An encrypted "tunnel" between two networks over the internet.
What is a Virtual Private Network (VPN)?
A command line utility to test whether an IP address or a domain is reachable.
What is ping?
A system where the user must submit at least two different types of credentials.
What is Multi-Factor Authentication?
A fleet of computers that are grouped together for security and centralized administration.
What is a domain?
A security manager reviews roles and grants the minimum necessary permissions. The security manager implemented ____.
What is Least Privilege?
A type of server that forwards traffic from a local network to the internet, providing performance and security benefits.
What is a Proxy?
Automatic Private IP Addresses always begin with ___.
What is 169.254?
____ controls like fences, doors, and locks control access to sites, ____ controls like management oversight are applied and enforced by people, and ____ controls like antivirus and firewalls are applied by digital systems and software.
What are physical, procedural, and logical controls?
A folder or even a drive on a computer that can be accessed by different devices across the network.
A security engineer investigates legacy applications and employees that are still using them. Which of the following user groups represent a security concern?
What is Power Users?
The type of firewall that Windows Defender would be considered.
What is a host firewall?
A command line utility to see the path that a packet takes to its destination.
What is tracert?
A class of software designed to apply security policies to mobile devices in the enterprise.
What is Mobile Device Management?
A computer that hosts file shares.
What is a File Server?
A server administrator sets up static network configurations for servers since they do not want the IP address to change. The administrator sets up the IP address on a 24-bit subnet. What should the administrator set the subnet mask to?
What is 255.255.255.0?
The number of bits in an IPv4 address vs and IPv6 address.
What is 32 bits versus 128 bits.
A command line tool used to troubleshoot issues with port forwarding by determining if ports are open
What is netstat?
A ____ is a way of dividing up a domain into administrative realms.
What is an Organizational Unit?
A command that lets you display a list of servers on your local network.
What is net view?
An administrator sets up a network share for the marketing team to collaborate. The requirement is to protect the files from a user who has local access to the computer that hosts the shared resource. What type of permission should the administrator set up?
What is NTFS?
Applet where network adapters can be configured.
What is the Network Connections applet (ncpa.cpl)?
Command line tool used to query DNS records.
What is nslookup?
A server configured as a _____ stores a database of network information called Active Directory.
What is a domain controller?
The two ways to share files on Windows (not the command line).
What are File Shares and NTFS permissions?
A hacker looks to harvest credentials from users who log in locally. Where should the penetration tester look for users who authenticated locally?
What is the Security Accounts Manager (SAM)?