates data between the application and lower layers (handles encryption, compression) (Layer 6)
37
What does ICMP stand for, and what is it used for?
Internet Control Message Protocol – used for network diagnostics (e.g., ping)
38
What is a 'loopback address' in IP networking?
127.0.0.1 – a special IP address that is used to test network functionality on a local machine. It points back to itself so you can do things like localhost hosting.
39
What network tool provides detailed information about a device’s network configuration?
Ipconfig (Windows) / Ifconfig (Linux/macOS)
40
What is Wireshark used for in networking?
Captures and analyzes network traffic at the packet level
41
What is port forwarding in networking?
Directs external traffic to a specific device or service on a local network
42
What does an Ethernet switch do in a network?
Connects devices within a LAN and forwards data to the correct destination based on MAC addresses
43
What does BGP stand for, and what does it handle?
Border Gateway Protocol – handles routing between autonomous systems on the internet by defining and publishing paths
44
How does DNS caching improve network performance?
Reduces DNS lookups by storing previous queries locally
45
What is the difference between public and private IP addresses?
Public IPs are accessible over the internet, private IPs are used within a local network
46
What is a proxy server's role in networking?
Acts as an intermediary between a client and the internet, often used for security and performance optimization
47
What is a firewall rule?
A security policy defining which traffic is allowed or blocked by the firewall
48
What is an IPsec VPN used for?
Secure communication over an untrusted network, such as the internet
49
What is the purpose of the Application Layer in the OSI model?
Provides network services to end-user applications like browsers and email clients
50
What is the role of SNMP in network management?
Simple Network Management Protocol – used to monitor and manage network devices
51
What is a MAC address used for in networking?
Identifies a device on a local network
52
What does SSH stand for, and what is it used for?
Secure Shell – used for secure remote access to devices
53
What is the primary purpose of a VPN in a network?
Provides a secure, encrypted connection over the internet
54
What does BYOD stand for in a corporate network?
Bring Your Own Device
55
What is Intune used for in device management?
Manages devices and apps in a corporate network
56
What is the function of BitLocker in Windows devices?
Encrypts hard drives for data protection
57
How does conditional access improve security in networks?
Allows access based on predefined security conditions like device compliance
58
What does MFA stand for, and why is it important?
Multi-Factor Authentication – adds an extra layer of security
59
What is the purpose of endpoint security in network management?
Protects devices in a network from threats like malware and unauthorized access
60
What is a cloud service provider?
A company that provides cloud computing resources like storage, servers, or databases
61
What does SaaS stand for in cloud computing?
Software as a Service
62
What is the purpose of a hypervisor in virtualization?
Manages virtual machines on a physical server
63
What does IaaS stand for in cloud services?
Infrastructure as a Service
64
What is PowerShell used for in Windows environments?
Automates administrative tasks and configurations
65
What is the role of a domain controller in a network?
Manages authentication and user access within a domain
66
What is Active Directory?
A Microsoft service for managing and organizing users, devices, and resources in a network
67
What is a script block in PowerShell?
A collection of commands or code executed as a single unit
68
What does RBAC stand for in Intune management?
Role-Based Access Control
69
What does Azure AD stand for, and what is its role?
Azure Active Directory – manages identity and access for users and services in the cloud
70
What is a compliance policy in Intune?
A set of security requirements devices must meet to access corporate resources
71
How does autopilot simplify device deployment in Windows?
Automates the setup and configuration of new devices
72
What does JAMF specialize in?
Managing Apple devices like iPhones and MacBooks
73
What is the purpose of Microsoft Defender ATP?
Provides advanced threat protection and monitoring for devices
74
What is mobile application management (MAM) in Intune?
Controls how corporate apps and data are used on mobile devices
75
What is a security baseline in Intune?
Predefined security settings applied to devices to ensure compliance with best practices
76
What is the primary function of a VPN gateway?
Connects two networks securely over the internet
77
What does MDM stand for in device management?
Mobile Device Management
78
What is an Azure resource group used for?
Organizing and managing related Azure resources
79
What does cloud elasticity refer to?
The ability to scale resources up or down based on demand
80
What is the purpose of a virtual private cloud (VPC)?
Creates an isolated virtual network within a public cloud
81
What is the purpose of encryption in cybersecurity?
Protects data by converting it into an unreadable format without the proper key
82
What does DDoS stand for in cyberattacks?
Distributed Denial of Service
83
What is a honeypot in network security?
A decoy system designed to lure attackers and study their behavior
84
What is Zero Trust in cybersecurity?
A security model where no user or device is trusted by default
85
What is phishing in the context of cybersecurity?
A fraudulent attempt to steal sensitive information by posing as a trustworthy entity
86
What is the role of a network firewall in cloud environments?
Filters and monitors incoming and outgoing traffic to protect cloud resources
87
What is the role of VPN in remote work?
Ensures secure access to corporate resources from remote locations
88
What does IDS stand for in network security?
Intrusion Detection System
89
What is the purpose of a DMZ in network architecture?
A buffer zone between internal networks and external threats, often used for web servers Host web servers that are publicly facing.
90
What is an API gateway used for?
Acts as a central hub that manages and routes client requests to various backend services while providing security, load balancing, caching, and monitoring.
91
What is a bastion host in cloud security?
a specially configured server designed to provide secure access to an internal network from an external network, serving as a controlled entry point for administrators or users.
92
What is the role of a load balancer in networking?
Distributes incoming traffic across multiple servers to ensure high availability
93
What does SSL stand for, and why is it important?
Secure Sockets Layer – used to encrypt data over the internet
94
What is the purpose of backup and disaster recovery in IT?
Ensures data can be restored in case of failure or data loss
95
What is social engineering in the context of cybersecurity?
Manipulating people into revealing sensitive information
96
What is a public key in encryption?
A key used to encrypt data, which can only be decrypted by a corresponding private key
97
What is SaaS used for in business environments?
Provides access to software applications over the internet without local installation
98
What is the difference between an SSD and an HDD?
SSDs (Solid State Drives) are faster, more durable, and energy-efficient than HDDs (Hard Disk Drives), which use mechanical parts and are generally slower and less resilient.
99
What is DevOps, and why is it important in IT?
A practice combining software development and IT operations for faster, more reliable releases
100
What is the role of a CDN in content delivery?
A content delivery network improves speed and availability of content by distributing it across multiple locations
101
What is the structure of a PowerShell cmdlet?
Verb-Noun
102
Give an example of a cmdlet that retrieves a list of processes in PowerShell.
Get-Process
103
How do you filter running services in PowerShell?
Piping your commands Get-Service | Where-Object { $_.Status -eq 'Running' }
104
How do you create a new user in Azure Active Directory (Azure AD) using PowerShell?
New-AzureADUser -DisplayName "John Doe" -UserPrincipalName "john.doe@domain.com" -PasswordProfile $PasswordProfile
105
What cmdlet retrieves all Azure AD users?
Get-AzureADUser
106
How do you install the Azure PowerShell module?
Install-Module -Name Az
107
What PowerShell cmdlet allows you to list all installed modules?
Get-Module -ListAvailable
108
How do you set an alias for the cmdlet Get-ChildItem in PowerShell?
Set-Alias ll Get-ChildItem
109
What is a pipeline in PowerShell?
A mechanism for passing the output of one cmdlet as input to another cmdlet
110
How do you write the names of running services to a text file in PowerShell?
Get-Service | Where-Object { $_.Status -eq 'Running' } | Out-File "RunningServices.txt"
111
What is the -Name parameter used for in PowerShell?
It is used to filter results by name
112
How can you kill a process by its name in PowerShell?
(Get-Process -Name "notepad").Kill()
113
What cmdlet is used to view the properties of a process in PowerShell?
Get-Process | Get-Member
114
How do you create a custom function in PowerShell?
Define it with function Function-Name { }
115
What is a script block in PowerShell?
A chunk of code that can be executed as a single unit
116
How do you open the PowerShell profile for editing?
notepad $PROFILE
117
What is the PowerShell cmdlet to check the current execution policy?
Get-ExecutionPolicy
118
How do you set the PowerShell execution policy to allow running remote scripts?
Set-ExecutionPolicy RemoteSigned
119
How do you format output as a table in PowerShell?
Get-Process | Format-Table
120
How do you format output as a list in PowerShell?
Get-Service | Format-List
121
What is a PowerShell variable prefixed with?
$
122
How do you define a global variable in PowerShell?
$Global:VariableName = "Value"
123
What cmdlet would you use to create a new Azure resource group?
New-AzResourceGroup
124
How do you handle errors in PowerShell scripts?
By using Try, Catch blocks
125
What is the purpose of Conditional Access Policies in Azure AD?
To control access to resources based on specific conditions
126
What cmdlet lists all aliases in PowerShell?
Get-Alias
127
What are the four main cmdlets in PowerShell for managing objects?
Get-, Set-, New-, Remove-
128
How do you create a custom alias that persists across PowerShell sessions?
Add the alias to your profile using Add-Content $PROFILE
129
How do you retrieve all properties of a running process using PowerShell?
Get-Process | Select-Object -Property *
130
How can you loop through a list of services using PowerShell?
By using the foreach statement
131
What is device enrollment in Intune?
The process of enrolling devices for management, which can be automated or user-initiated.
132
What is Windows Autopilot?
A tool that automates the setup of new Windows 10/11 devices for management.
133
What is Apple Device Enrollment?
A method for enrolling Apple devices like iPhones or iPads using Apple Business Manager or manual enrollment.
134
What are compliance policies in Intune?
Security settings that devices must meet to comply with organizational requirements.
135
What are configuration profiles in Intune?
Profiles used to manage specific settings on enrolled devices.
136
What is Conditional Access in Intune?
A security feature that restricts access to corporate resources based on device compliance.
137
How does Intune handle app deployment?
It allows pushing apps to devices, including Office 365, line-of-business apps, and custom apps.
138
What is Mobile Application Management (MAM) in Intune?
A feature that protects corporate data at the app level without full device management.
139
What are security baselines in Intune?
Predefined security settings that ensure devices meet a basic security standard.
140
What is Microsoft Defender ATP integration in Intune?
A security feature that integrates with Defender ATP for compliance and threat detection.
141
What is Windows Autopilot used for?
Simplifying deployment of new Windows devices by preconfiguring them for users.
142
What are firewall configurations in Intune security policies?
Rules that manage inbound and outbound traffic on enrolled devices.
143
What is the role of antivirus policies in Intune?
Enforcing protection on devices using Defender for Endpoint.
144
How does Intune enforce disk encryption?
By managing BitLocker for Windows and FileVault for macOS.
145
What is the difference between Intune and JAMF?
JAMF excels in managing Apple devices, while Intune manages cross-platform environments.
146
What is Microsoft Endpoint Manager?
A suite that includes Intune and Configuration Manager (SCCM) for managing devices.
147
What are Intune compliance policies?
Rules ensuring that devices meet security standards such as encryption and password requirements.
148
How does Azure AD Conditional Access integrate with Intune?
It ensures only compliant devices can access sensitive resources.
149
What is Mobile Application Management without device enrollment?
A feature that controls corporate data in apps without full device management.
150
What are device configuration profiles in Intune?
Settings that manage Wi-Fi, VPN, and email configurations on devices.
151
What is Windows Autopilot deployment?
A zero-touch deployment method for pre-configuring new Windows devices.
152
What is Intune Role-Based Access Control (RBAC)?
A system using Azure AD roles to control access to device management features.
153
What is the importance of reports in Intune?
They provide data on compliance, device health, and app usage.
154
How does Intune integrate with Microsoft Defender for Endpoint?
By enforcing security policies on devices through Defender integration.
155
What is the role of Windows device enrollment in Intune?
It automatically enrolls devices using methods like Azure AD Join or Windows Autopilot.
156
How does Bring Your Own Device (BYOD) enrollment work in Intune?
It allows users to enroll personal devices while limiting corporate control.
157
What is the purpose of device restrictions in Intune?
To control specific device features like camera or Bluetooth.
158
What is the function of email profiles in Intune?
Automatically configuring email settings for devices.
159
What is the significance of PowerShell scripts in Intune?
They allow custom configurations that are not covered by native Intune settings.
160
How does Windows Autopilot streamline device setup?
By automating the configuration process and enrolling devices in Intune.