Module 8 Flashcards

1
Q

What is the Settings app in Windows?

A

The Settings app in Windows is a central location where users can adjust various settings and preferences for their computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What types of settings can be adjusted in the Settings app?

A

Examples of settings that can be adjusted in the Settings app include display settings, personalization settings, system settings, network and internet settings, privacy settings, and update and security settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where can users find and access the Settings app in Windows?

A

The Settings app can be found and accessed by clicking on the Start button and then selecting the gear icon, or by searching for “settings” in the search bar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Network and Sharing Center in Windows?

A

The Network and Sharing Center in Windows is a feature that allows users to manage their network connections and settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What types of tasks can be performed in the Network and Sharing Center?

A

Examples of tasks that can be performed in the Network and Sharing Center include viewing the status of network connections, changing network settings, setting up new connections, troubleshoot network problems and share files and printers on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can users access the Network and Sharing Center in Windows?

A

Users can access the Network and Sharing Center by clicking on the Start button, then Control Panel, then Network and Sharing Center. Or by searching for “Network and Sharing Center” in the search bar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is IPconfig?

A

IPconfig is a command-line tool in Windows that is used to display the current configuration of a network connection, including the IP address, subnet mask, and default gateway. It can also be used to release and renew DHCP leases and flush the DNS cache.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Windows PowerShell and what can it be used for?

A

Windows PowerShell is a command-line shell and scripting language that allows you to automate many tasks in Windows, including managing network settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some examples of Windows PowerShell cmdlets that can be used to manage network settings?

A

Examples of Windows PowerShell cmdlets that can be used to manage network settings are Get-NetAdapter, Get-NetIPAddress, Set-NetIPAddress, Get-NetIPConfiguration. These cmdlets can be used to retrieve and configure information about network adapters, IP addresses, and IP configurations on a local or remote computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a troubleshooting approach to networking?

A

A troubleshooting approach to networking is a systematic process of identifying, isolating, and resolving issues that may be preventing network connections from being established between computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the steps involved in a troubleshooting approach to networking?

A

The steps involved in a troubleshooting approach to networking are Identifying the problem, Gather information, Isolate the problem, Resolve the problem and Verify the solution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the most common protocol used in networks to establish connections between computers?

A

The most common protocol used in networks to establish connections between computers is the Transmission Control Protocol/Internet Protocol (TCP/IP) which is responsible for routing the data packets across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Ping and what is it used for?

A

Ping is a tool that sends an Internet Control Message Protocol (ICMP) echo request packet to a specified host and waits for an ICMP echo reply. It is used to test the reachability of a host and to measure the round-trip time for packets to travel from the source host to the destination host and back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Traceroute and what is it used for?

A

Traceroute is a tool that is used to trace the path that packets take from the source host to the destination host. It sends a series of ICMP echo request packets to the destination host, with each packet having a different Time-to-Live (TTL) value and uses ICMP time exceeded messages to determine the path that the packets took and the IP address of each router along the way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does Ping determine the reachability of a host?

A

Ping determine the reachability of a host by sending an Internet Control Message Protocol (ICMP) echo request packet to a specified host and waiting for an ICMP echo reply.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does Traceroute trace the path of packets from a source host to a destination host?

A

Traceroute traces the path of packets from a source host to a destination host by sending a series of ICMP echo request packets to the destination host, with each packet having a different Time-to-Live (TTL) value. As each packet passes through a router, its TTL is decremented by one. When a packet’s TTL reaches zero, the router sends an ICMP time exceeded message back to the source host. Traceroute uses these messages to determine the path that the packets took and the IP address of each router along the way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the process of verifying IP configuration and activity?

A

Verifying IP configuration and activity refers to the process of checking and ensuring that the IP settings of a network device are correct and that the device is able to communicate with other devices on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some command-line tools and techniques that can be used to verify IP configuration and activity?

A

Some command-line tools and techniques that can be used to verify IP configuration and activity are ipconfig, ping, tracert and netstat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How does the command “ipconfig” help in verifying IP configuration?

A

The command “ipconfig” can be used to view the IP configuration of a network device, including the IP address, subnet mask, and default gateway.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does the command “ping” help in verifying IP activity?

A

The command “ping” can be used to test the reachability of a host and to measure the round-trip time for packets to travel from the source host to the destination host and back, thus helping in verifying IP activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How does the command “tracert” help in verifying IP activity?

A

The command “tracert” can be used to trace the path that packets take from the source host to the destination host, helping in verifying IP activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How does the command “netstat” help in verifying IP activity?

A

The command “netstat” can be used to display active TCP connections and the ports on which the computer is listening, thus helping in verifying IP activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is test communications?

A

Test communications is the process of using tools such as ping and traceroute to test the reachability of a host and to measure the round-trip time for packets to travel from the source host to the destination host and back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is verifying basic connectivity?

A

Verifying basic connectivity is the process of checking that all necessary network components such as cables, switches, and routers are properly connected and configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is identifying each hop between two systems?

A

Identifying each hop between two systems is the process of using traceroute to trace the path that packets take from the source host to the destination host and identifying the IP address of each router along the way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is test name resolution?

A

Test name resolution is the process of testing the ability of a system to resolve host names to IP addresses using tools such as nslookup or dig.

27
Q

What is test connectivity to a specific remote host server process?

A

Test connectivity to a specific remote host server process is the process of using tools such as telnet or nc to test the ability of a system to connect to a specific service or port on a remote host.

28
Q

What is determining the status of network services and hosts?

A

Determining the status of network services and hosts is the process of checking the availability and responsiveness of network services and hosts.

29
Q

What are the tools that can be used to determine the status of network services and hosts?

A

Some tools that can be used to determine the status of network services and hosts are ping, traceroute, netstat, and nslookup.

30
Q

What is verifying port availability?

A

Verifying port availability is the process of checking whether a specific port is open and listening on a network host.

31
Q

What are the tools that can be used to verify port availability?

A

Some tools that can be used to verify port availability are telnet or nc (netcat)

32
Q

What is another way to check the availability of a port?

A

Another way to check the availability of a port is by using the command netstat -an | find “listening” and filter the port that you are looking for, which will return whether the port is listening or not.

33
Q

What is investigating a name resolution problem?

A

Investigating a name resolution problem involves identifying and resolving issues that may be preventing a system from resolving host names to IP addresses.

34
Q

What are the steps involved in investigating a name resolution problem?

A

The steps involved in investigating a name resolution problem are Identifying the problem, Gather information, Isolate the problem, Resolve the problem and Verify the solution.

35
Q

What tools can be used to identify a name resolution problem?

A

Tools such as nslookup or dig can be used to identify a name resolution problem.

36
Q

What are some ways to resolve a name resolution problem?

A

Some ways to resolve a name resolution problem include configuring the DNS server or editing the hosts file.

37
Q

How can you verify if the solution to a name resolution problem has been successful?

A

The solution to a name resolution problem can be verified by testing the network to ensure that the network is able to resolve host names to IP addresses correctly.

38
Q

What is NSLookup?

A

NSLookup is a command-line tool that is used to diagnose and troubleshoot DNS name resolution issues.

39
Q

What are the two modes of operation of NSLookup?

A

NSLookup has two modes of operation: interactive and non-interactive.

40
Q

What are some things that NSLookup can be used for?

A

Some things that NSLookup can be used for are: checking the IP address of a hostname, checking the hostname associated with an IP address, finding the mail exchange (MX) record for a domain, finding the name server (NS) record for a domain, and finding the start of authority (SOA) record for a domain.

41
Q

How can you use NSLookup to check the IP address of a hostname?

A

To check the IP address of a hostname using NSLookup, you can use the command “nslookup hostname” in either interactive or non-interactive mode.

42
Q

How can you use NSLookup to check the hostname associated with an IP address?

A

To check the hostname associated with an IP address using NSLookup, you can use the command “nslookup IP address” in either interactive or non-interactive mode.

43
Q

How can you use NSLookup to find the mail exchange (MX) record for a domain?

A

To find the mail exchange (MX) record for a domain using NSLookup, you can use the command “nslookup -query=mx domain” in either interactive or non-interactive mode.

44
Q

How can you use NSLookup to find the name server (NS) record for a domain?

A

To find the name server (NS) record for a domain using NSLookup, you can use the command “nslookup -query=ns domain” in either interactive or non-interactive mode.

45
Q

How can you use NSLookup to find the start of authority (SOA) record for a domain?

A

To find the start of authority (SOA) record for a domain using NSLookup, you can use the command “nslookup -query=soa domain” in either interactive or non-interactive mode.

46
Q

What is interpreting the output from NSLookup?

A

Interpreting the output from NSLookup involves understanding the different types of information that are displayed and how to use that information to troubleshoot DNS name resolution issues.

47
Q

What information is displayed in the output of NSLookup?

A

The output of NSLookup includes information such as server, address, and additional information depending on the query.

48
Q

What is the first line of the output of NSLookup?

A

The first line of the output of NSLookup is the DNS server that was queried.

49
Q

What is the second line of the output of NSLookup?

A

The second line of the output of NSLookup is the IP address of the hostname or the hostname associated with the IP address that was queried.

50
Q

What additional information is displayed in the output of NSLookup when the query is for a specific record type?

A

Additional information such as the priority and hostname will be displayed in the output of NSLookup when the query is for a specific record type such as MX or NS.

51
Q

How can the output of NSLookup be difficult to read and interpret?

A

The output of NSLookup can be difficult to read and interpret, especially when the query returns multiple records or when the query returns an error message.

52
Q

What is important to pay attention to when interpreting the output of NSLookup?

A

When interpreting the output of NSLookup, it is important to pay attention to the type of record being queried and the details of the response in order to identify and resolve DNS name resolution issues.

53
Q

What is testing a DNS server?

A

Testing a DNS server involves checking the functionality and performance of the DNS server to ensure that it is properly configured and able to resolve hostnames to IP addresses correctly.

54
Q

What are the steps involved in testing a DNS server?

A

The steps involved in testing a DNS server are checking the DNS server’s configuration, testing the DNS server’s resolution capabilities, testing the DNS server’s performance, monitoring the DNS server’s logs and checking DNS server security.

55
Q

How do you check the DNS server’s configuration?

A

The DNS server’s configuration can be checked by verifying that the DNS server is configured correctly and that it has the correct IP addresses for the DNS forwarders and root servers.

56
Q

How do you test the DNS server’s resolution capabilities?

A

The DNS server’s resolution capabilities can be tested using tools such as nslookup or dig to query the DNS server for different types of records and check that it returns the correct results.

57
Q

How do you test the DNS server’s performance?

A

The DNS server’s performance can be tested by measuring the time it takes for the DNS server to respond to queries and comparing it to industry standards or to other DNS servers.

58
Q

How do you monitor the DNS server’s logs?

A

The DNS server’s logs can be monitored by checking for errors or unusual activity and troubleshoot any issues that are found.

59
Q

How do you check DNS server security?

A

DNS server security can be checked by ensuring that the DNS server is protected against common DNS-related attacks like DNS amplification attacks, DNS cache poisoning, and DNS spoofing. This can be done by configuring firewalls and intrusion detection systems, implementing DNS security protocols such as DNSSEC, and monitoring the DNS server logs for any suspicious activity.

60
Q

When would you use the ping command?

A

You would use the ping command to check the reachability of a host and measure the round-trip time for packets to travel from the source host to the destination host and back.

61
Q

When would you use the traceroute command?

A

You would use the traceroute command to trace the path that packets take from the source host to the destination host and identify the IP address of each router along the way.

62
Q

When would you use the netstat command?

A

You would use the netstat command to display active TCP connections and display the process associated with each connection.

63
Q

When would you use the nslookup command?

A

You would use the nslookup command to query a DNS server for information about host addresses, mail exchanges, and other types of DNS records.

64
Q

When would you use the IPconfig command?

A

You would use the IPconfig command to display the IP address, subnet mask, and default gateway for all adapters on a computer.