1. Discuss the differences between physical switches and virtual switches.
A physical switch is a hardware device that connects multiple computers, servers, or network devices within a local area network (LAN), allowing communication between them. A virtual switch, on the other hand, is a software-based switch used in virtualized environments to facilitate communications between virtual machines (VMs) and other network resources
2. Compare a production checkpoint to a standard checkpoint. What are
the benefits of one over the other, and what are the situations where each
would be used?
A production checkpoint is used to revert the virtual machine to a certain point in time
and it can be restored at any time. A standard checkpoint takes a snapshot of the virtual
machine to see if there are any issues with the virtual machine. It is good to use a
standard checkpoint to troubleshoot the virtual machine. When it comes to production
checkpoint, it is good to use it when installing software.
3. Why should an administrator spread Flexible Single Master Operations
(FSMO) roles within a forest and domains amongst different domain
controllers?
Flexible Single Master Operations roles are critical for Active Directory operations, and spreading them across multiple domain controllers, which ensures security because spreading roles makes it difficult for hackers to compromise all FMSO roles at once. It also improves disaster recovery because since the roles are spread out, it makes active directory recover faster from failures. Load Balancing is also better when FMSO roles are spread out because it prevents bottlenecks in the Active Directory processes which improves performance
4. What are the advantages and disadvantages of using a read-only
domain controller (RODC).
Read-Only Domain Controller has multiple advantages such as enhanced security, is ideal for remote locations, and has reduced replication traffic. RODC has enhanced security because it doesn’t store sensitive credentials, which reduces risk if compromised. It is ideal for remote locations that have limited IT staff and security because it is low maintenance. RODC has reduced replication because changes can’t be made on the RODC, which significantly reduces traffic.
Listen to “Episode #69: Human Hacker of the DarkNet Diaries podcast which can be found at https://darknetdiaries.com/episode/69/
5. Describe what happened during the first Bank break in Jamaica and what did they hack?
They pretended to be a part of an American audit company that was auditing a bank. They took pictures of the circuit boards and parts of the ATM and had an employee explain the coding for the ATM in addition to showing the software. Then they went to the call center and had a lady log into a computer and hack into the computer using USB keys. After that, they hacked into another computer using USB keys, took a picture of a badge, and looked at banking information on the computer. When Chris and Ryan tried to leave they were questioned and the employee asked them for their local contact and they had a third person to pretend to work at the bank and they were able to leave without getting in trouble
6. Explain three of the five key strategies that the client could have implemented to prevent the first Bank in Jamaica from being hacked.
One of the strategies that clients should implement was when they walked into the atm center the lady should’ve checked to see if Chris and Ryan were allowed to be in that room or simply not allow them to come in the room. The lady in the test center should have refused to log in to the computer so that Chris wouldn’t have been able to hack the computer. Before the guy went to the bathroom he shouldn’t have left his computer open because it allowed Chris to look through private banking information and for Ryan to hack the computer.
7. Give an overview of what transpired when the human hackers pretending to be a pest control worker.
When the human hackers pretend to be pest control workers, the plan is to slip the malicious USB sticks into the doors, and an employee would probably put the USB into a computer, but they didn’t account for the security cameras recording them, and the security team checking the tapes. When Chris and Ryan come back to the building the next day, the security catches them and handcuffs them. Then, after the security guards give Chris and Ryan the security guards’ schedule, the security guards leave for the night. Chris and Ryan break into the building and steal the security guard’s badges and items to access other buildings