Core 2: Windows Networking Flashcards
Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers)
Windows-based computers on home networks must be part of a HomeGroup
Windows-based computers on a network must be part of a workgroup or a domain
Windows-based computers on workplace networks are usually part of a domain
Windows-based computers on workplace networks are usually part of a workgroup
Windows-based computers on home networks are usually part of a workgroup
Windows-based computers on home networks are usually part of a domain
Windows-based computers on a network must be part of a workgroup or a domain
Windows-based computers on workplace networks are usually part of a domain
Windows-based computers on home networks are usually part of a workgroup
Which of the statements listed below apply to Windows workgroups? (Select 3 answers)
Security policies and permissions in workgroups are administered centrally
Logging on to any computer on the workgroup requires a single account
Workgroups typically consist of no more than twenty computers
There is no limit on the number of hosts that can become a part of a single workgroup
Logging on to any computer in the workgroup requires an account on that computer
Each computer in the workgroup has its own security policy
Workgroups typically consist of no more than twenty computers
Logging on to any computer in the workgroup requires an account on that computer
Each computer in the workgroup has its own security policy
Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings?
Credential Manager
System
User Accounts
Administrative Tools
System
Which of the following statements apply to Windows domains? (Select 3 answers)
Logging on to any computer on a Windows domain requires a single set of credentials
Security policies and permissions on a Windows domain are administered centrally
Windows domains are based on Peer-to-Peer (P2P) networking architecture
Each computer on a Windows domain has its own security policy
Windows domains are based on client-server networking architecture
All members of a Windows domain must be on the same local network or subnet
Logging on to any computer on a Windows domain requires a single set of credentials
Security policies and permissions on a Windows domain are administered centrally
Windows domains are based on client-server networking architecture
Which of the following locations/steps allows to view network shares in Windows?
Windows Command Prompt -> net share -> Enter (all network shares)
Windows Run dialog box -> \computer name -> Enter (user shares only)
Shared Folders menu in the Computer Management utility (all network shares)
Windows Command Prompt -> net view \computer name -> Enter (user shares only)
Windows Command Prompt -> net view \computer name /all -> Enter (all network shares)
All of the above
All of the above
In MS Windows, the “$” sign appended to the end of the name of a network share indicates that the shared folder or drive is:
Hidden
Inaccessible
Visible to any user
Encrypted
Hidden
Which of the following characters indicates that a Windows network share is intended for administrative access?
#
$
?
&
$
Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network?
Windows Explorer -> Computer -> Map network drive
Shared Folders menu in the Computer Management utility
Network and Sharing Center applet in Windows Control Panel
File Explorer -> This PC -> Computer tab -> Map Network drive
Windows Explorer -> Computer -> Map network drive
Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network?
Network and Sharing Center applet in Windows Control Panel
File Explorer -> This PC -> Computer tab -> Map Network drive
Windows Explorer -> Computer -> Map network drive
Shared Folders menu in the Computer Management utility
File Explorer -> This PC -> Computer tab -> Map Network drive
Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network? (Select 2 answers)
Control Panel -> Devices and Printers applet -> Add a printer
Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab
Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab
Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device
Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab
Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab
Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)? (Select 2 answers)
Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab
Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device
Control Panel -> Devices and Printers applet -> Add a printer
Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab
Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device
Control Panel -> Devices and Printers applet -> Add a printer
Which of the following locations in Windows provide access to dial-up and VPN settings? (Select 3 answers)
Phone and Modem System Configuration Internet Options (Connections tab) Network and Sharing Center Windows Mobility Center Settings menu
Internet Options (Connections tab)
Network and Sharing Center
Settings menu
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:
Personal Area Network (PAN)
Virtual Local Area Network (VLAN)
Integrated Services Digital Network (ISDN)
Virtual Private Network (VPN)
Virtual Private Network (VPN)
Which of the following settings are used for establishing a VPN connection in Windows? (Select 3 answers)
Network name Internet address (domain name or IPv4/IPv6 address) Security type Destination name Encryption type Smart card (optional)
Internet address (domain name or IPv4/IPv6 address) Destination name Smart card (optional)
Which of the following Internet access types takes advantage of PSTN lines?
Ethernet
Mobile broadband
Dial-up
Optical fiber
Dial-up
Which of the following settings are used for establishing a dial-up connection in Windows? (Select 3 answers)
Dial-up phone number Encryption type User name Security type Password Destination name
Dial-up phone number
User name
Password
What type of configuration info is used for setting up a wireless connection in Windows? (Select all that apply)
Network name Smart card (optional) Encryption type Destination name Security type Internet address (domain name or IPv4/IPv6 address) Security key
Network name
Encryption type
Security type
Security key
Which of the following terms describes the most common type of wired connections used in modern networks?
Coax
WiMAX
Ethernet
Token Ring
Ethernet
Which of the following takes advantage of cell towers that provide wireless signal coverage for mobile devices?
WPAN
WWAN
Satellite
WLAN
WWAN
In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:
Bridge
Active hub
Server
Proxy
Proxy