swedenent sir crimgene exam friday 7 to 8

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards

Box-by-Box Configuration

  • Each network device must be configured separately

  • We troubleshoot each device separately

  • When we need to implement or update network configs, it also must be done to each device separately.

2
New cards

Controller

  • Centralized device or application where the control is located

  • Centralized control plane
    Because all control plane logic is done by the controller

  • A software running on a physical appliance or somewhere in the cloud

3
New cards

SOFTWARE-DEFINED NETWORK (SDN) ARCHITECTURE

The management and control plane functions are separated from the device.
The control plane function is handled by the controller
The management and control plane functions are separated from the device

4
New cards

MANAGEMENT PLANE

Applications

5
New cards

CONTROL PLANE

Controller

6
New cards

DATA PLANE

Router
Switch
Firewall

7
New cards

Windows Server 2003 Edition Standard Edition

Has domain controller, Few roles

8
New cards

Windows Server 2003 Edition Small Business

Does not support being a Domain Controller, includes more roles, designed for peer-to-peer networking and data server functions

9
New cards

Windows Server 2003 Edition Enterprise

Has Domain Controller, includes all roles, strong WAN

10
New cards

Windows Server 2003 Edition Datacenter Edition

The most expensive edition, includes Domain Controller
Supports multiple CPU, 32 GB of RAM, RAID configurations

11
New cards

Windows Server 2003 Edition Web Server Edition

Most affordable,
Has enhanced WAN capabilities
For web servers, FTP servers, and Email Server

12
New cards

Domain Tree

is simply a collection of one or more domains that share a common namespace

13
New cards

FQDN (Fully Qualified Domain Name)

the complete, absolute name of a system within a Windows Server. It uniquely identifies a computer, server, or resource in a domain-based network.

14
New cards

Domain Forest

is a collection of one or more domain trees. The domains in the gma domain tree and the it243.com domain tree could be part of the same forest.
is a secure connection between two domains that allows authentication and resource sharing across them

15
New cards
16
New cards

Parent Domain

18
New cards

Group Policy (GP)

Windows management feature that allows you to control multiple users' and computers' configurations within an Active Directory environment.

19
New cards

CIS Benchmarks

With our global community of cybersecurity experts, we've developed CIS Benchmarks; more than 100 configuration guidelines across 25+ vendor product families to safeguard systems against today's evolving cyber threats.

20
New cards

GROUP SCOPE

Domain local groups are Windows Server groups whose scope is restricted to the specific domain in which they are defined.
A universal group is a security or distribution group that can contain users, groups, and computers as members from any domain in its forest. Universal security groups can be granted rights and permissions on resources in any domain in the forest.

21
New cards

GROUP TYPE

Security groups are used to collect user accounts, computer accounts, and other groups into manageable units.

Distribution groups are used for sending email notifications to a group of people. Security groups are used for granting access to resources such as SharePoint sites. Mail-enabled security groups are used for granting access to resources such as SharePoint, and emailing notifications to those users.

22
New cards

ORGANIZATIONAL UNIT

An organizational unit (OU) is a subdivision within an Active Directory into which you can place users, groups, computers, and other organizational units.

23
New cards

SERVER

Operating System/Application that provides network services to client devices
Can be located in a Physical server, Virtualized Environment, Cloud

24
New cards

TRADITIONAL PHYSICAL SERVER

Has different form factors
Bulky Computer Hardware with Server Operating System

  • Rack

  • Blade

25
New cards

Basic Server Components

  • CPU - multiple processors

  • RAM / 64GB

  • Internal Storage - HDD, SSD

  • Network Interface Cards - multiple

26
New cards

Bare Metal

Server without an Operating System

27
New cards

OPERATING SYSTEM

For a bare metal machine to be a full-fledged server, it needs an Operating System

28
New cards

Server Virtualization

We install multiple operating system instances in a physical server (called Host)
By creating a Virtual Machine (VM)
Emulated physical server
We can create multiple VMs in a single Host

29
New cards

Hypervisors

Software that creates and runs Virtual Machines (VM)

Manages and allocates the host hardware components for each VM

Serves as the supervisor and manager of the virtualized environment

CPU

RAM

STORAGE

30
New cards

Type 1 Hypervisor

Commonly known as Native/Bare Metal

Hypervisor Software is installed directly on top of the bare metal device hardware

VMWARE ESXI

HYPER-V

LINUX KVM

CITRIX XENSERVER

This type is heavily used for server

CPU

RAM

31
New cards

Type 2 Hypervisor

Commonly known as Hosted Hypervisors

Hypervisor is installed "on top" of the host operating system

APP

APP

APP

VMWARE WORKSTATION/HOST

HYPERVISOR

VMWARE FUSION

VIRTUALBOX

PARALLELS FOR MAC

This type is used for software Testing

32
New cards

MAN IN THE MIDDLE ATTACK

Man in the Middle (MITM) attack occurs when cybercriminals place themselves between a two-party communication.
Once the attacker intercepts the communication, they may filter and steal sensitive data and return different responses to the user.

33
New cards

DENIAL OF SERVICE ATTACK (DOS / DDOS)

Denial of Service attacks aim at flooding systems, networks, or servers with massive traffic, thereby making the system unable to fulfill legitimate requests.
Attacks can also use several infected devices to launch an attack on the target system. This is known as a Distributed Denial of Service (DDOS) attack.

34
New cards

SQL INJECTION

A Structured Query Language (SQL) injection attack occurs when cybercriminals attempt to access the database by uploading malicious SQL scripts.
Once successful, the malicious actor can view, change, or delete data stored in the SQL database.

35
New cards

Threat Avoidance, Mitigation, and Acceptance

You can prevent and reduce the risk of attacks on your server to a certain extent. However, for those that manage to bypass your defenses, it is essential to have measures in place to mitigate the impact.
Backup Plans
Risk Management
Awareness and Continuous Learning
Keen Planning and Readiness
Evolution of Defenses
Scanning and Regular Checking

36
New cards

Server Backup (WSB)

feature that provides backup and recovery options for Windows server environments. Administrators can use Windows Server Backup to back up a full server, the system state, selected storage volumes, or specific files or folders.

37
New cards

An Organizational Unit (OU)

Windows Server Active Directory (AD) is a logical container used to organize and manage objects within a domain. It allows administrators to group users, computers, groups, and other OUs for easier management, delegation, and application of Group Policies.

38
New cards

A Data breach

kind of security incident. happens when there is a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.
Availability breach
Integrity breach
Confidentiality breach

39
New cards

Network programmability

  • Python

  • Ansible

  • Puppet and Chef

40
New cards

Control Plane

The control plane function is handled by the controller

41
New cards

THE SOUTHBOUND INTERFACE (SBI)

In an SDN environment, the control plane function is detached from the network device, and is now the job of the “SDN CONTROLLER”.

42
New cards