Lesson 5 - Managing Windows Networking Flashcards

1
Q

What is a subnet mask?

A

Number of bits applied to an IP address to mask the network ID portion from the host/interface ID portion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a IP?

A

Internet Protocol is a format for logical host and networking addressing. In IPv4, a 32-bit binary address is expressed in dotted decimal notation, such as 192.168.1.1. In IPv6, addresses are 128-bit expressed as hexadecimal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a DNS?

A

A Domain Name System is a service that maps fully qualified domain name labels to IP addresses on most TCP/IP networks, including the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is DHCP?

A

A Dynamic Host Configuration Protocol is a protocol used to automatically assign IP addressing information to hosts that have not been configured manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is NLA?

A

Network Location Awareness is a Windows feature that categorizes network profile as public or private. Each profile can have a different firewall configuration, with public network types being more restricted, by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is VPN?

A

A virtual private network is a secure tunnel created between two endpoints connected via an unsecure transport network (typically the Internet).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is WWAN?

A

A Wireless Wide Area Network is a network covering a large area using wireless technologies, such as a cellular radio data network or line-of-sight microwave transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a proxy server?

A

A proxy server that mediates the communications between a client and another server. It can filter and often modify communications as well as provide caching services to improve performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

You are assisting a user with configuring a static IP address. The user has entered the following configuration values and now cannot access the Internet. Is there a configuration issue or a different problem?
IP: 192.168.1.1
Mask: 255.255.255.0
Gateway: 192.168.1.0
DNS: 192.168.1.0

A

There is a configuration problem. 192.168.1.0 is not a host address. With the subnet mask 255.255.255.0, it identifies the network range as 192.168.1.0/24. The gateway is usually configured as the first available host address in this range: 192.168.1.1. The DNS server should also be set to 192.168.1.1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You are assisting another user who is trying to configure a static IP on a Windows workstation. The user says that 255.255.255.0 is not being accepted in the prefix length box. Should the user open a different dialog to complete the configuration or enter a different value?

A

The Network & Interface settings Edit IP settings dialog can be used. 255.255.255.0 is the subnet mask in dotted decimal format. The dialog just requires the number of mask bits. Each “255” in a dotted decimal mask represents 8 bits, so the user should enter 24.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are supporting a user who has just replaced a wireless router. The user has joined the new wireless network successfully but can no longer find other computers on the network. What should you check first?

A

Use Network & Internet to check the network profile type. When the network changed, the user probably selected the wrong option at the prompt to allow the PC to be discoverable, and the profile is probably set to Public. Change the type Private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or false? Windows Defender Firewall cannot be disabled.

A

False. It is not usually a good idea to do so, but it can be disabled via Security Center or the Control Panel applet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You need to set up a VPN connection on a user’s Windows laptop. The VPN type is IKEv2. What other information, if any, do you need to configure the connection?

A

You must also input the fully qualified domain name (FQDN) or IP address of the remote access VPN server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an ipconfig command tool?

A

A Command tool used to gather information about the IP configuration of a Windows host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a ping command?

A

A ping command is a cross-platform command tool for testing IP packet transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a tracert command?

A

A tracert command is diagnostic utilities that trace the route taken by a packet as it “hops” to the destination host on a remote network. Tracert is the Windows implementation, while traceroute runs a Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a pathping command?

A

A pathping command is a Windows utility for measuring latency and packet loss across an internetwork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a nslookup command?

A

A nslookup command is a cross-platform command toll for querying DNS resource records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is netstat command?

A

Netstat is a cross-platform command tool to show network information on a machine running TCP/IP, notably active connections, and the routing table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A DHCP server has been reconfigured to use a new network address scheme following a network problem. What command would you use to refresh the IP configuration on Windows client workstations?

A

ipconfig /renew

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A computer cannot connect to the network. The machine is configured to obtain a TCP/IP configuration automatically. You use ipconfig to determine the IP address and it returns 0.0.0.0. What does this tell you?

A

This is an irregular state for a Windows PC. If a DHCP server cannot be contacted, the machine should default to using an APIPA address (169.254.x.y). As it has not done this, something is wrong with the networking software installed on the machine. The best option is probably to perform a network reset via the Settings > Network & Internet > Status page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

You are pinging a host at 192.168.0.99 from a host at 192.168.0.200. The response is “Reply from 192.168.0.200: Destination host unreachable.” The hosts use the subnet mask 255.255.255.0. Does the ping output indicate a problem with the default gateway?

A

No. The hosts are on the same IP network (192.168.0.0/24). This means that 192.168.0.200 does not try to use a router (the gateway) to send the probes. 192.168.0.200 uses address resolution protocol (ARP) to find the host with the IP 192.168.0.99. The host unreachable message indicates that there was no response, but the problem will be an issue such as the host being disconnected from the network or configured to block discovery rather than a gateway issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

You are checking that a remote Windows workstation will be able to dial into a web conference with good quality audio/video. What is the best tool to use to measure latency between the workstation’s network and the web conferencing server?

A

pathping measures latency over a longer period and so will return a more accurate measurement than the individual round trip time (RTT) values returned by ping or tracert.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which command produces the output shown in this screenshot?

A

This is output from netstat. The -n switch has been used to show ports in numeric format and the -o switch to show the PID of the process that opened the port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is ACL?

A

Access Control List is a collection of access control entries (ACEs) that determines which subjects (user accounts, host IP addresses, and so on) are allowed or denied access to the object and the privileges given (read-only, read/write, and so on).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is implicit deny?

A

Implicit deny is the basic principle of security stating that unless something has explicitly been granted access, it should be denied access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is least privilege?

A

Least privilege is the basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a local account?

A

A local account is a user account that can be authenticated again and allocated permissions for the computer that hosts the account only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a security group?

A

A security group is an access control feature that allows permissions to be allocated to multiple users more efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is an Administrator?

A

An Administrator is a privileged user account that has been granted memberships of the Administrators security group. There is also an account named Administrator, but this is usually disabled by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a standard account?

A

A standard account is a non-privileged user account in Windows that typically has membership of the Users security group only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a guest account?

A

A guest account is a non-privileged account that is permitted to access the computer/network without authenticating.

33
Q

What is a power user?

A

A power user is one of the default Windows group accounts. Its use is deprecated, but it is still included with Windows to support legacy applications.

34
Q

What is UAC?

A

User Account Control is a Windows feature designed to mitigate abuse of administrative accounts by requiring explicit consent to use privileges.

35
Q

What is MFA?

A

Multifactor authentication is an authentication scheme that requires the user to present at least two different factors as credentials; for example, something you know, something you have, something you are, something you do, and somewhere you are. Specifying two factors is known as 2FA.

36
Q

What is 2-step verification?

A

2-step verification is an authentication mechanism that uses a separate channel to authorize a sign-on attempt or to transmit an additional credential. This can use a registered email account or a contact phone number for an SMS or voice call.

37
Q

What is a hard token?

A

A hard token is a USB storage key or smart card with a cryptographic module that can hold authenticating encryption keys securely.

38
Q

What are the three typical Windows authentication methods?

A
  • Windows local sign-in
  • Windows network sign-in
  • Remote sign-in
39
Q

What is a Windows local sign in?

A

The Local Security Authority (LSA) compares the submitted credential to the one stored in the Security Accounts Manager (SAM) database, which is part of the registry. Also referred as ‘interactive login’

40
Q

What is a Windows network sign-in?

A

The LSA can pass the credentials for authentication to a network service. The preferred system for network authentication is based on a system called Kerberos, which is a single sign-on authentication service that is based on a time-sensitive, ticket-granting system.

41
Q

What is a Remote sign-in?

A

If the user’s device is not connected to the local network, authentication can take place over some type of virtual private network (VPN) or web portal.

42
Q

What is the TPM?

A

The trusted platform module is a specification for secure hardware-based storage of encryption keys, hashed passwords, and other user- and platform-identification information.

43
Q

What is SSO?

A

Single Sign-On is an authentication technology that enables a user to authenticate once and receive authorizations for multiple services.

44
Q

What is a domain?

A

A domain is a group of hosts that is within the same namespace and administered by the same authority

45
Q

What is AD?

A

Active Directory is a network directory service for Microsoft Windows domain networks that facilitates authentication and authorization of user and computer accounts.

46
Q

What is a member server?

A

A member server is any application server computer that has joined a domain but does not maintain a copy of the Active Directory database

47
Q

What are security groups?

A

Security groups are an access control feature that allows permissions to be allocated to multiple users more efficiently.

48
Q

What is a OU?

A

An organizational unit is a structural feature of a network directory that can be used to group objects that should share a common configuration or organizing principle, such as accounts within the same business department.

49
Q

What is a GPO?

A

A group policy object is a way to deploy per-user and per-computer settings such as password policy, account restrictions, firewall status, etc on a Windows domain.

50
Q

What is gpupdate?

A

gpupdate is a command-line tool to apply and analyze group policies. Group policies are a means of configuring registry settings

51
Q

What is a login script?

A

A login script is code that performs a series of tasks automatically when a user account is authenticated.

52
Q

What is MDM?

A

Mobile Device Management is the process and supporting technologies for tracking, controlling, and securing the organization’s mobile infrastructure.

53
Q

While you are assigning privileges to the accounting department in your organization, Cindy, a human resource administrative assistant, insists that she needs access to the employee records database so that she can fulfill change of address requests from employees. After checking with her manager and referring to the organization’s access control security policy, you discover that Cindy’s job role does not fall into the authorized category for access to that database. What security concept are you practicing in this scenario?

A

The principle of least privilege.

54
Q

Which three principal user security groups are created when Windows is installed?

A

Users, Administrators, and Guests. You might also include Power Users, though use of this group is deprecated. Going beyond the account types listed in the exam objectives, you might include groups such as Remote Desktop Users, Remote Management Users, or Backup Operators. There are also system groups, such as Everyone, but users cannot be assigned manually to these.

55
Q

What tool would you use to add a user to a local security group?

A

You can change the account type between Standard and Administrator via Control Panel, but the Local Users and Groups management console is the tool to use for a custom security group. You could also use the net localgroup command.

56
Q

What are the requirements for configuring fingerprint authentication via Windows Hello?

A

The computer must have a fingerprint reader and a trusted platform module (TPM). Windows Hello must first be configured with a personal identification number (PIN) as a backup method.

57
Q

True or false? If you want the same policy to apply to a number of computers within a domain, you could add the computers to the same Organizational Unit (OU) and apply the policy to the OU.

58
Q

You are writing a tech note to guide new technicians on operational procedures for working with Active Directory. As part of this note, what is the difference between the gpupdate and gpresult commands?

A

gpupdate is used to refresh local policy settings with updates or changes from the policy template. gpresult is used to identify the Resultant Set of Policies (RSoP) for a given computer and/or user account.

59
Q

Angel brought in the new tablet he just purchased and tried to connect to the corporate network. He knows the SSID of the wireless network and the password used to access the wireless network. He was denied access, and a warning message was displayed that he must contact the IT Department immediately. What happened, and why did he receive the message?

A

Mobile device management (MDM) is being used to mediate network access. The device must be enrolled with the MDM software before it can join the network.

60
Q

What is a workgroup?

A

A workgroup is a group of network hosts that shares resources in a peer-to-peer fashion. No one computer provides a centralized directory.

61
Q

What is network discovery?

A

Network discovery is a windows firewall configuration that makes a host visible to network browsers

62
Q

What is file sharing?

A

File sharing is a Windows firewall configuration that opens the network ports required to operate as a file/print server.

63
Q

What is a mapped drive?

A

A mapped drive is a Windows mechanism for navigating shared network folders by assigning them with drive letters.

64
Q

What net use command displays a list of servers on the local network?

65
Q

What net use command views the shares available on server named MYSERVER?

A

net view \MYSERVER

66
Q

What net use command maps the DATA folder on MYSERVER to the M: drive?

A

net use M: \MYSERVER\DATA /persistent:yes

67
Q

What net use command removes the M: drive mapping?

A

net use M: /delete

68
Q

What net use command removes all mapped drives?

A

net use * /delete

69
Q

What are NTFS permissions?

A

NFTS permissions are ACL that mediates local and network access to a file system object under Windows when the volume is formatted with NTFS.

70
Q

What is a home folder?

A

A home folder is a default local or network folder for users to save data files to.

71
Q

What are roaming proflies?

A

Roaming policies configure a network share to hold user profile data. The data is copied to and from the share at logon and logoff.

72
Q

What is folder redirection?

A

In Windows, redirecting an individual user profile folder, such as documents or pictures, to a network share.

73
Q

What are the prerequisites for joining a computer to a domain?

A

The computer must be running a supported edition of Windows (Pro, Enterprise, or Education). The PC must be configured with an appropriate IP address and have access to the domain DNS servers. An account with domain administrative credentials must be used to authorize the join operation.

74
Q

You receive a call from a user trying to save a file and receiving an “Access Denied” error. Assuming a normal configuration with no underlying file corruption, encryption, or malware issue, what is the cause and what do you suggest?

A

The user does not have “Write” or “Modify” permission to that folder. If there is no configuration issue, you should advise the user about the storage locations permitted for user-generated files. If there were a configuration issue, you would investigate why the user had not been granted the correct permissions for the target folder.

75
Q

What is the significance of a $ symbol at the end of a share name?

A

The share is hidden from the file browser. It can be accessed by typing a UNC. The default administrative shares are all configured as hidden.

76
Q

When you set NTFS permissions on a folder, what happens to the files and subfolders by default?

A

They inherit the parent folder’s permissions.

77
Q

If a user obtains Read permissions from a share and Deny Write from NTFS permissions, can the user view files in the folder over the network?

A

Yes (but he or she cannot create files).

78
Q

A user is assigned Read NTFS permissions to a resource via his user account and Full Control via membership of a group. What effective NTFS permissions does the user have for the resource?

A

Full control—the most effective permissions are applied.