Describe the “idea” behind RPC.
Describe the four steps in RPC.
RPC can be used in distributed environments and local environments.
[True / False]
True
RPC is implemented in nearly all popular programming languages.
[True / False]
True
Describe the meaning of the abstraction provided by RPC.
The user doesn’t need to know the details of how the RPC interaction was handled over the network.
What are the 2 main goals of RPC?
NetBIOS provides __________ on local networks.
Communication services
NetBIOS allows applications and computers on a local area network to communicate with network hardware on another network.
[TRUE / FALSE]
TRUE
In Windows, the NetBIOS name can be up to how many characters long?
16
How do software applications on a NetBIOS network locate and identify each other?
Through their NetBIOS names
What begins a NetBIOS session?
Two applications start a NetBIOS session when the client sends a command to “call” another client (the server) over TCP port 139.
In NetBIOS, what is referred to as the “session mode”?
The session mode is where both sides issue “send” and “receive” commands to deliver messages in both directions.
What terminates a NetBIOS session?
A “hang-up” command
Describe how NetBIOS supports connection-less communications.
What does SMB stand for?
Server Message Block
What is SMB?
What port do SMB clients use to connect to an SMB server?
port 445
Server Message Block is a ________ protocol, meaning it transfers multiple messages between the client and server to accomplish the request.
request-response
Name two advantages of SMB.
The SMB protocol needs _______ to make communication safe.
security measures
What does the “Network Discovery” setting in Windows determine?
Network Discovery determines whether other computers and devices connected to the network can see and communicate with each other.
What is one major disadvantage of enabling Network Discovery?
Data transmitted between the connected computers or devices can be intercepted by a third party.
Name / describe 3 commands that can be used to perform Network Discovery in the Powershell CLI
Within the context of Network Discovery, what could an invalid IP address be indicative of?
An invalid IP address is often a sign of malicious or rogue devices that might be carrying malware.