Term
Put these DHCP messages in chronological order DHCPOffer DHCPAck DHCPDiscover DHCPRequest |
|
Definition
|
|
Term
When do DHCP clients renew their address lease? |
|
Definition
After 50% of the time alotted has passed. If renewal is not achieved, then they retry again at 87.5% |
|
|
Term
A DHCPDiscover packet has the source address of ____ and a destination address of 255.255.255.255 |
|
Definition
|
|
Term
T/F Most of the DHCP leasing packets are communicated through broadcast |
|
Definition
False; they are all broadcast |
|
|
Term
This DHCP leasing packet is sent when a client accepts one of the DHCPOffers by broadcast and asks for an address |
|
Definition
|
|
Term
What must you install on a router to allow DHCP to serve out address information across subnets? |
|
Definition
|
|
Term
How many packets are involved in an address renewal process? |
|
Definition
Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
How many packets are involved in an address renewal process? |
|
Definition
Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
How many packets are involved in an address renewal process? |
|
Definition
Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
How many packets are involved in an address renewal process? |
|
Definition
Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
How many packets are involved in an address renewal process? |
|
Definition
Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
How many packets are involved in an address renewal process? |
|
Definition
Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
How many packets are involved in an address renewal process? |
|
Definition
Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
What type of packets are used in a DHCP address renewal? |
|
Definition
|
|
Term
How can you force a DHCP address renewal? |
|
Definition
|
|
Term
What command can be used to break the bind between a NIC and a DHCP address? |
|
Definition
|
|
Term
In short, what is the 80/20 rule? |
|
Definition
80% of DHCP addresses (scope) are managed by the primary DHCP server, the remaining 20% are managed by a secondary DHCP server |
|
|
Term
How do Relay Agents forward broadcasted DHCP information? |
|
Definition
They translate the broadcasts into unicast packets so that they can traverse between subnets |
|
|
Term
T/F Server options apply to all scopes on the DHCP server, scope options are specific to a per scope basis. |
|
Definition
|
|
Term
T/F When there is a conflict between server options and scope options, the server options take precedence. |
|
Definition
|
|
Term
What does the IPSec policy agent do? |
|
Definition
|
|
Term
Where are local IPSec policies stored? |
|
Definition
In the registry of the local machine |
|
|
Term
Where are domain-member IPSec policies stored? |
|
Definition
In AD and cached in the local registry to the client in which it applies to |
|
|
Term
IPSec Which IPSec mode provides end -to-end security between devices? |
|
Definition
|
|
Term
IPSec Which mode is used by L2TP, VPN's, and Remote Access? |
|
Definition
|
|
Term
_____ mode encrypts only the data portion (payload) of each packet |
|
Definition
|
|
Term
IPSec Which mode provides secure communications between two networks through a single node? |
|
Definition
|
|
Term
IPSec Which mode encrypts both the header and the payload of each packet? |
|
Definition
|
|
Term
T/F Public keys unlock Private keys |
|
Definition
False; Private unlocks public |
|
|
Term
T/F The FEK is used to unencrypt files after it unlocks the public key which encrypted it |
|
Definition
False; the private key unlocks the public key which unlocks the FEK. Then the FEK is usde to decrypt the file |
|
|
Term
IPSec Which mode is used for a site-to-site scenario? |
|
Definition
Tunnel. Think network to network |
|
|
Term
IPSec Which mode is used in a Client-to-Client scenario? |
|
Definition
Transport. Think end to end devices |
|
|
Term
Main mode/Phase 1 deals with establishing authentication between two end points. What are the methods that are used in this mode? |
|
Definition
Kerberos, Digital Certificates, and PSK's |
|
|
Term
This security (encryption) method provides authentication, integrity, and confidentiality services |
|
Definition
Encapsulating Security Payload (ESP) |
|
|
Term
Unlike ESP, this security (encryption) method does not provide encryption of data, nor does it traverse NAT devices |
|
Definition
|
|
Term
IP filter, IP filter list, Filter Action, Security Method, Connection type, Tunnel Setting, and Rule are all components of what? |
|
Definition
|
|
Term
Which kind of encryption is a two way hash algorythm? |
|
Definition
|
|
Term
Out of these three, which is the most secure? Least secure? PSK Kerberos Digital Certificates |
|
Definition
PSK (Least) Digital Certificate (Most) |
|
|
Term
How large of a key is used by DES (Data Encryption Standard)? |
|
Definition
|
|
Term
How large of a key is used by 3DES? |
|
Definition
|
|
Term
44. Which IPSec component actually encrypts the data? |
|
Definition
ESP (Encapsulating Security Payload) |
|
|
Term
What is L2TP most often combined with to add security to the user account as well as the computer account? |
|
Definition
|
|
Term
|
Definition
|
|
Term
Which OSI layer does IPSec work on? |
|
Definition
|
|
Term
T/F The FEK has asymmetric encryption |
|
Definition
False; it is symmetric... it is a single key. Symmetric keys are the combination of a private and a public |
|
|
Term
Where is the FEK stored, other than in the DRF? |
|
Definition
DDF Data decryption field |
|
|
Term
T/F Public Keys encrypt while Private Keys decrypt |
|
Definition
|
|
Term
What is an upstream server, in regards to WSUS? |
|
Definition
It is a server in which other servers are getting their updates from. |
|
|