IT APPLICATIONS 5: Managing Windows Networking Flashcards

1
Q

The administrator sets up the IP address on a 24-bit subnet. What should the administrator set the subnet mask to?

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A desktop technician is setting up a new PC on a local network and is trying to install software as a part of the setup process. They try to access a network share via a UNC path of \fileserv01\Setup\Apps and get a message that the location cannot be reached. They ping the file server by IP and get a reply. What network configuration on the PC should be prioritized for investigation?

A

DNS (Domain Name System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A network administrator responds to users calling in about a slow network. Which command should the administrator use to diagnose the chokepoint?

A

pathping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A user is experiencing what seems to be latency, which is affecting their ability to work. They decide to validate their theory with a ping test. What will indicate latency?

A

RTT (Round Trip Time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A server administrator wants to connect to a user’s computer and push a file through Server Message Block (SMB). How should the administrator connect to the computer?

A

\userhost\C$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A way of dividing a domain up into different administrative realms

A

OU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The devices will connect to their cloud servers through a 4G WWAN. What will the company need to ensure the devices connect to the cloud resources?

A

SIM (Subscriber Identity Module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Permissions are applied for both network and local access and can be applied to folders and to individual files.

A

NTFS (New Technology File System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The user also explains that they can somehow reach the share via the IP at \192.168.8.20\ShareDrive. Which of the following should the technician check first?

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the most important setting to verify in order to ensure the PC is capable of connecting to an existing network?

A

Protocol Support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Used to investigate open ports and connections on the local host.

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The administrator wants to copy the file to users’ automatically hidden shares. Which of the following could the administrator use?

A

C$ or ADMIN$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Trace the path a packet of information takes to get to its target

A

tracert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This allows the administrator to hop on to any of the company’s computers. What technique was set up?

A

Roaming Profile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Two IT friends are best friends and want to map each other’s root shares. Which of the following commands will accomplish this?

A

net use M: \BestFriend\C$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The user must submit at least two different kinds of credentials

A

MFA (Multifactor Authentication)

16
Q

A penetration tester looks to harvest credentials from users who log in locally. Where should the penetration tester look for users who authenticated locally?

A

SAM ( Security Accounts Manager)

17
Q

What would be an example of the FQDN? (Fully Qualified Domain Name)

A

userhost.comptia.com

18
Q

Support legacy applications

A

Power Users