Windows Networking Flashcards

1
Q

Which of the following statements describing different methods for organizing Windows-based computers in networks are true? [3]

A
  • Windows-based computers on a network must be part of a workgroup or a domain
  • Windows-based computers on workplace networks are usually part of a domain
  • Windows-based computers on home networks are usually part of a workgroup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the statements listed below apply to Windows workgroups? [3]

A
  • Workgroups typically consist of no more than twenty computers
  • Logging on to any computer in the workgroup requires an account on that computer
  • Each computer in the workgroup has its own security policy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings?

A

system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements apply to Windows domains? [3]

A
  • Logging on to any computer requires a single set of credentials
  • Security policies are administered centrally
  • Windows domains are based on client-server networking architecture
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following locations/steps allows to view network shares in Windows? [5]

A
  • Windows Command Prompt -> net share -> Enter (all network shares)
  • Windows Run dialog box -> \computer name -> Enter (user shares only)
  • Shared Folders menu in the Computer Management utility (all network shares)
  • Windows Command Prompt -> net view \computer name -> Enter (user shares only)
  • Windows Command Prompt -> net view \computer name /all -> Enter (all network shares)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In MS Windows, the “$” sign appended to the end of the name of a network share indicates that the shared folder or drive is:

A

hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following characters indicates that a Windows network share is intended for administrative access?

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network?

A

Windows Explorer -> Computer -> Map network drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network?

A

File Explorer -> This PC -> Computer tab -> Map Network drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network? [2]

A
  • Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab
  • Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)? [2]

A
  • Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device
  • Control Panel -> Devices and Printers applet -> Add a printer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following locations in Windows provide access to dial-up and VPN settings? [3]

A
  • Internet Options (Connections tab)
  • Network and Sharing Center
  • Settings menu
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following settings are used for establishing a VPN connection in Windows? [3]

A
  • Internet address (domain name or IPv4/IPv6 address)
  • Destination name
  • Smart card (optional)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following Internet access types takes advantage of PSTN lines?

A

Dial-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following settings are used for establishing a dial-up connection in Windows? [3]

A
  • Dial-up phone number
  • user name
  • password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of configuration info is used for setting up a wireless connection in Windows? [4]

A

Network name
Encryption type
Security type
Security key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following terms describes the most common type of wired connections used in modern networks?

A

ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following takes advantage of cell towers that provide wireless signal coverage for mobile devices?

A

wwan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

A

proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following locations provide access to proxy settings in Windows? [2]

A
  • Windows Settings menu -> Network & Internet -> Proxy
  • Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server
22
Q

Which of the following answers describe the features of Windows Remote Desktop tool? [3]

A
  • Permanent remote access
  • Access based on local password (local user account password)
  • Windows tool used for connecting remotely to the user’s own computer
23
Q

Which of the following answers refer(s) to the Windows Remote Assistance utility? [5]

A
  • Access based on one-time password
  • Temporal remote access
  • The host and invited user can both see the host’s screen
  • The host and invited user share control over host’s mouse and keyboard
  • Windows tool used for assisted remote troubleshooting
24
Q

Which of the Windows network profiles imposes the strongest security settings?

A

public

25
Q

Which network profile in Windows by default disables the network discovery feature?

A

public

26
Q

A Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing is known as:

A

public

27
Q

Which of the following locations provides access to Windows Firewall settings in Windows 7?

A

Windows Firewall applet in Control Panel

28
Q

Which of the following locations provides access to Windows Defender Firewall settings in Windows 8/8.1/10? [2]

A
  • Windows Defender Firewall applet in Control Panel
  • Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection
29
Q

Which of the following locations in Windows 8/8.1/10 provide access to configuration options for managing apps or features allowed through Windows Defender Firewall? [3]

A
  • Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item
  • Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall
  • Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall
30
Q

Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to create an exception for a TCP or UDP port?

A
  • Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule… -> Port
31
Q

Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to block incoming echo requests?

A

Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule… -> Custom -> All programs (or a single app)

32
Q

In Windows 7, Windows Firewall can be enabled/disabled in: [2]

A
  • Windows Firewall Control Panel applet
  • Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties
33
Q

In Windows 8/8.1/10, Windows Defender Firewall can be enabled/disabled in: [3]

A
  • Windows Defender Firewall Control Panel applet
  • Firewall & network protection menu in Windows Settings (accessed via Start menu)
  • Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties
34
Q

A network protocol providing an alternative solution to the manual allocation of IP addresses is known as:

A

DHCP

35
Q

Automatic Private IP Addressing (APIPA) addresses are valid only for communications within a network segment that a given host is connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and 169.254.255.254) cannot connect to the Internet. The assignment of APIPA address typically indicates a problem related to:

A

DHCP

36
Q

What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications?

A

IP

37
Q

A type of logical numeric identifier assigned to every single computer host or other device on a TCP/IP-based network is known as:

A

IP Address

38
Q

Which of the following allows to determine which network segment an IP address belongs to?

A

Subnet mask

39
Q

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

A

DNS

40
Q

In order to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request?

A

DNS Server

41
Q

In a network using subnets, the term “Default gateway” refers to a network device (e.g. router) that enables exchange of data between hosts residing in different subnets.

A

true

42
Q

Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows? [4]

A
  • IP address
  • Subnet mask
  • Default gateway
  • DNS server address
43
Q

Which of the following answers describes the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows?

A

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields

44
Q

Transmission carried out in one direction only is described as a simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes.

A

true

45
Q

A type of transmission that takes place in two directions simultaneously is known as:

A

full duplex

46
Q

If a network adapter’s “Speed & Duplex” property is set to Half Duplex, communication on the network will be taking place:

A

Only in one direction at a time

47
Q

Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based on the highest performance settings supported by both devices.

A

true

48
Q

Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows?

A

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Speed & Duplex settings

49
Q

A solution that allows to turn on a network host remotely by sending a broadcast frame is called:

A

wake on lan

50
Q

Which of the following answers describes the correct sequence of steps for accessing the magic packet settings of an Ethernet adapter in MS Windows?

A

Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure… button -> On the Advanced tab, select the Magic Packet settings

51
Q

Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic?

A

Quality of Service (QoS)

52
Q

In order to operate, an integrated component such as Network Interface Card (NIC) may need to be first:

A

Enabled in the advanced BIOS settings menu