Core 2: Windows Networking Flashcards
Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers)
Windows-based computers on home networks must be part of a HomeGroup
Windows-based computers on a network must be part of a workgroup or a domain
Windows-based computers on workplace networks are usually part of a domain
Windows-based computers on workplace networks are usually part of a workgroup
Windows-based computers on home networks are usually part of a workgroup
Windows-based computers on home networks are usually part of a domain
Windows-based computers on a network must be part of a workgroup or a domain
Windows-based computers on workplace networks are usually part of a domain
Windows-based computers on home networks are usually part of a workgroup
Which of the statements listed below apply to Windows workgroups? (Select 3 answers)
Security policies and permissions in workgroups are administered centrally
Logging on to any computer on the workgroup requires a single account
Workgroups typically consist of no more than twenty computers
There is no limit on the number of hosts that can become a part of a single workgroup
Logging on to any computer in the workgroup requires an account on that computer
Each computer in the workgroup has its own security policy
Workgroups typically consist of no more than twenty computers
Logging on to any computer in the workgroup requires an account on that computer
Each computer in the workgroup has its own security policy
Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings?
Credential Manager
System
User Accounts
Administrative Tools
System
Which of the following statements apply to Windows domains? (Select 3 answers)
Logging on to any computer on a Windows domain requires a single set of credentials
Security policies and permissions on a Windows domain are administered centrally
Windows domains are based on Peer-to-Peer (P2P) networking architecture
Each computer on a Windows domain has its own security policy
Windows domains are based on client-server networking architecture
All members of a Windows domain must be on the same local network or subnet
Logging on to any computer on a Windows domain requires a single set of credentials
Security policies and permissions on a Windows domain are administered centrally
Windows domains are based on client-server networking architecture
Which of the following locations/steps allows to view network shares in Windows?
Windows Command Prompt -> net share -> Enter (all network shares)
Windows Run dialog box -> \computer name -> Enter (user shares only)
Shared Folders menu in the Computer Management utility (all network shares)
Windows Command Prompt -> net view \computer name -> Enter (user shares only)
Windows Command Prompt -> net view \computer name /all -> Enter (all network shares)
All of the above
All of the above
In MS Windows, the “$” sign appended to the end of the name of a network share indicates that the shared folder or drive is:
Hidden
Inaccessible
Visible to any user
Encrypted
Hidden
Which of the following characters indicates that a Windows network share is intended for administrative access?
#
$
?
&
$
Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network?
Windows Explorer -> Computer -> Map network drive
Shared Folders menu in the Computer Management utility
Network and Sharing Center applet in Windows Control Panel
File Explorer -> This PC -> Computer tab -> Map Network drive
Windows Explorer -> Computer -> Map network drive
Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network?
Network and Sharing Center applet in Windows Control Panel
File Explorer -> This PC -> Computer tab -> Map Network drive
Windows Explorer -> Computer -> Map network drive
Shared Folders menu in the Computer Management utility
File Explorer -> This PC -> Computer tab -> Map Network drive
Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network? (Select 2 answers)
Control Panel -> Devices and Printers applet -> Add a printer
Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab
Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab
Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device
Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab
Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab
Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)? (Select 2 answers)
Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab
Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device
Control Panel -> Devices and Printers applet -> Add a printer
Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab
Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device
Control Panel -> Devices and Printers applet -> Add a printer
Which of the following locations in Windows provide access to dial-up and VPN settings? (Select 3 answers)
Phone and Modem System Configuration Internet Options (Connections tab) Network and Sharing Center Windows Mobility Center Settings menu
Internet Options (Connections tab)
Network and Sharing Center
Settings menu
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:
Personal Area Network (PAN)
Virtual Local Area Network (VLAN)
Integrated Services Digital Network (ISDN)
Virtual Private Network (VPN)
Virtual Private Network (VPN)
Which of the following settings are used for establishing a VPN connection in Windows? (Select 3 answers)
Network name Internet address (domain name or IPv4/IPv6 address) Security type Destination name Encryption type Smart card (optional)
Internet address (domain name or IPv4/IPv6 address) Destination name Smart card (optional)
Which of the following Internet access types takes advantage of PSTN lines?
Ethernet
Mobile broadband
Dial-up
Optical fiber
Dial-up
Which of the following settings are used for establishing a dial-up connection in Windows? (Select 3 answers)
Dial-up phone number Encryption type User name Security type Password Destination name
Dial-up phone number
User name
Password
What type of configuration info is used for setting up a wireless connection in Windows? (Select all that apply)
Network name Smart card (optional) Encryption type Destination name Security type Internet address (domain name or IPv4/IPv6 address) Security key
Network name
Encryption type
Security type
Security key
Which of the following terms describes the most common type of wired connections used in modern networks?
Coax
WiMAX
Ethernet
Token Ring
Ethernet
Which of the following takes advantage of cell towers that provide wireless signal coverage for mobile devices?
WPAN
WWAN
Satellite
WLAN
WWAN
In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:
Bridge
Active hub
Server
Proxy
Proxy
Which of the following locations provide access to proxy settings in Windows? (Select 2 answers)
Windows Settings menu -> System -> Network & Internet -> Proxy
Windows Control Panel -> Internet Options -> Privacy tab -> Advanced -> Proxy server
Windows Settings menu -> Network & Internet -> Proxy
Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server
Windows Settings menu -> Update & Security -> Proxy
Windows Control Panel -> Network and Sharing Center -> Change adapter settings -> Proxy server
Windows Settings menu -> Network & Internet -> Proxy
Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server
Which of the following answers describe the features of Windows Remote Desktop tool? (Select 3 answers)
Permanent remote access
The host and invited user share control over host’s mouse and keyboard
Access based on local password (local user account password)
Windows tool used for connecting remotely to the user’s own computer
The host and invited user can both see the host’s screen
Windows tool used for assisted remote troubleshooting
Access based on one-time password
Temporal remote access
Permanent remote access
Access based on local password (local user account password)
Windows tool used for connecting remotely to the user’s own computer
Which of the following answers refer(s) to the Windows Remote Assistance utility? (Select all that apply)
Access based on one-time password
Temporal remote access
Access based on local password (local user account password)
The host and invited user can both see the host’s screen
Windows tool used for connecting remotely to the user’s own computer
The host and invited user share control over host’s mouse and keyboard
Permanent remote access
Windows tool used for assisted remote troubleshooting
Access based on one-time password
Temporal remote access
The host and invited user can both see the host’s screen
The host and invited user share control over host’s mouse and keyboard
Windows tool used for assisted remote troubleshooting
Which of the Windows network profiles imposes the strongest security settings? Home Private Work Public
Public
Which network profile in Windows by default disables the network discovery feature? Home Private Work Public
Public
A Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing is known as:
Home
Private
Work
Public
Public
Which of the following locations provides access to Windows Firewall settings in Windows 7?
Network and Sharing Center applet in Control Panel
Windows Firewall applet in Control Panel
Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection
Internet Options (Security tab)
Windows Firewall applet in Control Panel
Which of the following locations provides access to Windows Defender Firewall settings in Windows 8/8.1/10? (Select 2 answers)
Windows Defender Firewall applet in Control Panel
Internet Options (Security tab)
Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection
Internet Options (Advanced tab)
Network and Sharing Center applet in Control Panel
Windows Defender Firewall applet in Control Panel
Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection
Which of the following locations in Windows 8/8.1/10 provide access to configuration options for managing apps or features allowed through Windows Defender Firewall? (Select 3 answers)
Network and Sharing Center applet in Control Panel -> Allow an app or feature through Windows Defender Firewall
Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item
Security and Maintenance applet in Control Panel -> Allow an app or feature through Windows Defender Firewall
Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall
Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall
Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item
Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall
Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall
Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to create an exception for a TCP or UDP port?
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule… -> Port
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule… -> Custom
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule… -> Network protocols
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule… -> All programs (or a single app)
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule… -> Port
Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to block incoming echo requests?
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Outbound Rules -> New Rule… -> Network protocols
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule… -> Custom -> All programs (or a single app)
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Outbound Rules -> New Rule… -> Custom -> All programs (or a single app)
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule… -> Network protocols
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule… -> Custom -> All programs (or a single app)
In Windows 7, Windows Firewall can be enabled/disabled in: (Select all that apply)
Programs and Features Control Panel applet
Security and Maintenance Control Panel applet
Firewall & network protection menu in Windows Settings (accessed via Start menu)
Windows Firewall Control Panel applet
Network and Sharing Center Control Panel applet
Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties
Windows Firewall Control Panel applet
Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties
In Windows 8/8.1/10, Windows Defender Firewall can be enabled/disabled in: (Select all that apply)
Network and Sharing Center Control Panel applet
Windows Defender Firewall Control Panel applet
Security and Maintenance Control Panel applet
Firewall & network protection menu in Windows Settings (accessed via Start menu)
Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties
Programs and Features Control Panel applet
Windows Defender Firewall Control Panel applet
Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:
DNS
SNMP
NAT
DHCP
DHCP
Automatic Private IP Addressing (APIPA) addresses are valid only for communications within a network segment that a given host is connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and 169.254.255.254) cannot connect to the Internet. The assignment of APIPA address typically indicates a problem related to:
SNMP
DNS
SMTP
DHCP
DHCP
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?
UDP
IP
TCP
NetBIOS
IP
A type of logical numeric identifier assigned to every single computer host or other device on a TCP/IP-based network is known as:
MAC address
SSID
IP address
Host ID
IP address
Which of the following allows to determine which network segment an IP address belongs to?
Physical address
Dynamic Host Configuration Protocol (DHCP)
Address Resolution Protocol (ARP)
Subnet mask
Subnet mask
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
TCP/IP
DNS
SQL
DHCP
DNS
In order to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?
DNS server
Proxy server
DHCP server
Web server
DNS server
In a network using subnets, the term “Default gateway” refers to a network device (e.g. router) that enables exchange of data between hosts residing in different subnets.
True
False
True
Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows? (Select all that apply)
IP address Subnet mask Default gateway MAC address DNS server address SSID (a.k.a. network name)
IP address
Subnet mask
Default gateway
DNS server address
Which of the following answers describes the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows?
Control Panel (Category view) -> Network and Internet -> Internet Options -> Advanced tab -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
Control Panel (Category view) -> Network and Internet -> Network and Sharing Center applet -> Change adapter settings -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the “LAN settings” button -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
Transmission carried out in one direction only is described as a simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes.
True
False
True
A type of transmission that takes place in two directions simultaneously is known as:
Full duplex
Broadcast
Half duplex
Multicast
Full duplex
If a network adapter’s “Speed & Duplex” property is set to Half Duplex, communication on the network will be taking place:
Only in one direction at a time
In both directions at half the speed
In one direction at half the speed
In both directions simultaneously
Only in one direction at a time
Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based on the highest performance settings supported by both devices.
True
False
True
Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows?
Control Panel (Category view) -> View Devices and Printers -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Speed & Duplex settings
Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the “LAN settings” button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Speed & Duplex settings
Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Speed & Duplex settings
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Speed & Duplex settings
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Speed & Duplex settings
A solution that allows to turn on a network host remotely by sending a broadcast frame is called:
Remote access
Jumbo frame
Backdoor access
Wake-on-LAN
Wake-on-LAN
Which of the following answers describes the correct sequence of steps for accessing the magic packet settings of an Ethernet adapter in MS Windows?
Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the “LAN settings” button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Magic Packet settings
Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Magic Packet settings
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Magic Packet settings
Control Panel (Category view) -> View Devices and Printers -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Magic Packet settings
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Magic Packet settings
Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic?
Measured service
Acceptable Use Policy (AUP)
Fair access policy
Quality of Service (QoS)
Quality of Service (QoS)
In order to operate, an integrated component such as Network Interface Card (NIC) may need to be first:
Updated with the latest driver
Verified against the Hardware Compatibility List (HCL)
Checked with a loopback plug
Enabled in the advanced BIOS settings menu
Enabled in the advanced BIOS settings menu