Term
Put these DHCP messages in chronological order DHCPOffer DHCPAck DHCPDiscover DHCPRequest |
|
Definition
|
|
Term
| When do DHCP clients renew their address lease? |
|
Definition
| After 50% of the time alotted has passed. If renewal is not achieved, then they retry again at 87.5% |
|
|
Term
| A DHCPDiscover packet has the source address of ____ and a destination address of 255.255.255.255 |
|
Definition
|
|
Term
| T/F Most of the DHCP leasing packets are communicated through broadcast |
|
Definition
| False; they are all broadcast |
|
|
Term
| This DHCP leasing packet is sent when a client accepts one of the DHCPOffers by broadcast and asks for an address |
|
Definition
|
|
Term
| What must you install on a router to allow DHCP to serve out address information across subnets? |
|
Definition
|
|
Term
| How many packets are involved in an address renewal process? |
|
Definition
| Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
| How many packets are involved in an address renewal process? |
|
Definition
| Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
| How many packets are involved in an address renewal process? |
|
Definition
| Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
| How many packets are involved in an address renewal process? |
|
Definition
| Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
| How many packets are involved in an address renewal process? |
|
Definition
| Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
| How many packets are involved in an address renewal process? |
|
Definition
| Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
| How many packets are involved in an address renewal process? |
|
Definition
| Two - DHCPRequest (client to server) and DHCPAck (server to client) |
|
|
Term
| What type of packets are used in a DHCP address renewal? |
|
Definition
|
|
Term
| How can you force a DHCP address renewal? |
|
Definition
|
|
Term
| What command can be used to break the bind between a NIC and a DHCP address? |
|
Definition
|
|
Term
| In short, what is the 80/20 rule? |
|
Definition
| 80% of DHCP addresses (scope) are managed by the primary DHCP server, the remaining 20% are managed by a secondary DHCP server |
|
|
Term
| How do Relay Agents forward broadcasted DHCP information? |
|
Definition
| They translate the broadcasts into unicast packets so that they can traverse between subnets |
|
|
Term
| T/F Server options apply to all scopes on the DHCP server, scope options are specific to a per scope basis. |
|
Definition
|
|
Term
| T/F When there is a conflict between server options and scope options, the server options take precedence. |
|
Definition
|
|
Term
| What does the IPSec policy agent do? |
|
Definition
|
|
Term
| Where are local IPSec policies stored? |
|
Definition
| In the registry of the local machine |
|
|
Term
| Where are domain-member IPSec policies stored? |
|
Definition
| In AD and cached in the local registry to the client in which it applies to |
|
|
Term
IPSec Which IPSec mode provides end -to-end security between devices? |
|
Definition
|
|
Term
IPSec Which mode is used by L2TP, VPN's, and Remote Access? |
|
Definition
|
|
Term
| _____ mode encrypts only the data portion (payload) of each packet |
|
Definition
|
|
Term
IPSec Which mode provides secure communications between two networks through a single node? |
|
Definition
|
|
Term
IPSec Which mode encrypts both the header and the payload of each packet? |
|
Definition
|
|
Term
| T/F Public keys unlock Private keys |
|
Definition
| False; Private unlocks public |
|
|
Term
| T/F The FEK is used to unencrypt files after it unlocks the public key which encrypted it |
|
Definition
| False; the private key unlocks the public key which unlocks the FEK. Then the FEK is usde to decrypt the file |
|
|
Term
IPSec Which mode is used for a site-to-site scenario? |
|
Definition
| Tunnel. Think network to network |
|
|
Term
IPSec Which mode is used in a Client-to-Client scenario? |
|
Definition
| Transport. Think end to end devices |
|
|
Term
| Main mode/Phase 1 deals with establishing authentication between two end points. What are the methods that are used in this mode? |
|
Definition
| Kerberos, Digital Certificates, and PSK's |
|
|
Term
| This security (encryption) method provides authentication, integrity, and confidentiality services |
|
Definition
| Encapsulating Security Payload (ESP) |
|
|
Term
| Unlike ESP, this security (encryption) method does not provide encryption of data, nor does it traverse NAT devices |
|
Definition
|
|
Term
| IP filter, IP filter list, Filter Action, Security Method, Connection type, Tunnel Setting, and Rule are all components of what? |
|
Definition
|
|
Term
| Which kind of encryption is a two way hash algorythm? |
|
Definition
|
|
Term
Out of these three, which is the most secure? Least secure? PSK Kerberos Digital Certificates |
|
Definition
PSK (Least) Digital Certificate (Most) |
|
|
Term
| How large of a key is used by DES (Data Encryption Standard)? |
|
Definition
|
|
Term
| How large of a key is used by 3DES? |
|
Definition
|
|
Term
| 44. Which IPSec component actually encrypts the data? |
|
Definition
| ESP (Encapsulating Security Payload) |
|
|
Term
| What is L2TP most often combined with to add security to the user account as well as the computer account? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Which OSI layer does IPSec work on? |
|
Definition
|
|
Term
| T/F The FEK has asymmetric encryption |
|
Definition
| False; it is symmetric... it is a single key. Symmetric keys are the combination of a private and a public |
|
|
Term
| Where is the FEK stored, other than in the DRF? |
|
Definition
| DDF Data decryption field |
|
|
Term
| T/F Public Keys encrypt while Private Keys decrypt |
|
Definition
|
|
Term
| What is an upstream server, in regards to WSUS? |
|
Definition
| It is a server in which other servers are getting their updates from. |
|
|