CHAPTER FOURTEEN: MANGING WINDOWS NETWORKING Flashcards

(54 cards)

1
Q

Network Interface Card (NIC)

A

Your computer uses a piece of hardware called a network adapter (or NIC) to connect to a network. It can connect with a cable to a switch, or wirelessly to a Wi-Fi access point.

To work correctly, the settings on this adapter need to match the device it’s connecting to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wired Connections (Ethernet)

A

Most wired networks use a system called Ethernet. That just means you use a cable with big plugs (called RJ45 jacks) to connect to a network.

The adapter and the switch it connects to should support the same type of Ethernet.

Usually, both ends will auto-negotiate—they figure out the best settings automatically.

When you plug in the cable, Windows creates a connection and gives it a name like Ethernet.

If you have more than one adapter, they’ll be named Ethernet2, Ethernet3, etc.

You can change these names if you want.

To change Ethernet settings yourself:
- Go to Device Manager, right-click the adapter, choose Properties, then go to the Advanced tab.
- Or go to Network & Internet settings and click on the adapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless Connections (Wi-Fi)

A

To connect wirelessly:

Click the network icon in the bottom-right corner of your screen.

You’ll see a list of available networks.

If a network shows up, that means its SSID (name) is being broadcast.

You’ll also see:
- Signal bars showing how strong the signal is.
- A lock icon if the network needs a password (uses encryption).

Click a network, enter the password, and you’re connected!

If you choose Connect Automatically, Windows will join it on its own whenever it’s nearby.

If the network doesn’t show up, you might need to add it manually:
- Go to Network & Internet > Wi-Fi > Manage known networks > Add new network.
- You can also change Wi-Fi adapter settings in Device Manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IP Addressing

A

For your computer to talk to others on a network, it needs an IP address—a kind of digital street address.

There are two versions:

  1. IPv4: Most common, looks like this: 192.168.1.100

The subnet mask (like 255.255.255.0) tells the computer which part is the network and which part is the host (your specific device).

  1. IPv6: Newer, longer addresses, like 2001:0db8:85a3::8a2e:0370:7334

Designed to allow way more devices on the internet.
It uses prefixes to identify parts of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

default gateway

A

the router that sends traffic to other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DNS severs

A

which translates website names like google.com into IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Static vs. Dynamic IP Addresses

A

Static: You type in the IP address manually. This is more work and is mostly used for servers or special devices.

Dynamic: A service called DHCP automatically gives your computer a working IP address. Much easier—this is the default for most home and office networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Windows Network Configuration

A

Each network adapter (Ethernet or Wi-Fi) in Windows usually has:

Client for Microsoft Networks (lets your PC share files and printers).
Internet Protocol (IPv4 and IPv6).
Link-layer Topology Discovery (helps your computer find other devices)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Location Types

A

Public: Your PC hides itself from other devices. Good for airports, coffee shops, etc.

Private: Your PC is visible to other devices—good for home or work networks.

Network Discovery lets you see other computers in File Explorer under Network.
Windows uses something called UNC paths to find shared stuff, like this:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Windows Defender Firewall

A

The firewall is like a bouncer—it controls what’s allowed in or out of your computer’s network.

You can:

Turn it on or off.

Block all incoming connections.

Allow or block specific apps:
- Go to Firewall & network protection > Allow an app through firewall.
- Check the boxes for the networks (Public or Private) where the app is allowed.
- Or click Allow another app to find one not listed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VPN and WWAN (Cellular) Connections

A

VPN (Virtual Private Network):
Think of it like a secure tunnel through the internet. It lets you connect to a work or private network while keeping the connection safe and encrypted.

WWAN (Wireless Wide Area Network):
This is like using your cellular data (like LTE/5G) to go online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wireless Wide Area Network (WWAN)

A

A Wireless Wide Area Network lets your computer or tablet connect to the internet using cellular networks, like how your phone does. Think of it as using mobile data on a laptop.

It uses a WWAN adapter — a little device, either inside your computer or plugged in through USB, that talks to the mobile network.

The speed of your internet (called bandwidth) depends on whether your area and adapter support 3G, 4G, or 5G (newer = faster).

You can turn the connection on or off using the little Wi-Fi or network icon near the clock in Windows, or by going into Network and Internet settings.

To avoid this, you can tell Windows that your connection is metered (limited), and even set a data cap (a maximum amount of data you’re allowed to use).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Proxy Settings

A

A proxy server is like a middleman between your computer and the internet.

Instead of your PC going straight to websites, it asks the proxy server to go get the data for it.

This can help make things faster and more secure.

For example, the proxy might cache (store) copies of websites so they load faster for others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

different types of proxy settings

A

Transparent (intercepting) proxies: You don’t have to set anything up — it just works.

Autoconfiguring proxies: They set themselves up for you.

Manual proxies: You have to enter the IP address and port number in settings to make it work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Troubleshooting Windows Networking

A

Your IP address is like your computer’s phone number on the network. If something goes wrong with your IP, Windows might say:

Unplugged or disconnected: You might not be connected at all — check your Wi-Fi or cable.

Limited connectivity: Your computer asked for an IP address using DHCP (Dynamic Host Configuration Protocol) but didn’t get one. So Windows assigns itself a weird address like 169.254.x.x — this won’t get you online.

No Internet Access: You’re connected to your router or local network, but the internet itself isn’t working — maybe a DNS (Domain Name System) or router problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ping Command

A

Let’s say your computer is connected properly — but you still can’t get to a printer, shared folder, or email server.

To figure out if it’s a network problem and not just a software bug, use: This is like sending a digital “Are you there?” message to another computer or device.

If it works, great. If not, you might see messages like:

Reply from SenderIP: Destination unreachable: The device you’re trying to reach can’t be found. Might be turned off or there’s a wrong IP or subnet mask.

Reply from GatewayIP: Destination unreachable: Your router doesn’t know how to get to that destination. Could be a misconfigured router.

Request timed out: The device didn’t answer — maybe it’s offline or set to ignore pings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Troubleshoot Remote Network Connectivity (trace route_

A

Use tracert (Trace Route)
It shows you each hop (router) your request goes through on the way to the final destination.

You’ll see:

A list of routers (or hops).

How long each hop takes.

If a step fails, it shows timeouts (marked with *), which might mean something is wrong along the way.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

pathping

A

This command does a tracert, and then pings every hop multiple times to show latency (delay) and packet loss. If there’s a problem with your router or internet provider, this helps narrow it down.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Name Resolution?

A

It’s when your computer uses DNS to translate names like www.google.com into IP addresses.

If DNS isn’t working, you might still be able to reach websites by IP, but not by name.

Other issues might include:

Firewall or security software blocking connections.
The application itself being broken.
The server is up, but the specific service or app is not running.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

netstat Command

A

This shows which ports are open, and which programs are using them.

-a: Show all ports, including UDP.

-b: Show the actual program using each port (admin mode only).

-o: Show the process ID (PID).

-n: Show everything in numbers (faster).

-e, -s: Show Ethernet and protocol statistics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What Are Security Controls?

A

Security controls are tools or rules that protect your stuff—your files, your network, your identity, and your devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

types of security controls

A

Physical Controls – These are real-world things like locks, doors, and fences that keep people out of places.

Procedural Controls – These are rules people follow, like security training, incident response plans, and company policies.

Logical Controls – These are digital protections built into your computer or software. Things like passwords, firewalls, and antivirus software fall here.

23
Q

Access Control & the AAA Triad

A

A big part of digital security is Access Control—deciding who can get in, what they can do, and keeping track of it. This is explained by something called the AAA triad:

  1. Authentication – Proving you are who you say you are. Usually with a password or PIN.
  2. Authorization – Deciding what you’re allowed to do. Can you just read a file or also change it?
  3. Accounting – Logging what happened. The system keeps records of who did what and when.
24
Q

Access Control Lists (ACLs)

A

An Access Control List (ACL) is like a guest list for a file or resource.

It lists who (subject) can access something and what they’re allowed to do (permissions).

The list includes Access Control Entries (ACEs) – each ACE says “This person or device can do X.”

25
Implicit Deny
If you’re not explicitly allowed, you’re automatically denied. No rule = no access.
26
least privilege
Least Privilege – Only give someone the bare minimum access they need to do their job. No extras. It’s safer that way.
27
User and Group Accounts in Windows
A User Account is your digital identity. It controls what you can access. A Local Account (only works on that one computer) A Microsoft Account (online account linked with email, can sync settings across devices) Security Groups are collections of user accounts. It’s easier to give permissions to a group than to each person one-by-one. - Administrators – Have full power. Only trusted users should be in this group. - Users – Standard access. Can use apps and printers but not change important settings. - Guests & Power Users – Mostly outdated. Shouldn’t be used much anymore.
28
User Account Control (UAC)
User Account Control (UAC) is a feature that stops apps from making big changes without permission. - If you try to install something or change system settings, you get a pop-up asking if you’re sure. - Even if you’re an admin, you still have to click "Yes" to approve it. - You can adjust how often this pops up, but turning it down makes your system less safe. UAC supports least privilege by making sure that even admins don’t accidentally mess things up or let malware take control.
29
Authentication Factors
When you log in, you use authentication factors to prove who you are. These come in three types: Something You Know – Like a password or PIN. Something You Have – Like a phone, smart card, or USB key. Something You Are – Like your fingerprint or face.
30
Multifactor Authentication (MFA)
Think of authentication like proving who you are to a computer. Normally, you do this by entering a password. But a password alone isn’t very safe. Someone could guess it, steal it, or trick you into giving it up. So, Multifactor Authentication (MFA) makes you prove your identity in two or more different ways, called factors.
31
2-Step Verification
This is a type of MFA, often used by apps and websites. It works like this: You enter your password (that's the first step). Then the system sends you a code (called a soft token) to something you own, like your phone or email. You enter that code to finish logging in.
32
Authenticator App
An authenticator app (like Microsoft Authenticator or Google Authenticator) makes things more secure and sometimes even lets you log in without a password. How it works: You install the app on your phone. You connect (or register) it to the account you want to protect by scanning a QR code. When you try to log in, the app shows a code or asks you to approve the login. You use your phone's fingerprint, PIN, or face to approve it.
33
Hard Token Authentication
A hard token is a physical device, like a USB stick or smart card, that you plug in when logging in. It stores secure information, like a digital key. When you log in, you plug in the token and enter a PIN or use your fingerprint. The system checks the token to make sure it's really you.
34
Windows Login Options
There are 3 main ways to log in on a Windows system: Local Sign-In: Your computer checks your password against what’s stored on that computer only (inside something called SAM, part of the Windows registry). Network Sign-In: Your computer checks your login with the help of the Kerberos system, which is a secure way for systems on the same network to trust each other. Remote Sign-In: If you're not on the local network (like you're at home), your company might use a VPN or web portal to let you sign in remotely.
35
Windows Hello
Windows Hello lets you log in without typing your password. You can use: PIN – Like a password, but it's tied to just that one computer and is stored in a secure part of the computer’s chip called the TPM. Fingerprint – Your unique finger scan. Facial Recognition – Uses a special infrared camera to make sure it's your actual face and not a photo. Security Key – A special USB or smart card that acts like a key to unlock your account.
36
Single Sign-On (SSO)
Single Sign-On means you log in once, and then you’re automatically signed into other related services. For example: You log into Windows. You’re now also signed into Outlook, OneDrive, and Teams — no need to log in again. Windows Hello for Business tries to make SSO safer by removing passwords. It uses: A secure key (like a digital fingerprint of your device) stored in your computer’s TPM. When you log in with your face or PIN, your computer proves who you are by sending an encrypted secret to the server. The server checks it and lets you in.
37
Windows Domains & Active Directory
In big companies or schools, computers are part of a domain (a network with shared rules and accounts). This makes managing users easier. Local accounts only work on one computer. Domain accounts work across all computers in the domain.
38
Domain Controller (DC)
A Domain Controller is a special server that stores all the login info and settings for a domain. It uses something called Active Directory (AD) — a giant list of users, computers, and permissions. The DC: Checks logins. Tells computers whether to trust someone. Is managed by Domain Admins (high-level IT staff).
39
Member Server
A member server is a regular server that's part of the domain but doesn’t store the Active Directory info itself. It just helps provide services like: Email (Exchange) Databases (SQL Server) Shared files and printers
40
Security Groups
A security group is a way to group users together to manage their permissions. Instead of giving one person access to something, you give access to the group. Everyone in that group gets the same rights. Example: The Domain Admins group can log in to any computer. The Domain Users group can only use their regular workstations.
41
Organizational Units (OUs)
What it is: Think of an Organizational Unit (OU) as a folder inside your company’s digital filing cabinet (called a domain). Why it matters: You can divide employees into groups (like departments: Sales, HR, IT) to give different permissions or controls. Example: You could let the Sales Manager manage user accounts in their own folder (OU), like adding/removing people or assigning them to a “Sales” team, but they wouldn’t be allowed to change big security settings like password rules.
42
Group Policy
What it is: A Group Policy is like a master rulebook that says how computers and user accounts should behave. What it controls: It can change security settings, install software, or control what users can and can’t do. How it works: You create a Group Policy Object (GPO) and then link it to a domain or an OU. One OU can have more than one GPO. Inheritance: If two sets of rules apply to the same user or computer, the system decides which rules "win" using something called Resultant Set of Policies (RSoP) — basically, it figures out the final set of rules.
43
Group Policy Updates
You can wait for policies to update automatically (about every 90 minutes), or use commands to apply them right away: gpupdate — Applies the new rules immediately. Use /force to reapply everything. gpresult — Shows what rules (Group Policies) are affecting a specific computer or user account. You can even check a different device by using switches like /s for system, /u for user, and /p for password.
44
Login Scripts
What they are: Small scripts (mini programs) that run when a user signs in. What they do: They can set up things automatically like: Map folders from a server (network drives) Connect to a printer Set environment variables Security: You can make it so users can’t log in unless their devices are up-to-date, using login scripts.
45
Mobile Device Management (MDM)
What it is: Software that manages and secures phones and tablets (and sometimes laptops). What it does: Keeps track of devices used in the company Makes sure each device follows rules before connecting Can control apps, camera, or access to company data Why it matters: It protects the company from data leaks or unsafe devices — even with personal (BYOD) phones.
46
Workgroup vs. Domain
Workgroup: A simple setup where each computer manages its own settings. They talk to each other like equals (peer-to-peer). Domain: A more professional setup. One or more servers control the computers (clients) in the network. Everything is managed from a central place.
47
File Share Configuration
Public Folder: A special folder everyone on the computer can use. You can make this available on the network. Custom Folder: Right-click a folder → Give access to → Choose who can see it and what they can do (read or read/write). Share tab: Lets you fine-tune the name, how many people can connect at once (max 20 in Windows Home/Pro), and the permissions. Administrative Shares: Hidden shares like C$ (your C drive) and ADMIN$ (system folder) are only for admins.
48
Network Browsing and Mapped Drives
Browsing the Network: Open File Explorer > Network — you’ll see other computers and devices like printers or routers. Each one shows up by its hostname. Mapped Drive: This is a shared folder that you make look like a regular drive (like the D: or E: drive). - Right-click a share > Map Network Drive - Pick a letter, check Reconnect at sign-in to make it stick. - Shows up in This PC like a normal drive. - To remove it: Right-click > Disconnect.
49
net use Commands
Connecting to Shared Folders and Drives on a Network. Think of your home or office network like a neighborhood, and each computer is a house. net and net use are tools you use in the Command Prompt to talk to other computers or access shared stuff (like folders or drives).
50
NTFS vs Share Permissions
Permissions are rules that say who can read, edit, or delete files and folders. There are two types of permission systems: 1. Share Permissions: Only apply when someone accesses the folder over the network. Do nothing if you're using the computer locally. 2. NTFS Permissions: Work both locally and over the network. Can apply to folders and individual files. Can be set for users or security groups (groups of users, like “HR” or “Accounting”). These permissions are set in the Security tab of a file/folder’s properties. There’s a list called an ACL (Access Control List). Each item in that list is an ACE (Access Control Entry). It tells you what a user/group can or can’t do.
51
Permissions Inheritance
NTFS permissions are inherited — meaning subfolders and files get the same permissions as the parent folder. You can turn off inheritance if you want to customize access. If you combine Share and NTFS permissions, the most restrictive wins. Example: If "Everyone" has Read on Share Permissions And "Users" have Modify on NTFS, Then a user will still only get Read access when connecting over the network. Because this can get confusing, most admins give Full Control in share permissions and control access only through NTFS permissions.
52
Domain Setup
A domain is like a company network with one central boss (called a domain controller). When your computer is joined to a domain, it becomes part of the team and follows the boss’s rules. To join a domain: Your computer needs an account in the domain. It must be connected to the domain network. You need to log in with a domain admin’s username/password. To log in as a domain user: Use Domain\Username on the login screen. Or click Other user if your computer is showing a local account.
53
Home Folders
In a domain, it's smarter to store your files on a file server, not just your local PC. A home folder is like a personal locker on the network. It’s mapped to a drive letter, like H:, and is private. It’s set up using this format: \\SERVER\HOME$\%USERNAME%
54
Roaming Profiles & Folder Redirection
If you use multiple computers, your files won’t follow you... unless you use one of these: 1. Roaming Profiles: Stores your entire user profile on a server. When you log in, it downloads everything. When you log out, it uploads changes. Downside: can be slow if you have lots of data. 2. Folder Redirection: Just redirects important folders (like Documents or Pictures) to a server. Faster, and only works when you’re connected to the network. Set up using Group Policy (GPO).