Lesson 5: Managing Windows Networking Flashcards
Adapter card that provides one or more Ethernet ports for connecting hosts to a network so that they can exchange data over a link.
network interface card (NIC)
Number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion.
subnet mask
A unique number that identifies a device on a network, like a computer or phone. It helps devices find and communicate with each other over the internet.
Internet Protocol (IP)
Service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the Internet.
Domain Name System (DNS)
Protocol used to automatically assign IP addressing information to hosts that have not been configured manually.
Dynamic Host Configuration Protocol (DHCP)
Windows feature that categorizes network profile as public or private. Each profile can have a different firewall configuration, with public network types being more restricted, by default.
Network Location Awareness (NLA)
Secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).
Virtual Private Network (VPN)
Network covering a large area using wireless technologies, such as a cellular radio data network or line-of-sight microwave transmission.
Wireless Wide Area Network (WWAN)
Windows feature for indicating that network data transfer is billable and for setting warnings and caps to avoid unexpected charges from the provider.
metered
Server that mediates the communications between a client and another server. It can filter and often modify communications as well as provide caching services to improve performance.
proxy server
True or false? Windows Defender Firewall can be disabled.
True.
It is not usually a good idea to do so, but it can be disabled via Security Center or the Control Panel applet.
You are assisting another user who is trying to configure a static IP on a Windows workstation. The user says that 255.255.255.0 is not being accepted in the prefix length box. Should the user open a different dialog to complete the configuration or enter a different value?
The user should enter a different value, should be 24
The Network & Internet settings Edit IP settings dialog can be used. 255.255.255.0 is the subnet mask in dotted decimal format. The dialog just requires the number of mask bits. Each “255” in a dotted decimal mask represents 8 bits.
You are assisting a user with configuring a static IP address. The user has entered the following configuration values and now cannot access the Internet. Is there a configuration issue or a different problem?
IP: 192.168.1.1
Mask: 255.255.255.0
Gateway: 192.168.1.0
DNS: 192.168.1.0
There is a configuration problem. 192.168.1.0 is not a host address. With the subnet mask 255.255.255.0, it identifies the network range as 192.168.1.0/24. The gateway is usually configured as the first available host address in this range: 192.168.1.1. The DNS server should also be set to 192.168.1.1. The client IP should be set to any other available value, such as 192.168.1.100.
You are supporting a user who has just replaced a wireless router. The user has joined the new wireless network successfully but can no longer find other computers on the network. What should you check first?
Use Network & Internet to check the network profile type. When the network changed, the user probably selected the wrong option at the prompt to allow the PC to be discoverable, and the profile is probably set to Public. Change the type Private.
You need to set up a VPN connection on a user’s Windows laptop. The VPN type is IKEv2. What other information, if any, do you need to configure the connection?
Also need either the fully qualified domain name (FQDN) or the IP address of the remote access VPN server
Command tool used to gather information about the IP configuration of a Windows host.
ipconfig command
Cross-platform command tool for testing IP packet transmission.
ping command
Diagnostic utilities that trace the route taken by a packet as it “hops” to the destination host on a remote network. tracert is the Windows implementation, while traceroute runs on Linux.
tracert command
Windows utility for measuring latency and packet loss across an internetwork.
pathping command
What are the 3 main areas where network services fail?
1) Security
2) Name resolution
3) Application/OS
Cross-platform command tool for querying DNS resource records.
nslookup command
Cross-platform command tool to show network information on a machine running TCP/IP, notably active connections, and the routing table.
netstat command
A DHCP server has been reconfigured to use a new network address scheme following a network problem. What command would you use to refresh the IP configuration on Windows client workstations?
ipconfig /renew
You are pinging a host at 192.168.0.99 from a host at 192.168.0.200. The response is “Reply from 192.168.0.200: Destination host unreachable.” The hosts use the subnet mask 255.255.255.0. Does the ping output indicate a problem with the default gateway?
No. The hosts are on the same IP network (192.168.0.0/24). This means that 192.168.0.200 does not try to use a router (the gateway) to send the probes. 192.168.0.200 uses address resolution protocol (ARP) to find the host with the IP 192.168.0.99. The host unreachable message indicates that there was no response, but the problem will be an issue such as the host being disconnected from the network or configured to block discovery rather than a gateway issue.
You are checking that a remote Windows workstation will be able to dial into a web conference with good quality audio/video. What is the best tool to use to measure latency between the workstation’s network and the web conferencing server?
pathping measures latency over a longer period and so will return a more accurate measurement than the individual round trip time (RTT) values returned by ping or tracert.
A computer cannot connect to the network. The machine is configured to obtain a TCP/IP configuration automatically. You use ipconfig to determine the IP address and it returns 0.0.0.0. What does this tell you?
This is an irregular state for a Windows PC. If a DHCP server cannot be contacted, the machine should default to using an APIPA address (169.254.x.y). As it has not done this, something is wrong with the networking software installed on the machine. The best option is probably to perform a network reset via the Settings > Network & Internet > Status page.
Collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (read-only, read/write, and so on).
Access Control List (ACL)
Basic principle of security stating that unless something has explicitly been granted access, it should be denied access.
Implicit Deny
Basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.
Least Privilege
User account that can be authenticated again and allocated permissions for the computer that hosts the account only.
A local account
Access control feature that allows permissions to be allocated to multiple users more efficiently.
A security group
Privileged user account that has been granted memberships of the Administrators security group. There is also an account named Administrator, but this is usually disabled by default.
Administrators
Non-privileged user account in Windows that typically has membership of the Users security group only.
standard account
Non-privileged account that is permitted to access the computer/network without authenticating.
Guest
One of the default Windows group accounts. Its use is deprecated, but it is still included with Windows to support legacy applications.
Power Users
Windows feature designed to mitigate abuse of administrative accounts by requiring explicit consent to use privileges.
User Account Control (UAC)
Authentication scheme that requires the user to present at least two different factors as credentials; for example, something you know, something you have, something you are, something you do, and somewhere you are. Specifying two factors is known as 2FA.
MFA (multi-factor authentication)
Authentication mechanism that uses a separate channel to authorize a sign-on attempt or to transmit an additional credential. This can use a registered email account or a contact phone number for an SMS or voice call.
2-step verification
Either an additional code to use for 2-step verification, such as a one-time password, or authorization data that can be presented as evidence of authentication in an SSO system.
soft token
System for sending text messages between cell phones.
SMS (short message service)
Software that allows a smartphone to operate as a second authentication factor or as a trusted channel for 2-step verification.
authenticator application
USB storage key or smart card with a cryptographic module that can hold authenticating encryption keys securely.
hard token
Login Option
The Local Security Authority (LSA) compares the submitted credential to the one stored in the Security Accounts Manager (SAM) database, which is part of the registry. This is also referred to as interactive logon.
Windows local sign-in
Login Option
The LSA can pass the credentials for authentication to a network service. The preferred system for network authentication is based on a system called Kerberos.
Windows network sign-in
Login Option
If the user’s device is not connected to the local network, authentication can take place over some type of virtual private network (VPN) or web portal.
Remote sign-in