Core 2: Windows Networking Flashcards

1
Q

Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers)

Windows-based computers on home networks must be part of a HomeGroup

Windows-based computers on a network must be part of a workgroup or a domain

Windows-based computers on workplace networks are usually part of a domain

Windows-based computers on workplace networks are usually part of a workgroup

Windows-based computers on home networks are usually part of a workgroup

Windows-based computers on home networks are usually part of a domain

A

Windows-based computers on a network must be part of a workgroup or a domain

Windows-based computers on workplace networks are usually part of a domain

Windows-based computers on home networks are usually part of a workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the statements listed below apply to Windows workgroups? (Select 3 answers)

Security policies and permissions in workgroups are administered centrally

Logging on to any computer on the workgroup requires a single account

Workgroups typically consist of no more than twenty computers

There is no limit on the number of hosts that can become a part of a single workgroup

Logging on to any computer in the workgroup requires an account on that computer

Each computer in the workgroup has its own security policy

A

Workgroups typically consist of no more than twenty computers

Logging on to any computer in the workgroup requires an account on that computer

Each computer in the workgroup has its own security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings?

Credential Manager
System
User Accounts
Administrative Tools

A

System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements apply to Windows domains? (Select 3 answers)

Logging on to any computer on a Windows domain requires a single set of credentials

Security policies and permissions on a Windows domain are administered centrally

Windows domains are based on Peer-to-Peer (P2P) networking architecture

Each computer on a Windows domain has its own security policy

Windows domains are based on client-server networking architecture

All members of a Windows domain must be on the same local network or subnet

A

Logging on to any computer on a Windows domain requires a single set of credentials

Security policies and permissions on a Windows domain are administered centrally

Windows domains are based on client-server networking architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following locations/steps allows to view network shares in Windows?

Windows Command Prompt -> net share -> Enter (all network shares)

Windows Run dialog box -> \computer name -> Enter (user shares only)

Shared Folders menu in the Computer Management utility (all network shares)

Windows Command Prompt -> net view \computer name -> Enter (user shares only)

Windows Command Prompt -> net view \computer name /all -> Enter (all network shares)

All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In MS Windows, the “$” sign appended to the end of the name of a network share indicates that the shared folder or drive is:

Hidden
Inaccessible
Visible to any user
Encrypted

A

Hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following characters indicates that a Windows network share is intended for administrative access?

#
$
?
&

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network?

Windows Explorer -> Computer -> Map network drive

Shared Folders menu in the Computer Management utility

Network and Sharing Center applet in Windows Control Panel

File Explorer -> This PC -> Computer tab -> Map Network drive

A

Windows Explorer -> Computer -> Map network drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network?

Network and Sharing Center applet in Windows Control Panel

File Explorer -> This PC -> Computer tab -> Map Network drive

Windows Explorer -> Computer -> Map network drive

Shared Folders menu in the Computer Management utility

A

File Explorer -> This PC -> Computer tab -> Map Network drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network? (Select 2 answers)

Control Panel -> Devices and Printers applet -> Add a printer

Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab

Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab

Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device

A

Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab

Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)? (Select 2 answers)

Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab

Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device

Control Panel -> Devices and Printers applet -> Add a printer

Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab

A

Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device

Control Panel -> Devices and Printers applet -> Add a printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following locations in Windows provide access to dial-up and VPN settings? (Select 3 answers)

 Phone and Modem
 System Configuration
 Internet Options (Connections tab)
 Network and Sharing Center
 Windows Mobility Center
 Settings menu
A

Internet Options (Connections tab)
Network and Sharing Center
Settings menu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:

Personal Area Network (PAN)
Virtual Local Area Network (VLAN)
Integrated Services Digital Network (ISDN)
Virtual Private Network (VPN)

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following settings are used for establishing a VPN connection in Windows? (Select 3 answers)

 Network name
 Internet address (domain name or IPv4/IPv6 address)
 Security type
 Destination name
 Encryption type
 Smart card (optional)
A
Internet address (domain name or IPv4/IPv6 address)
Destination name
Smart card (optional)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following Internet access types takes advantage of PSTN lines?

Ethernet
Mobile broadband
Dial-up
Optical fiber

A

Dial-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following settings are used for establishing a dial-up connection in Windows? (Select 3 answers)

 Dial-up phone number
 Encryption type
 User name
 Security type
 Password
 Destination name
A

Dial-up phone number
User name
Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of configuration info is used for setting up a wireless connection in Windows? (Select all that apply)

 Network name
 Smart card (optional)
 Encryption type
 Destination name
 Security type
 Internet address (domain name or IPv4/IPv6 address)
 Security key
A

Network name
Encryption type
Security type
Security key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following terms describes the most common type of wired connections used in modern networks?

Coax
WiMAX
Ethernet
Token Ring

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following takes advantage of cell towers that provide wireless signal coverage for mobile devices?

WPAN
WWAN
Satellite
WLAN

A

WWAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

Bridge
Active hub
Server
Proxy

A

Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following locations provide access to proxy settings in Windows? (Select 2 answers)

Windows Settings menu -> System -> Network & Internet -> Proxy

Windows Control Panel -> Internet Options -> Privacy tab -> Advanced -> Proxy server

Windows Settings menu -> Network & Internet -> Proxy

Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server

Windows Settings menu -> Update & Security -> Proxy

Windows Control Panel -> Network and Sharing Center -> Change adapter settings -> Proxy server

A

Windows Settings menu -> Network & Internet -> Proxy

Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server

22
Q

Which of the following answers describe the features of Windows Remote Desktop tool? (Select 3 answers)

Permanent remote access

The host and invited user share control over host’s mouse and keyboard

Access based on local password (local user account password)

Windows tool used for connecting remotely to the user’s own computer

The host and invited user can both see the host’s screen
Windows tool used for assisted remote troubleshooting

Access based on one-time password

Temporal remote access

A

Permanent remote access

Access based on local password (local user account password)

Windows tool used for connecting remotely to the user’s own computer

23
Q

Which of the following answers refer(s) to the Windows Remote Assistance utility? (Select all that apply)

Access based on one-time password

Temporal remote access

Access based on local password (local user account password)

The host and invited user can both see the host’s screen

Windows tool used for connecting remotely to the user’s own computer

The host and invited user share control over host’s mouse and keyboard

Permanent remote access

Windows tool used for assisted remote troubleshooting

A

Access based on one-time password

Temporal remote access

The host and invited user can both see the host’s screen

The host and invited user share control over host’s mouse and keyboard

Windows tool used for assisted remote troubleshooting

24
Q
Which of the Windows network profiles imposes the strongest security settings?
 Home
 Private
 Work
 Public
A

Public

25
Q
Which network profile in Windows by default disables the network discovery feature?
 Home
 Private
 Work
 Public
A

Public

26
Q

A Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing is known as:

Home
Private
Work
Public

A

Public

27
Q

Which of the following locations provides access to Windows Firewall settings in Windows 7?

Network and Sharing Center applet in Control Panel

Windows Firewall applet in Control Panel

Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection

Internet Options (Security tab)

A

Windows Firewall applet in Control Panel

28
Q

Which of the following locations provides access to Windows Defender Firewall settings in Windows 8/8.1/10? (Select 2 answers)

Windows Defender Firewall applet in Control Panel

Internet Options (Security tab)

Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection

Internet Options (Advanced tab)

Network and Sharing Center applet in Control Panel

A

Windows Defender Firewall applet in Control Panel

Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection

29
Q

Which of the following locations in Windows 8/8.1/10 provide access to configuration options for managing apps or features allowed through Windows Defender Firewall? (Select 3 answers)

Network and Sharing Center applet in Control Panel -> Allow an app or feature through Windows Defender Firewall

Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item

Security and Maintenance applet in Control Panel -> Allow an app or feature through Windows Defender Firewall

Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall

Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall

A

Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item

Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall

Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall

30
Q

Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to create an exception for a TCP or UDP port?

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule… -> Port

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule… -> Custom

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule… -> Network protocols

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule… -> All programs (or a single app)

A

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule… -> Port

31
Q

Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to block incoming echo requests?

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Outbound Rules -> New Rule… -> Network protocols

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule… -> Custom -> All programs (or a single app)

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Outbound Rules -> New Rule… -> Custom -> All programs (or a single app)

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule… -> Network protocols

A

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule… -> Custom -> All programs (or a single app)

32
Q

In Windows 7, Windows Firewall can be enabled/disabled in: (Select all that apply)

Programs and Features Control Panel applet

Security and Maintenance Control Panel applet

Firewall & network protection menu in Windows Settings (accessed via Start menu)

Windows Firewall Control Panel applet

Network and Sharing Center Control Panel applet

Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties

A

Windows Firewall Control Panel applet

Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties

33
Q

In Windows 8/8.1/10, Windows Defender Firewall can be enabled/disabled in: (Select all that apply)

Network and Sharing Center Control Panel applet

Windows Defender Firewall Control Panel applet

Security and Maintenance Control Panel applet

Firewall & network protection menu in Windows Settings (accessed via Start menu)

Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties

Programs and Features Control Panel applet

A

Windows Defender Firewall Control Panel applet

Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties

34
Q

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:

DNS
SNMP
NAT
DHCP

A

DHCP

35
Q

Automatic Private IP Addressing (APIPA) addresses are valid only for communications within a network segment that a given host is connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and 169.254.255.254) cannot connect to the Internet. The assignment of APIPA address typically indicates a problem related to:

SNMP
DNS
SMTP
DHCP

A

DHCP

36
Q

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

UDP
IP
TCP
NetBIOS

A

IP

37
Q

A type of logical numeric identifier assigned to every single computer host or other device on a TCP/IP-based network is known as:

MAC address
SSID
IP address
Host ID

A

IP address

38
Q

Which of the following allows to determine which network segment an IP address belongs to?

Physical address
Dynamic Host Configuration Protocol (DHCP)
Address Resolution Protocol (ARP)
Subnet mask

A

Subnet mask

39
Q

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

TCP/IP
DNS
SQL
DHCP

A

DNS

40
Q

In order to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?

DNS server
Proxy server
DHCP server
Web server

A

DNS server

41
Q

In a network using subnets, the term “Default gateway” refers to a network device (e.g. router) that enables exchange of data between hosts residing in different subnets.

True
False

A

True

42
Q

Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows? (Select all that apply)

 IP address
 Subnet mask
 Default gateway
 MAC address
 DNS server address
 SSID (a.k.a. network name)
A

IP address
Subnet mask
Default gateway
DNS server address

43
Q

Which of the following answers describes the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows?

Control Panel (Category view) -> Network and Internet -> Internet Options -> Advanced tab -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

Control Panel (Category view) -> Network and Internet -> Network and Sharing Center applet -> Change adapter settings -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the “LAN settings” button -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

A

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

44
Q

Transmission carried out in one direction only is described as a simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes.

True
False

A

True

45
Q

A type of transmission that takes place in two directions simultaneously is known as:

Full duplex
Broadcast
Half duplex
Multicast

A

Full duplex

46
Q

If a network adapter’s “Speed & Duplex” property is set to Half Duplex, communication on the network will be taking place:

Only in one direction at a time
In both directions at half the speed
In one direction at half the speed
In both directions simultaneously

A

Only in one direction at a time

47
Q

Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based on the highest performance settings supported by both devices.

True
False

A

True

48
Q

Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows?

Control Panel (Category view) -> View Devices and Printers -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Speed & Duplex settings

Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the “LAN settings” button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Speed & Duplex settings

Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Speed & Duplex settings

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Speed & Duplex settings

A

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Speed & Duplex settings

49
Q

A solution that allows to turn on a network host remotely by sending a broadcast frame is called:

Remote access
Jumbo frame
Backdoor access
Wake-on-LAN

A

Wake-on-LAN

50
Q

Which of the following answers describes the correct sequence of steps for accessing the magic packet settings of an Ethernet adapter in MS Windows?

Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the “LAN settings” button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Magic Packet settings

Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Magic Packet settings

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Magic Packet settings

Control Panel (Category view) -> View Devices and Printers -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Magic Packet settings

A

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Magic Packet settings

51
Q

Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic?

Measured service
Acceptable Use Policy (AUP)
Fair access policy
Quality of Service (QoS)

A

Quality of Service (QoS)

52
Q

In order to operate, an integrated component such as Network Interface Card (NIC) may need to be first:

Updated with the latest driver
Verified against the Hardware Compatibility List (HCL)
Checked with a loopback plug
Enabled in the advanced BIOS settings menu

A

Enabled in the advanced BIOS settings menu