4: Windows OS
4: Linux OS
5: Devices
5: NAT and VPN
5: Network Security
100

To _______ _______ and access to a system you can limit privileges (especially admin privileges), change default passwords, require password to be complex, require multi-factor authentication, and use biometric or one-time password devices.

Control Login

100

The command used to see the installed RPM packages on the computer system.

yum


yum list installed

100

A tunnel between 2 endpoints - usually with the purpose of encrypting information between them.

VPN - Virtual Private Network

100

Define NAT

Network Address Translation

100

The 8 Steps of creating a Manageable Network Plan according to the NSA.

1. Prepare to Document

2. Map Your Network

3. Protect Your Network: Network Architecture

4. Reach Your Network: Device Accessibility

5. Control Your Network: User Access

6. Manage Your Network Part 1: Patch Management

7. Manage Your Network Part 2: Baseline Management

8. Document Your Network

200

1. This is a set of consistent requirements that a host device SHOULD meet before being allowed onto your network.

2. The set of consistent requirements that a host device MUST meet before being allowed onto your network is this other type.

1. Configuration Baseline

2. Security Baseline

200

The command line utility used to provide information about the network architecture and layout.

nmap

200

A device that connects physical ports using logical port numbers (that could potentially be changed) to each other.

Router

200

Name the 3 general VPN protocols.

Carrier Protocol (such as IP)

Tunneling Protocol (such as PPTP or L2TP)

Passenger Protocol (for data being transmitted)

200

The buffer network or subnet that is between the private network and the open Internet.

DMZ - Demilitarized Zone

300

_______ _______ is the activities and process involved in applying a hotfix, patch, or Service Pack.

Patch Management

300

Command used to check for sockets that are currently open on your sysetm.

netstat

-a  /  -l  /  -s  /  -i

-l is a lowercase "L" and is not the "pipe"

300

A security appliance that tries to combine as many types of security solutions together as possible is referred to as this.

All-In-One (AIO) Security Appliance

300

Name 3 of the specific VPN Protocols mentioned.

Point-to-Point Tunneling

Layer 2 Forwarding

Layer 2 Tunneling

Internet Protocol Security

Secure Sockets Layers (SSL)

Transport Layer Security (TLS)

300

Define UTM

Unified Threat Management

* This is the most common type of all-in-one security appliance.

400

This is the process of increasing the security of devices and software - especially in relation to an OS.

Hardening or System Hardening

400

This can provide you with a way to locate open ports within your computer system.

nmap

400

This connects local ports to other local ports and includes trunking connections.

Switch

400

NAT allows us to create personal networks while also using the Internet and larger networks that can also be connected together. How does it do this?

A single IP address is used to provide access from the personal network (usually smaller) to the larger network / Internet via a Gateway Router.

400

URL / website content filtering, gateway email spam filters, encryption, proxies, anti-phishing software, and data loss prevention are this.

Types of Web Threat Protection

500

The main, built-in security firewall for Windows.

Microsoft Windows Defender

500

The 3 possible actions that can be performed using an iptable.

Accept, Drop, or Reject

500

This is a device specifically aimed at keeping the network safe from outside threats and actors.

Firewall

500
Another name for One-to-One NAT or Port Forwarding.

Static NAT

500

Define QoS and when you would use it.

Quality of Service is when you shape your bandwidth traffic to guarantee certain services on your system are given enough bandwidth for them to work properly.


* Zoom Meetings / Voice Over IP (VOIP) Phone Calls

M
e
n
u