Monday, December 30, 2019
Which of these is NOT an OSI network layer?
Which of these is NOT an OSI network layer?
- The Security Layer
- The Transport Layer
- The Application Layer
- The Physical Layer
EXPLANATION
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers.
...
The 7 Layers of the OSI
...
The 7 Layers of the OSI
- Layer 1 - Physical.
- Layer 2 - Data Link.
- Layer 3 - Network.
- Layer 4 - Transport.
- Layer 5 - Session.
- Layer 6 - Presentation.
- Layer 7 - Application.
An admin is investigating an unusual amount of traffic originating from a 2016 Server to the internet. The first event log was ID 1102. The outbound traffic is traversing over ports commonly associated with DNS. These symptoms are known as what?
An admin is investigating an unusual amount of traffic originating from a 2016 Server to the internet. The first event log was ID 1102. The outbound traffic is traversing over ports commonly associated with DNS. These symptoms are known as what?
- Vulnerability
- Threat
- Risk
- Indicator of Comprimise (IoC)
EXPLANATION
Yet another event type worth monitoring is related to event log clearing. Checking for event ID 104 in the System log whether it is cleared, while searching for 1102 in the Audit log does the same. But clearing the application log puts nothing in the application event log?
Although the application log clear does not result in a log clear entry in the actual application log, it does write an entry to the system log which was previously mentioned. Is clearing event logs considered a normal activity? Granted, the act may not always result from malicious intent, but it should be considered enough of a non-standard event that it warrants closer examination. When log clears are performed in conjunction with other events, it is clearly a great way to cover your tracks if you were previously creating services, making firewall rules changes, etc. In some cases, if a system is functioning on an island without log forwarding or any other outside communication, this singular event might be your only indication of a much larger issue. But wait... There are several ways to clear out the log files. Let us examine several of them to see how they work and ensure our monitoring will detect them. Obviously using the Windows native method of clearing event logs (Figure 9) is going to generate the event IDs we are looking for above. Event ID 104 is created just as expected when clearing out the System log.
What is a node?
What is a node?
- A node refers to a point or joint where a connection takes place
- is combined with an IP address in order to identify two parts:
- It refers to a direct connection between two computers on a network.
- is the process of breaking down information into smaller manageable chunks before it is transmitted
EXPLANATION
A node is a device or data point in a larger network.A node can be a couple of different things depending on whether the conversation is about computer science or networking.
In networking a node is either a connection point, a redistribution point, or a communication endpoint. In computer science, nodes are devices or data points on a large network, devices such a PC, phone, or printer are considers nodes.
In general, a node has a programmed or engineered capability that enables it to recognise, process, or forward transmissions to other nodes.
Which is the most frequent IT problem?
Which is the most frequent IT problem?
- Virus in user computer
- Computer froze
- User forgot his password
- Data loss
EXPLANATION
- I'm unable to log in! ...
- “I've got the dreaded blue screen of death!” ...
- “I deleted some important files!” ...
- “I just closed my document without saving!” ...
- “My computer is running too slowly!” ...
- “My computer just shut down unexpectedly!” ...
- “I can't print anything!”