Test 2 Flashcards
Chapters 6, 7, 8 , 9, 10
Classes Alfa Bravo Charlie number of addresses
Alfa: 16777214 (2^24-2)
Bravo: 65534 (2^16-2)
Charlie: 254 (2^8-2)
Class Alfa Bravo Charlie range of addresses
Alfa: 0 - 127
Bravo: 128 - 191
Charlie: 192 - 223
IPv6 addresses are made up of
eight hextets separated by colons
*Top-level: Second-level:
Top-level: .com .org .edu
Second-level: Microsoft.comWikipedia.org mit.edu
*The process of associating host names to IP addresses: Only ones that Windows support:
DNS WINS LLMNR (if first two fail) PNRP
The ______ command displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols).
netstat
Used without parameters, netstat displays…
active TCP connections.
*Allows wireless clients to connect to each other without the use of a wireless access point (AP)
Ad hoc
Supports bandwidth up to 11 Mbps; uses the 2.5‐GHz
frequency; susceptible to interference with cordless
phones and microwaves operating in the same frequency;
WEP‐ and WPA‐supported.
802.11b
Supports bandwidth up to 54 Mbps; uses the 5‐GHz
frequency; less interference with common household
devices; higher frequency means shorter range compared
with 802.11b and also less apt to penetrate walls;
incompatible with 802.11b because they use different
frequencies; WEP‐ and WPA‐supported.
802.11a
*Supports bandwidth up to 54 Mbps; uses the 2.5‐GHz
frequency; backward compatible with 802.11b; 802.11g
was designed to use the best features of both 802.11b and
802.11a; WEP‐ and WPA‐supported.
802.11g
Security standard for 802.11 networks that use RADIUS
for authentication; provides key management; RADIUS
provides centralized authentication, authorization, and
accounting for remote connections.
802.1X
*It is a Microsoft implementation that uses ad hoc wireless networking that allows you to easily connect to another wireless device.
Wi‐Fi Direct
To use Wi‐Fi Direct with Windows 10, you would first create a
pairing between two devices, similarly to what you would do with Bluetooth
It is used when your computer is connected to its corporate domain and can authenticate to the domain controller through one of its connections.
A domain profile
It is used when your computer is connected to a private network location (home or small office network) and is located behind a firewall and/or a device that performs NAT. If you are using this profile with a wireless network, you should implement encryption (WPA v2).
A private profile
It is used when your computer is connected to a public network (for example, directly connected to the Internet). It is assigned to the computer when it is first connected to a new network; rules associated with this profile are the most restrictive.
A public profile
It is a new feature introduced with Windows 7 and
Windows Server 2008 R2. Provides seamless intranet connectivity to ________ client computers when they are connected to the Internet
Configuring DirectAccess
*_______ connections are automatically established and they provide always-on seamless connectivity
DirectAccess
Overcomes the limitations of VPNs by automatically establishing a bidirectional connection from client computers to the organization’s network using IPsec and Internet Protocol version 6 (IPv6)
DirectAccess Connection
FAT Maximum Partition Size, Maximum Size
2GB, 2GB
FAT32 Maximum Partition Size, Maximum Size
32GB, 4GB
NTFS Maximum Partition Size, Maximum Size
256TB, Limited by the size of the volume on which it resides
exFAT Maximum Partition Size, Maximum Size
128 PB, Limited by the size of the volume on which it resides
Allows for more partitions and larger volume sizes.
A GPT partition style
*A disk initialized as a GPT partition style may contain
up to 128 primary partitions. Each partition can be as large as 9.4 zettabytes (ZB). One zettabyte is equal to one billion terabytes.
Uses free space available on a single disk.
Simple volume
Extends a simple volume across multiple disks, up to a maximum of 32.
Spanned volume
Duplicates data from one disk to a second disk for redundancy and fault tolerance; if one disk fails, data can be accessed from the second disk. You cannot span a mirrored volume; a mirrored volume must reside on a single disk. Mirroring is also referred to as RAID‐1.
Mirrored volume
Stores data across two or more physical disks. Data on a striped volume is written evenly to each of the physical disks in the volume. You cannot mirror or span a striped volume. Striping is often referred to as RAID‐0.
Striped volume
Writes one copy of your data but doesn’t protect against drive failures; requires at least one drive.
Simple (no resiliency)
*Writes two copies of your data to protect against a single drive failure; requires at least two drives.
Two‐way mirror
Writes three copies of your data to protect against two simultaneous drive failures; requires at least five drives.
Three‐way mirror:
*Writes data with parity information to protect against single drive failures; requires at least three drives.
Parity
Only drives that are marked as ________ can be connected while the system is running.
Hot pluggable
Enables user/group to view file and subfolder names, view data in files, and run programs
Read (permission)
Enables user/group to add files and subfolders to the shared folder, change data in files, delete subfolders and files, and change any permission associated with Read
Change (permission)
*Enables user/group to change file permissions (NTFS only), take ownership of files (NTFS only), and perform tasks associated with Change/Read
Full Control (permission)
(NTFS Permission)
Folder: Enables user/group to read the contents of the folder.
File: Enables user/group to read the contents of the file.
Read (NTFS Permission)
(NTFS Permission)
Folder: Enables user/group to read the contents of the folder and execute programs in the folder.
File: Enables user/group to read the contents of the file and execute the program.
Read & Execute (NTFS Permission)
(NTFS Permission)
Folder: Enables user/group to create files and folders.
File: Enables user/group to create a file.
Write (NTFS Permission)
(NTFS Permission)
Folder: Enables user/group to read and write permissions. User can delete files within the folder and view the contents of subfolders.
File: Enables user/group to read and write permissions.
User can modify the contents of the file.
Modify (NTFS Permission)
(NTFS Permission)
Folder: Enables user/group to view a list of files in the selected folder; user is not allowed to read the contents of a file or execute a file.
File: There is no equivalent permission for files.
List Folder Contents (NTFS Permission)
(NTFS Permission)
Folder: Enables user/group to add, change, move, and delete items. User can also add and remove permissions on the folder and its subfolders.
File: Enables user/group to change, move, delete, and manage permissions. User can also add, change, and remove permissions on the file.
Full Control (NTFS Permission)
Two types of permission used in NTFS
Explicit: directly
Inherited: from parent folder
*Hierarchy of precedence of permission is as follows:
Explicit Deny
Explicit Allow
Inherited Deny
Inherited Allow
As an administrator, your
goal is to provide storage space while minimizing the costs of adding more storage. ________ enable you to maintain a balance between the two by limiting the amount of storage space you allocate to your users.
Disk quotas
Disk quotas, a feature first introduced in _______ are available in _______ and _______ editions. When enabled, the Disk Quota Manager monitors and tracks the files that are owned by a specific user.
Windows 2000, are available in Windows 10 and Windows Server 2016 editions.
Windows 10 default libraries
Documents library: Stores word‐processing documents, spreadsheets, and similar files.
Music library: Stores audio files, such as those you’ve downloaded from the Web, transferred from a portable device (music player), or ripped from a CD.
Pictures library: Stores digital image files.
Video library: Stores video files.
By default, public folder sharing is off.
Except
when a system is part of a homegroup.
*When sharing documents, you have the following options:
Send e‐mail
Post to
Get a link (view only/ view and edit/ public)
Used to give individual users or groups permission to a file or folder. You can then remove permissions for a specific group or individual if necessary. When users receive the link via email and visit OneDrive, the file or folder will appear in their list of shared files. You do not have to know their Microsoft user account address. If they do not have one, they can create one for free after clicking the link.
Send e‐mail (One Drive document sharing option)
Used to share the link on Facebook, LinkedIn, or Twitter. Anyone who views the post on your network can forward the link. If you selected the option to allow recipients to edit the document, anyone the link is forwarded to can view and edit the file or folder.
Post to (One Drive document sharing option)
Used to share the file with a larger number of recipients. For example, you could post the link on your blog or your website. You can also include this link in an email or instant message. When using this option, you can choose from the
Get a link (One Drive document sharing option)
Types of links (Get a link, sharing document option)
View only: Anyone who receives this link can see the files you
share.
View and edit: Anyone with this link can see and edit the files
you share.
Public: Anyone can search for and view your public files, even
if you don’t share a link, if you decide to make it public.
A printer that is connected directly to a computer, usually through a USB port/ connection.
Local printer
Multiple users can share the same printer.
Network printers
*hardware: What Microsoft calls a physical printer.
Print device /host
What Microsoft calls a logical printer.
Printer
When you open Printer Properties, you will find the
following options:
General Tab
Sharing Tab
Advanced Tab
*Allows you to configure the printer name, location, and comments and to print a test page. In addition, if you click the Printing Preferences button on the General tab, the default paper size, paper tray, print quality/resolution, pages per sheet, print order (such as front to back or back to front), and number of copies will display. The actual options that are available will vary depending on your printer.
General tab (printer properties)
Allows you to share a printer. You can also publish the printer in Active Directory if you chose the List in the directory option. Because a printer on a server can be used by other clients connected to the network, you can add additional drivers by clicking the Additional Drivers button. When sharing a printer, you are using TCP ports 139 and 445 and UDP ports 137 and 138.
Sharing tab (printer properties)
Allows you to configure the driver to use with the printer, the priority of the printer, when the printer is available, and how print jobs are spooled.
Advanced tab (printer properties)
Use the ___________ to uninstall programs or to change a program’s configuration
Control Panel’s Programs and Features
The Startup tab of the Task Manager shows programs configured to automatically start when you start Windows. How to disable?
Right-click an item and click Disable
*Allows you to view the current downloads and allows you to check for updates for the Windows Store apps.
Downloads and updates
*The Windows Installer is a software component used for the installation, maintenance, and removal of software on Windows. The installation information for software is stored in a file in a _____________ database installation file that has an _____ filename extension. Besides performing installation, files can be used to self‐heal damaged applications and to remove an application cleanly.
Microsoft Software Installation (MSI) .msi
The process of installing Windows Store applications without using the Windows Store
Sideloading
Identifies an application in the Windows Store by providing a link that will take the user directly to the app in the Windows Store.
Deeplinking
*A proprietary protocol that was developed by Microsoft to connect to another computer over a network connection using the same graphical interface that you would use if you were sitting in front of the physical server.
Remote Desktop Protocol (RDP)
Allows you to connect to a Remote Desktop Session Host or to a Remote Application.
Remote Desktop Connection (RDC)
Allows users to access a remote computer just as if they were sitting in front of the computer.
Remote Desktop Services (RDS)
*RDP TCP port
3389
Two ways to access a remote computer using a MMC
Redirect an existing snap-in to another system
Create a custom console with snap-ins directed to other systems
*To execute a command from the Windows 10 command prompt, you must use the
WinRS.exe program
Winrs -r:
computer [-u:user][-p:password] command
MMC tools and utilities are used to
Check computer events
Look at computer resource usage
Examine a disk’s partition
*Is a popular snap‐in that includes several tools such as Disk Management, which is used
to configure hard disks and their partitions and Event Viewer, which allows you to view computer event information, such as program starting and stopping (including program crashes) and security problems
Computer Management
Computer Management (MMC utilities)
Disk Management
Event Viewer
Performance Monitor
*Compatibility tab contents
Run troubleshooter
Compatibility mode /dropdown for service packs
Settings bar:
*Reduced color mode
*Run in 640x480 screen resolution
*Disable display scaling on High DPI settings
*Run this program as an administrator
Is a Windows 10 service
that enables administrators to execute commands on remote
computers using Windows PowerShell or the Windows Remote Shell
(WinRS.exe) command‐line program.
Windows Remote Management (WinRM)
*By default, Windows Server 2012 R2 and Windows Server 2016 can
support up to two remote sessions at once, while Windows 10 only
supports _____________
one remote connection.