Core 2: Windows Networking Flashcards

1
Q

Which of the following statements describing different methods for organizing Windows-based computers in networks are true? (Select 3 answers)

Windows-based computers on home networks must be part of a HomeGroup

Windows-based computers on a network must be part of a workgroup or a domain

Windows-based computers on workplace networks are usually part of a domain

Windows-based computers on workplace networks are usually part of a workgroup

Windows-based computers on home networks are usually part of a workgroup

Windows-based computers on home networks are usually part of a domain

A

Windows-based computers on a network must be part of a workgroup or a domain

Windows-based computers on workplace networks are usually part of a domain

Windows-based computers on home networks are usually part of a workgroup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the statements listed below apply to Windows workgroups? (Select 3 answers)

Security policies and permissions in workgroups are administered centrally

Logging on to any computer on the workgroup requires a single account

Workgroups typically consist of no more than twenty computers

There is no limit on the number of hosts that can become a part of a single workgroup

Logging on to any computer in the workgroup requires an account on that computer

Each computer in the workgroup has its own security policy

A

Workgroups typically consist of no more than twenty computers

Logging on to any computer in the workgroup requires an account on that computer

Each computer in the workgroup has its own security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings?

Credential Manager
System
User Accounts
Administrative Tools

A

System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following statements apply to Windows domains? (Select 3 answers)

Logging on to any computer on a Windows domain requires a single set of credentials

Security policies and permissions on a Windows domain are administered centrally

Windows domains are based on Peer-to-Peer (P2P) networking architecture

Each computer on a Windows domain has its own security policy

Windows domains are based on client-server networking architecture

All members of a Windows domain must be on the same local network or subnet

A

Logging on to any computer on a Windows domain requires a single set of credentials

Security policies and permissions on a Windows domain are administered centrally

Windows domains are based on client-server networking architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following locations/steps allows to view network shares in Windows?

Windows Command Prompt -> net share -> Enter (all network shares)

Windows Run dialog box -> \computer name -> Enter (user shares only)

Shared Folders menu in the Computer Management utility (all network shares)

Windows Command Prompt -> net view \computer name -> Enter (user shares only)

Windows Command Prompt -> net view \computer name /all -> Enter (all network shares)

All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In MS Windows, the “$” sign appended to the end of the name of a network share indicates that the shared folder or drive is:

Hidden
Inaccessible
Visible to any user
Encrypted

A

Hidden

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following characters indicates that a Windows network share is intended for administrative access?

#
$
?
&

A

$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network?

Windows Explorer -> Computer -> Map network drive

Shared Folders menu in the Computer Management utility

Network and Sharing Center applet in Windows Control Panel

File Explorer -> This PC -> Computer tab -> Map Network drive

A

Windows Explorer -> Computer -> Map network drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network?

Network and Sharing Center applet in Windows Control Panel

File Explorer -> This PC -> Computer tab -> Map Network drive

Windows Explorer -> Computer -> Map network drive

Shared Folders menu in the Computer Management utility

A

File Explorer -> This PC -> Computer tab -> Map Network drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network? (Select 2 answers)

Control Panel -> Devices and Printers applet -> Add a printer

Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab

Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab

Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device

A

Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab

Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)? (Select 2 answers)

Control Panel -> Devices and Printers applet -> right-click on a selected printer -> Printer Properties -> Sharing tab

Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device

Control Panel -> Devices and Printers applet -> Add a printer

Windows Start button -> Settings -> Devices -> Printers & scanners -> select a printer -> Manage -> Printer Properties -> Sharing tab

A

Windows Start button -> Settings -> Devices -> Printers & scanners -> Add printers & scanners -> Add a printer or scanner -> select a printer -> Add Device

Control Panel -> Devices and Printers applet -> Add a printer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following locations in Windows provide access to dial-up and VPN settings? (Select 3 answers)

 Phone and Modem
 System Configuration
 Internet Options (Connections tab)
 Network and Sharing Center
 Windows Mobility Center
 Settings menu
A

Internet Options (Connections tab)
Network and Sharing Center
Settings menu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:

Personal Area Network (PAN)
Virtual Local Area Network (VLAN)
Integrated Services Digital Network (ISDN)
Virtual Private Network (VPN)

A

Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following settings are used for establishing a VPN connection in Windows? (Select 3 answers)

 Network name
 Internet address (domain name or IPv4/IPv6 address)
 Security type
 Destination name
 Encryption type
 Smart card (optional)
A
Internet address (domain name or IPv4/IPv6 address)
Destination name
Smart card (optional)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following Internet access types takes advantage of PSTN lines?

Ethernet
Mobile broadband
Dial-up
Optical fiber

A

Dial-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following settings are used for establishing a dial-up connection in Windows? (Select 3 answers)

 Dial-up phone number
 Encryption type
 User name
 Security type
 Password
 Destination name
A

Dial-up phone number
User name
Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What type of configuration info is used for setting up a wireless connection in Windows? (Select all that apply)

 Network name
 Smart card (optional)
 Encryption type
 Destination name
 Security type
 Internet address (domain name or IPv4/IPv6 address)
 Security key
A

Network name
Encryption type
Security type
Security key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following terms describes the most common type of wired connections used in modern networks?

Coax
WiMAX
Ethernet
Token Ring

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following takes advantage of cell towers that provide wireless signal coverage for mobile devices?

WPAN
WWAN
Satellite
WLAN

A

WWAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:

Bridge
Active hub
Server
Proxy

A

Proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following locations provide access to proxy settings in Windows? (Select 2 answers)

Windows Settings menu -> System -> Network & Internet -> Proxy

Windows Control Panel -> Internet Options -> Privacy tab -> Advanced -> Proxy server

Windows Settings menu -> Network & Internet -> Proxy

Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server

Windows Settings menu -> Update & Security -> Proxy

Windows Control Panel -> Network and Sharing Center -> Change adapter settings -> Proxy server

A

Windows Settings menu -> Network & Internet -> Proxy

Windows Control Panel -> Internet Options -> Connections tab -> LAN settings -> Proxy server

22
Q

Which of the following answers describe the features of Windows Remote Desktop tool? (Select 3 answers)

Permanent remote access

The host and invited user share control over host’s mouse and keyboard

Access based on local password (local user account password)

Windows tool used for connecting remotely to the user’s own computer

The host and invited user can both see the host’s screen
Windows tool used for assisted remote troubleshooting

Access based on one-time password

Temporal remote access

A

Permanent remote access

Access based on local password (local user account password)

Windows tool used for connecting remotely to the user’s own computer

23
Q

Which of the following answers refer(s) to the Windows Remote Assistance utility? (Select all that apply)

Access based on one-time password

Temporal remote access

Access based on local password (local user account password)

The host and invited user can both see the host’s screen

Windows tool used for connecting remotely to the user’s own computer

The host and invited user share control over host’s mouse and keyboard

Permanent remote access

Windows tool used for assisted remote troubleshooting

A

Access based on one-time password

Temporal remote access

The host and invited user can both see the host’s screen

The host and invited user share control over host’s mouse and keyboard

Windows tool used for assisted remote troubleshooting

24
Q
Which of the Windows network profiles imposes the strongest security settings?
 Home
 Private
 Work
 Public
25
``` Which network profile in Windows by default disables the network discovery feature? Home Private Work Public ```
Public
26
A Windows network profile that hides a computer from other devices on the network and makes it unavailable for file and printer sharing is known as: Home Private Work Public
Public
27
Which of the following locations provides access to Windows Firewall settings in Windows 7? Network and Sharing Center applet in Control Panel Windows Firewall applet in Control Panel Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection Internet Options (Security tab)
Windows Firewall applet in Control Panel
28
Which of the following locations provides access to Windows Defender Firewall settings in Windows 8/8.1/10? (Select 2 answers) Windows Defender Firewall applet in Control Panel Internet Options (Security tab) Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection Internet Options (Advanced tab) Network and Sharing Center applet in Control Panel
Windows Defender Firewall applet in Control Panel Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection
29
Which of the following locations in Windows 8/8.1/10 provide access to configuration options for managing apps or features allowed through Windows Defender Firewall? (Select 3 answers) Network and Sharing Center applet in Control Panel -> Allow an app or feature through Windows Defender Firewall Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item Security and Maintenance applet in Control Panel -> Allow an app or feature through Windows Defender Firewall Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall
Windows Defender Firewall applet in Control Panel -> Turn Windows Defender Firewall on or off menu item Windows Start button -> Settings -> Update & Security -> Windows Security -> Firewall & network protection -> Allow an app through firewall Windows Defender Firewall applet in Control Panel -> Allow an app or feature through Windows Defender Firewall
30
Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to create an exception for a TCP or UDP port? Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Port Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Custom Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Network protocols Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> All programs (or a single app)
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound/Outbound Rules -> New Rule... -> Port
31
Which of the following locations in Windows 8/8.1/10 provides access to configuration options that would allow to block incoming echo requests? Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Outbound Rules -> New Rule... -> Network protocols Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Custom -> All programs (or a single app) Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Outbound Rules -> New Rule... -> Custom -> All programs (or a single app) Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Network protocols
Windows Defender Firewall applet in Control Panel -> Advanced settings -> right-click on Inbound Rules -> New Rule... -> Custom -> All programs (or a single app)
32
In Windows 7, Windows Firewall can be enabled/disabled in: (Select all that apply) Programs and Features Control Panel applet Security and Maintenance Control Panel applet Firewall & network protection menu in Windows Settings (accessed via Start menu) Windows Firewall Control Panel applet Network and Sharing Center Control Panel applet Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties
Windows Firewall Control Panel applet Windows Firewall Control Panel applet -> Advanced settings -> right-click on Windows Firewall with Advanced Security -> Properties
33
In Windows 8/8.1/10, Windows Defender Firewall can be enabled/disabled in: (Select all that apply) Network and Sharing Center Control Panel applet Windows Defender Firewall Control Panel applet Security and Maintenance Control Panel applet Firewall & network protection menu in Windows Settings (accessed via Start menu) Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties Programs and Features Control Panel applet
Windows Defender Firewall Control Panel applet Windows Defender Firewall Control Panel applet -> Advanced settings -> right-click on Windows Defender Firewall with Advanced Security -> Properties
34
A network protocol providing an alternative solution to the manual allocation of IP addresses is known as: DNS SNMP NAT DHCP
DHCP
35
Automatic Private IP Addressing (APIPA) addresses are valid only for communications within a network segment that a given host is connected to. A host with APIPA-assigned address (i.e. an IP address in the range between 169.254.0.1 and 169.254.255.254) cannot connect to the Internet. The assignment of APIPA address typically indicates a problem related to: SNMP DNS SMTP DHCP
DHCP
36
What is the name of a network layer protocol that specifies the format of packets and addressing scheme in network communications? UDP IP TCP NetBIOS
IP
37
A type of logical numeric identifier assigned to every single computer host or other device on a TCP/IP-based network is known as: MAC address SSID IP address Host ID
IP address
38
Which of the following allows to determine which network segment an IP address belongs to? Physical address Dynamic Host Configuration Protocol (DHCP) Address Resolution Protocol (ARP) Subnet mask
Subnet mask
39
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses? TCP/IP DNS SQL DHCP
DNS
40
In order to connect to a website and display its contents, a URL entered in the web browser address bar needs to be translated into an IP address. Which of the servers listed below is used to handle this type of request? DNS server Proxy server DHCP server Web server
DNS server
41
In a network using subnets, the term "Default gateway" refers to a network device (e.g. router) that enables exchange of data between hosts residing in different subnets. True False
True
42
Which of the following answers list(s) data required for manual configuration of network adapter settings in MS Windows? (Select all that apply) ``` IP address Subnet mask Default gateway MAC address DNS server address SSID (a.k.a. network name) ```
IP address Subnet mask Default gateway DNS server address
43
Which of the following answers describes the correct sequence of steps for accessing the manual configuration interface for IPv4 connections in MS Windows? Control Panel (Category view) -> Network and Internet -> Internet Options -> Advanced tab -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Category view) -> Network and Internet -> Network and Sharing Center applet -> Change adapter settings -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> select Internet Protocol version 4 (TCP/IPv4) from the connection components list -> click the Properties button -> fill in the required fields
44
Transmission carried out in one direction only is described as a simplex mode. Communication that takes place only in one direction at a time is referred to as half-duplex mode. Two devices communicating with each other in both directions simultaneously are said to be in full-duplex mode. Network devices supporting autonegotiation feature automatically configure best mode supported by both devices. Duplex mismatch is the term used for a situation where two devices communicate with each other using different duplex modes. True False
True
45
A type of transmission that takes place in two directions simultaneously is known as: Full duplex Broadcast Half duplex Multicast
Full duplex
46
If a network adapter's "Speed & Duplex" property is set to Half Duplex, communication on the network will be taking place: Only in one direction at a time In both directions at half the speed In one direction at half the speed In both directions simultaneously
Only in one direction at a time
47
Auto negotiation is an Ethernet procedure that allows two connected devices to exchange information about their capabilities (such as supported speed and duplex modes) and automatically configure connection parameters based on the highest performance settings supported by both devices. True False
True
48
Which of the following answers describes the correct sequence of steps for accessing the Speed & Duplex settings of an Ethernet adapter in MS Windows? Control Panel (Category view) -> View Devices and Printers -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Speed & Duplex settings
49
A solution that allows to turn on a network host remotely by sending a broadcast frame is called: Remote access Jumbo frame Backdoor access Wake-on-LAN
Wake-on-LAN
50
Which of the following answers describes the correct sequence of steps for accessing the magic packet settings of an Ethernet adapter in MS Windows? Control Panel (Icon view) -> Internet Options applet -> Connections tab -> click the "LAN settings" button -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings Control Panel (Category view) -> Network and Internet -> View Network Computers and Devices -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings Control Panel (Category view) -> View Devices and Printers -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings
Control Panel (Icon view) -> Network and Sharing Center applet -> Change adapter settings -> right-click on the device -> select Properties from the pop-up menu -> click the Configure... button -> On the Advanced tab, select the Magic Packet settings
51
Which of the following solutions is used for controlling network resources and assigning priority to different types of traffic? Measured service Acceptable Use Policy (AUP) Fair access policy Quality of Service (QoS)
Quality of Service (QoS)
52
In order to operate, an integrated component such as Network Interface Card (NIC) may need to be first: Updated with the latest driver Verified against the Hardware Compatibility List (HCL) Checked with a loopback plug Enabled in the advanced BIOS settings menu
Enabled in the advanced BIOS settings menu