Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
334 Cards in this Set
- Front
- Back
What does a file screen do?
|
prevents storage of particular files within folders
|
|
What are the 3 configuration settings for file screens?
|
file groups
|
|
Within file screens
|
what are file groups?
|
|
What does active screening do within file screens?
|
prevents saving files to the specified folder
|
|
What does passive screening do within file screens?
|
reports when someone saves a restricted file within the specified folder
|
|
What is print pooling?
|
configuring a single printer object to print to multiple devices
|
|
Which encryption system encrypts full volumes
|
EFS or BitLocker?
|
|
Which encryption system encrypts individual files and folders
|
EFS or BitLocker?
|
|
What happens if an unencrypted file is moved to an EFS-encrypted folder?
|
the file is encrypted
|
|
What happens if an EFS-encrypted file is moved to an unencrypted folder?
|
it remains encrypted
|
|
What security risk exists in transferring EFS-encrypted files?
|
the files are not encrypted during transfer
|
|
What command-line command can be used to encrypt and decrypt files and folders with EFS?
|
cipher.exe
|
|
Who controls encryption with EFS?
|
the individual user
|
|
What does a file screen do?
|
prevents storage of particular files within folders
|
|
What are the 3 configuration settings for file screens?
|
file groups, screening policies, and notification settings
|
|
Within file screens, what are file groups?
|
groups of files that should belong or not belong to a group
|
|
What does active screening do within file screens?
|
prevents saving files to the specified folder
|
|
What does passive screening do within file screens?
|
reports when someone saves a restricted file within the specified folder
|
|
What is print pooling?
|
configuring a single printer object to print to multiple devices
|
|
Which encryption system encrypts full volumes, EFS or BitLocker?
|
BitLocker
|
|
Which encryption system encrypts individual files and folders, EFS or BitLocker?
|
EFS
|
|
What happens if an unencrypted file is moved to an EFS-encrypted folder?
|
the file is encrypted
|
|
What happens if an EFS-encrypted file is moved to an unencrypted folder?
|
it remains encrypted
|
|
What security risk exists in transferring EFS-encrypted files?
|
the files are not encrypted during transfer
|
|
What command-line command can be used to encrypt and decrypt files and folders with EFS?
|
cipher.exe
|
|
Who controls encryption with EFS?
|
the individual user
|
|
What are the 3 firewall actions?
|
block, allow, and secure
|
|
How are outbound connections handled by default by Windows Firewall?
|
they are not filtered by default
|
|
How are inbound connections handled by default by Windows Firewall?
|
they are blocked by default
|
|
What command-line command will show what applications are listening for incoming connections?
|
netstat -a -b
|
|
What does Network Access Protection do?
|
connects hosts to different network resources based on current health state
|
|
What are the 4 NAP enforcement types?
|
IPSec connection security, 802.1x access points, VPN servers, and DHCP servers
|
|
What additional component is required for IPSec connection security?
|
Certificate Services
|
|
What two methods can 802.1x used to control access levels?
|
access control list (ACL) or VLAN
|
|
What advantage do ACL's have as an 802.1x enforcement method?
|
non-compliant machines can't communicate amongst themselves
|
|
How does DHCP Server Enforcement prevent unauthorized network access?
|
only compliant machines are issued IP addresses
|
|
What subnet mask is granted to non-compliant machines when using DHCP Server Enforcement?
|
255.255.255.255
|
|
How does DHCP Server Enforcement handle non-compliant hosts?
|
they are given host routes for resources to become compliant
|
|
In IPSec, what do connection security rules do?
|
configure IPSec settings between computers
|
|
What protocol does IPSec Transport Mode use to create a tunnel?
|
L2TP
|
|
When should IPSec Tunnel Mode be used?
|
when a VPN gateway isn't compatible with IPSec/L2TP
|
|
What range of addresses does ICS use?
|
192.168.0.0/24
|
|
What IP address does ICS assign to the internal adapter?
|
192.168.0.1
|
|
What two roles does an ICS computer play for clients sharing that connection?
|
default gateway and primary DNS server
|
|
What two types of WPA does Microsoft support?
|
WPA-PSK and WPA-EAP
|
|
What does WPA-EAP require that WPA-PSK does not?
|
certificates
|
|
What component provides RADIUS services for Windows?
|
Network Policy Server (NPS)
|
|
Where is the RADIUS log file stored?
|
%systemroot%system32Log Files
|
|
How is the RADIUS log file named?
|
IN<date>.log
|
|
Which Event Viewer log holds RADIUS events?
|
the Security log
|
|
What 3 VPN technologies are supported by 2008 and Vista?
|
Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), and Secure Socket Tunneling Protocol (SSTP)
|
|
What protocol do Microsoft VPN protocols use for user authentication?
|
PPP
|
|
What protocol does PPTP use for data encryption?
|
Microsoft Point-to-Point Encryption (MPPE)
|
|
What protocol does L2TP use for computer and data authentication and encryption?
|
IPSec
|
|
Which VPN technologies require computer certificates?
|
L2TP and SSTP
|
|
What protocol does SSTP use for data authentication and encryption?
|
SSL
|
|
What advantage does SSTP have over other VPN technologies?
|
it can pass most NATs, firewalls, and proxies
|
|
What Event Log are VPN connection events added to?
|
the System log
|
|
What are the 3 default Windows Firewall profiles?
|
public, private, and domain
|
|
What are the 4 Windows Firewall rule types?
|
Program (allow/block connections based on executable), Port, Predefined (Windows component), and Custom
|
|
What happens to a link-local address after a machine obtains a routable address?
|
it is added as a secondary address
|
|
What is a zone ID?
|
an ID appended to a link-local address to identify the interface
|
|
What format does a zone ID take?
|
%<zoneID>
|
|
What IPv4 address are analagous to an IPv6 global address?
|
IPv4 public address
|
|
What IPv6 address is analagous to an IPv4 public address?
|
IPv6 global address
|
|
What IPv4 address is analgous to an IPv6 link-local address?
|
IPv4 APIPA address
|
|
What IPv6 address is analagous to an IPv4 APIPA address?
|
IPv6 link-local address
|
|
What IPv4 address is analagous to an IPv6 unique local address?
|
IPv4 private address
|
|
What IPv6 address is analogous to an IPv4 private address?
|
IPv6 unique local address
|
|
How do IPv6 hosts confirm tentative addresses?
|
by broadcasting a Neighbor Solicitation message
|
|
What is an IPv6 preferred address?
|
a valid IPv6 address within its valid lifetime
|
|
What is an IPv6 deprecated address?
|
a valid IPv6 address that has exceeded its lifetime
|
|
How is the IPv6 loopback address?
|
::1
|
|
What IPv6 protocol should generally be used for intranets?
|
ISATAP
|
|
What IPv6 protocol is generally used to communicate across the internet?
|
6to4
|
|
What IPv6 protocol should be used if an endpoint is protected by an IPv4 NAT?
|
Teredo
|
|
Which IPv6 transition protocol should only be used if others won't work?
|
Teredo
|
|
What are the 4 parts of a Teredo infrastructure?
|
Teredo client, Teredo server, Teredo relay and Teredo host-specific relay
|
|
What is a Teredo server?
|
a public server connected to both the IPv4 and IPv6 internets
|
|
What does a Teredo server do?
|
helps Teredo clients with address configuration and facilitates initial communication between clients
|
|
What is a Teredo relay?
|
an IPv4/v6 router that acts as a tunnel endpoint
|
|
What does a Teredo relay do?
|
forwards packets between the IPv4 and IPv6 internets
|
|
What is a Teredo host-specific relay?
|
a host enabled with IPv4 and IPv6 that acts as its own Teredo relay
|
|
How is Teredo host-specific relay functionality enabled in Vista and 2008?
|
it is automatically enabled if the host has a global address
|
|
What OS's can use Link Local Multicast Name Resolution (LLMNR)?
|
Vista/2008
|
|
What does Link Local Multicast Name Resolution (LLMNR) do?
|
uses multicasting to resolve IPv6 names on the local subnet
|
|
What network tool does Link Local Multicast Name Resolution require?
|
Network Discovery
|
|
Which is simpler to configure, LLMNR or NetBIOS?
|
LLMNR
|
|
What local name resolution protocol is IPv6-compatible?
|
Link-Local Multicast Name Resolution (LLMNR)
|
|
Which service is smaller, LLMNR or NetBIOS?
|
LLMNR
|
|
Which protocol can resolve hostnames for legacy hosts, LLMNR or NetBIOS?
|
NetBIOS
|
|
What protocol is used to map hostnames to IPv4 addresses?
|
NetBIOS
|
|
What order are name resolution protocols used in to resolve a name?
|
DNS, LLMNR, and then NetBIOS
|
|
How can you determine in ping if DNS was used to resolve an address?
|
it will have the domain name appended to the host name
|
|
How can you determine in ping if LLMNR was used to resolve an address?
|
it will display an IPv6 address
|
|
How can you determine in ping if NetBIOS was used to resolve a name?
|
it will display the host name but no domain name
|
|
What 3 methods does NetBIOS use for name resolution?
|
broadcasts, WINS, and Lmhosts file
|
|
What is WINS?
|
a server-based directory with NetBIOS name-to-IP mappings
|
|
What is the Lmhosts file?
|
a local file with NetBIOS-to-IP mappings
|
|
Where is the Lmhosts file located?
|
%SystemRoot% System32 Drivers Etc
|
|
How is the Lmhosts file created?
|
it must be manually created
|
|
What are the 4 NetBIOS node types?
|
broadcast (b-node), point-to-point (p-node), mixed (m-node), and hybrid (h-node)
|
|
How does the NetBIOS b-node work?
|
by using broadcasts on the local subnet
|
|
What limitation does NetBIOS b-node have?
|
it only works on the local subnet
|
|
How does the NetBIOS p-node work?
|
NetBIOS queries a WINS server
|
|
How does the NetBIOS m-node work?
|
uses broadcasts first, then queries WINS
|
|
How does the NetBIOS h-node work?
|
uses WINS queries first, then Lmhosts, then broadcasts
|
|
What NetBIOS mode do Windows clients use by default?
|
h-node
|
|
What does IPv6 use for DNS host records?
|
AAAA (quad-A) records
|
|
What 3 pieces of information are contained in DNS queries?
|
FQDN, resource record type (query type), and specified class
|
|
How is the Hosts file used?
|
the DNS Client service loads it into the cache when the service starts or the Hosts file is updated
|
|
Where is the root hints file stored?
|
WINDOWS System32 DNS Cache.dns
|
|
What is the default TTL for DNS records?
|
1 hour
|
|
What additional file is needed when installing DNS on Server Core without AD DS?
|
an unattended answer file
|
|
How can DNS servers in child domains be configured to resolve names for parent domains?
|
configure DNS servers to forward queries to DNS servers in the forest root domain
|
|
What is conditional forwarding?
|
forwarding queries for a particular domain to specific DNS servers
|
|
Why might you use conditional forwarding?
|
if 2 private networks merge, etc.
|
|
What DHCP scope sets a DNS server?
|
006: DNS Server
|
|
What are the 2 functions of a client's primary DNS suffix?
|
it allows hosts to register its host record in that DNS zone, and adds the suffix to DNS queries that don't have a suffix
|
|
When does a host automatically receive a primary DNS suffix?
|
when it is joined to a domain
|
|
What DHCP scope sets a connection-specific suffix?
|
015 DNS Domain Name
|
|
What does configuring a DNS suffix search list do?
|
allows users to search for host names in more than one DNS domain
|
|
What is the default search order in regards to DNS suffixes?
|
hostname.primary DNS suffix, hostname.connection-specific suffix, hostname.parent suffix
|
|
What requirement in regards to DNS suffixes exists for clients to perform dynamic DNS updates?
|
the client must have a primary or connection-specific DNS suffix that matches a primary zone of the preferred DNS server
|
|
What command will force a client to attempt dynamic DNS registration?
|
ipconfig /registerdns
|
|
What command will show the DNS client cache?
|
ipconfig /displaydns
|
|
What command will clear a client's DNS cache?
|
ipconfig /flushdns
|
|
What system was created to replace WINS?
|
GlobalNames Zone
|
|
What does GlobalNames do?
|
allows DNS to resolve single-label names
|
|
What command will show all the zones on a DNS server?
|
dnscmd /enumzones
|
|
What command-line command is used to add a zone to a DNS server?
|
dnscmd /zoneadd
|
|
What command-line command is used to display zone records?
|
dnscmd /ZonePrint
|
|
What command configures a DNS server to allow or disallow dynamic updates?
|
dnscmd /allowupdates
|
|
How is a DNS server configured to be caching-only?
|
do not configure any zones for it
|
|
How long does DNS store addresses in its cache?
|
24 hours
|
|
What is the DHCP scope for a DNS server?
|
006 DNS Server
|
|
What are the two functions of a client's primary DNS suffix?
|
allows the host to register in that DNS zone, and appends the suffix to queries where a suffix isn't listed
|
|
What is the DHCP scope for a DNS domain name?
|
015 DNS Domain Name
|
|
What does configuring a DNS suffix search list do?
|
allows clients to search for host names in multiple DNS namespaces
|
|
What is the default search order for hosts and DNS suffixes?
|
hostname.primary_dns_suffix, hostname.connection-specific_suffix, hostname.parent_suffix
|
|
Why is it important that a host's primary DNS suffix match the name of a primary zone hosted by its preferred DNS server?
|
it is necessary so the host can register its address in the database
|
|
What command will force a client to attempt to register its DNS address?
|
ipconfig /registerdns
|
|
What command is used to enable GlobalNames support on a DNS server?
|
dnscmd /config /enableglobalnamesupport 1
|
|
What types of DNS zones can be stored in Active Directory?
|
primary and stub zones
|
|
What is the default name for locally-stored primary DNS zone files?
|
<zone_name>.dns
|
|
Where are locally-stored primary DNS zone files stored by default?
|
%systemroot%system32DNS
|
|
What type of zones can secondary DNS servers get data from?
|
primary or secondary servers
|
|
What is the source of DNS data for a secondary DNS server called?
|
the master
|
|
In a delegated DNS environment, what are stub zones often used for?
|
helping a parent zone keep an updated list of name servers for child zones
|
|
What records will DNS clients with static addresses attempt to update?
|
both host and pointer records
|
|
What records will DNS clients with dynamic addresses attempt to update?
|
host records only (DHCP server updates pointers)
|
|
What restrictions does enabling secure updates on DNS create?
|
only AD domain members may update records, and only from the computer that originated the registration
|
|
What is a secondary server refresh interval?
|
the amount of time a secondary server waits before querying the master server for an update
|
|
What is the default secondary server refresh interval?
|
15 minutes
|
|
What is the secondary server retry interval?
|
how long a secondary server waits before retrying a failed transfer
|
|
What is the default secondary server retry interval?
|
10 minutes
|
|
What is the Expires After value for a secondary DNS server?
|
how long a secondary server will continue to answer queries without contact with a master
|
|
What is the default Expires After value for a secondary DNS server?
|
1 day
|
|
In DNS, what does the Minimum (Default) TTL value do?
|
sets the default TTL for all records
|
|
What is the length of the Minimum (Default) TTL?
|
1 hour
|
|
What DNS servers make use of the Minimum (Default) TTL value?
|
only secondary servers--primary servers automatically know when the value changes
|
|
How does DNS handle multiple MX records?
|
records with the lower preference are tried first
|
|
What is the no-refresh DNS interval?
|
the period following a timestamp when a zone or server will refuse a timestamp refresh
|
|
What is the refresh DNS interval?
|
the period following the no-refresh interval when timestamp refreshes are accepted and the record will not be scavenged
|
|
What are the default refresh and no-refresh intervals?
|
7 days
|
|
What are the 3 steps in creating the GlobalNames zone?
|
enable GlobalNames zone support, create the GlobalNames zone, and populate the zone
|
|
What command is used to enable GlobalNames zone support?
|
dnscmd /config /enableglobalnamessupport 1
|
|
How should the GlobalNames zone be configured?
|
as a FLZ called GlobalNames replicated to the forest
|
|
What is zone replication?
|
the synchronization of data for AD-integrated DNS zones
|
|
What are zone transfers?
|
the synchronization of data between master and secondary DNS servers
|
|
What partition should DNS data be stored in to replicate it to Windows 2000 DNS servers?
|
domain partition (replicated to all DC's)
|
|
What permissions are required to create an application directory partition?
|
Enterprise Administrator
|
|
What does the Reload option for secondary DNS zones do?
|
reloads the zone from local storage
|
|
What does the Transfer from Master option for secondary DNS zones do?
|
initiates a zone transfer if the SOA has expired
|
|
What does the Reload From Master option for secondary DNS zones do?
|
initiates a zone transfer regardless of the status of the SOA
|
|
What are the two methods of updating routing tables?
|
dynamic and static routing
|
|
What are the 3 ways to use routing to send data over a network?
|
unicasting, multicasting, and broadcasting
|
|
What sort of address is used for multicasting?
|
a Class D address
|
|
What is the address range of a Class D address?
|
224-239
|
|
What is demand-dial routing?
|
routing along non-permanent routes (ISDN, PPP, etc.)
|
|
What are the 2 states of a demand-dial interface?
|
connected and disconnected
|
|
What are the 2 types of connections that can be made on a demand-dial interface?
|
on-demand connections and persistent connections
|
|
What is a connection establishment delay?
|
the length of time it takes to set up a demand-dial connection
|
|
What sort of routing do on-demand connections use?
|
static routing
|
|
What sort of routing do persistent connections use?
|
dynamic routing
|
|
What requirement does dynamic routing have that static routing does not?
|
all routers have to use the same routing protocol
|
|
What are the 2 most common routing protocols?
|
RIP and OSPF
|
|
What are the 2 components of a dynamic routing protocol?
|
the routing protocol and the routing algorithm
|
|
What are the 2 most common types of routing protocols?
|
distance vector and link state
|
|
What type of routing algorithm is RIP?
|
distance vector
|
|
What type of routing algorithm is OSPF?
|
link state
|
|
What does RIP use to determine a route?
|
hop count
|
|
How many hops will RIP support?
|
up to 15 hops
|
|
What type of routing protocols should be used if using CIDR?
|
distance vector routing protocols
|
|
What type of routing protocols should be used if using multicasting to update routing tables?
|
distance vector routing protocols
|
|
What type of routing protocols should be used if simple password authentication is being used between routers?
|
distance vector routing protocols
|
|
How does an OSPF router advertise its presence?
|
it sends hello packets to neighbors on power up
|
|
What type of routing protocol provides faster convergence?
|
link state routing protocols
|
|
What does OSPF advertise instead of advertising all routes?
|
changes
|
|
What type of routing protocol should be used if route changes are frequent?
|
link state routing protocols
|
|
What type of routing protocol should be used if the network includes redundant paths?
|
link state routing protocols
|
|
What type of routing protocol should be used if there are more than 50 subnets in the internetwork?
|
link state routing protocols
|
|
What type of routing protocol should be used if you want to assign specific costs to routes?
|
link state routing protocols
|
|
When should RIPv2 broadcasts be used as the RIP outgoing protocol?
|
if there are RIPv1 routers on the network
|
|
When should RIPv2 multicasts be used as the RIP outgoing protocol?
|
when there are only RIPv2 routers or it is a demand-dial interface
|
|
When should RIP v1 and v2 be used as the RIP incoming protocol?
|
when there are both RIP v1 and v2 routers on the network
|
|
When should RIP v2 only be used as the RIP incoming protocol?
|
if there are only v2 routers or it is a demand-dial interface
|
|
How is the default route designated in a routing table?
|
0.0.0.0
|
|
What subnet mask do host routes in a routing table have?
|
255.255.255.255
|
|
What subnet mask do host routes in a routing table have?
|
0.0.0.0
|
|
In a routing table, what does a gateway entry represent?
|
the IP address of the next router in a route
|
|
In a routing table, what does a metric represent?
|
the relative cost of a route
|
|
In a routing table, which is better, a high metric or a low metric?
|
low metric
|
|
What are the two types of routes in a routing table?
|
temporary and persistent
|
|
What command will display the routing table?
|
route print
|
|
What command is used to add a route to a routing table?
|
route add
|
|
What command is used to delete a route from a routing table?
|
route delete
|
|
What command is used to modify a route in a routing table?
|
route change
|
|
What command is used to add a persistent route to a routing table?
|
route -p add
|
|
What command is used to display the IPv6 routing table?
|
route print -6
|
|
How do IPv6 routers advertise their presence and autoconfiguration information to other subnet hosts?
|
by sending Router Advertisement messages
|
|
What OSI layer does IPSec operate at?
|
the Network layer
|
|
How many IPSec policies can be configured on a computer?
|
only one--but the policy can have multiple rules
|
|
What are the two IPSec modes (not security association modes)?
|
main mode and quick mode
|
|
What are the 3 main mode authentication methods for IPSec filter rules?
|
preshared keys, digital certificates, and Kerberos v5
|
|
Where are preshared IPSec keys stored?
|
in the registry
|
|
What limitation exists for using Kerberos v5 as the IPSec authentication method?
|
the endpoints must be in the same forest
|
|
What IPSec encryption algorithm has been updated for Server 2008?
|
AES
|
|
What key exchange protocol does Server 2008 use for IPSec?
|
2048-bit Diffie-Hillmen
|
|
What are the two IPSec security association modes?
|
transport mode and tunnel mode
|
|
Which IPSec security association mode requires more configuration?
|
tunnel mode
|
|
Which IPSec security association mode is more commonly used?
|
transport mode
|
|
What does IPSec Transport Mode do?
|
encrypts UDP/TCP header and payload, but leaves IP header unencrypted
|
|
How does IPSec tunnel mode differ from transport mode?
|
tunnel mode encrypts the entire packet as the payload for another packet
|
|
What two protocols does IPSec use to create and manage keys?
|
Internet Security Association Key Management Protocol (ISAKMP) and Internet Key Exchange (IKE)
|
|
What 2 protocols does IPSec use to to provide data and identity protection for packets?
|
Authentication Header (AH) and Encapsulating Security Payload (ESP)
|
|
Which provides better performance, Authentication Header or Encapsulating Security Payload?
|
Authentication Header
|
|
What protocol is required for IPSec to tunnel through a NAT?
|
Encapsulating Security Payload
|
|
What are the 2 main methods of configuring IPSec?
|
through Group Policy or with Windows Firewall with Advanced Security
|
|
What are the 5 main components of IPSec rules?
|
filter list, filter action, authentication method, tunnel endpoint, and connection type
|
|
What are the 3 options for an IPSec filter action?
|
permit, block, or secure
|
|
What is the default rule in IPSec?
|
a rule used in XP/2003 whenever a computer requests secure communications and doesn't fall under an existing rule
|
|
What OS's can use the IPSec default rule?
|
Windows XP and Server 2003
|
|
What are the 3 pre-generated IPSec policies?
|
Client (Respond Only), Server (Request Security), and Secure Server (Require Security)
|
|
Why should you create new IPSec policies rather than modify the pre-generated ones?
|
the pre-generated policies will be replaced whenever you update the OS
|
|
What are the two IPSec-related netsh contexts?
|
netsh ipsec (for XP/2003) and netsh advfirewall (2008)
|
|
How can IPSec be used to isolate servers and domains?
|
require security on inbound traffic and request security on outbound traffic
|
|
What is the address range for a Class A address?
|
0.0.0.0-127.255.255.254
|
|
What is the address range for a Class B address?
|
128.0.0.1-191.255.255.254
|
|
What is the address range for a Class C address?
|
192.0.0.1-223.255.255.254
|
|
What is a link-local address?
|
an IPv6 address assigned when a DHCP server can't be reached
|
|
What is a local unicast address?
|
a non-routable private address space (similar to 192.168 address space)
|
|
What is a global unicast address?
|
a routable IPv6 address
|
|
What is an anycast address?
|
an IPv6 address assigned to multiple interfaces
|
|
What is the Class A private address range?
|
10.x.x.x
|
|
What is the Class B private address range?
|
172.16.x.x--172.31.x.x
|
|
What is the Class C private address range?
|
192.168.x.x
|
|
What is the APIPA address range?
|
169.254.x.x
|
|
What is a subnet identifier?
|
the bits borrowed from a host ID to create a subnet
|
|
What is the formula to determine the number of subnets enabled by a given subnet mask?
|
2^n, where n=number of subnet identifier bits
|
|
What is the formula to determine a subnet's host capacity?
|
2^n-2, where n=number of bits in the host ID
|
|
What is supernetting?
|
combining adjacent networks of the same class into blocks
|
|
What is another name for a supernet?
|
classless network
|
|
What organization is responsible for distributing IP address ranges?
|
the Internet Assigned Numbers Authority (IANA)
|
|
What disadvantage does supernetting create?
|
routers have to store an entry for each network in a supernet
|
|
What technology was created to deal with the drawbacks of supernetting?
|
Classless Interdomain Routing (CIDR)
|
|
What is an alternate configuration?
|
a private IP address configured for use if a DHCP server is unavailable
|
|
What two sorts of IP addresses can DHCP assign?
|
static and dynamic
|
|
What two methods can be used to allow a DHCP server to provide addresses to hosts on a remote segment?
|
connect the segments with a BOOTP-compliant router or add a DHCP relay agent on the remote segment
|
|
What sort of device usually acts as a DHCP relay agent?
|
a router
|
|
What is a reservation?
|
an IP address held for a particular DHCP client
|
|
How is the client a DHCP reservation is held for identified?
|
by MAC address
|
|
What two sorts of classes can be defined for DHCP in Server 2008?
|
vendor classes and user classes
|
|
What is a vendor class used for?
|
managing DHCP options based on vendor type
|
|
What is a DHCP user class used for?
|
managing DHCP options based on common needs
|
|
What is the hard drive footprint of Server 2008 Core?
|
3 Gb
|
|
What does ocsetup do?
|
adds roles on Server 2008 Core
|
|
What command is used to install roles on Server 2008 Core?
|
ocsetup
|
|
What does oclist do?
|
lists roles installed on Server 2008 Core
|
|
What command is used to view roles installed on Server 2008 Core?
|
oclist
|
|
What does netsh do?
|
allows you to view and modify network configurations on both local and remote computers
|
|
What are the six main netsh DHCP contexts?
|
DHCP, DHCP server, DHCP v4, DHCP v6, DHCP server scope, and DHCP server mscope
|
|
What are the 7 layers of the OSI model?
|
Application, Presentation, Session, Transport, Network, Data Link, and Physical
|
|
What are the 4 layers of the TCP/IP model?
|
Application, Transport, Internet, and Network Interface
|
|
What OSI layer(s) does the TCP/IP Application layer map to?
|
Application, Presentation, and Session
|
|
What OSI layer(s) does the TCP/IP Transport layer map to?
|
Transport
|
|
What OSI layer(s) does the TCP/IP Internet layer map to?
|
Network
|
|
What OSI layer(s) does the TCP/IP Network Interface layer map to?
|
Data Link and Physical
|
|
What sort of things does the Data Link layer describe standards for?
|
network adapters, hardware addresses, cabling, hubs, switches
|
|
What network layer do hubs and switches reside on?
|
the Data Link/Network Interface level
|
|
What is the purpose of the Data Link layer?
|
to deliver messages from one device to the next
|
|
What is the lowest layer of the OSI model that is routable?
|
the Network/Internet layer
|
|
What are two common Data Link Layer protocols?
|
ethernet and token ring
|
|
What is the primary Network layer protocol?
|
IP
|
|
What is the primary device that resides at the Network OSI layer?
|
router
|
|
What are two common Transport layer protocols?
|
TCP and UDP
|
|
What does TCP do with a data stream from a higher-layer protocol?
|
breaks it into bytes
|
|
How does TCP determine what application to send data packets to?
|
port numbers
|
|
What does Vista and Server 2008's dual-layer architecture do?
|
allows them to communicate with both IPv4 and IPv6 clients
|
|
What is Teredo?
|
an IPv6 technology that uses tunneling to allow IPv4 and IPv6 hosts to communicate with IPv6 hosts on the internet
|
|
What special quality does Teredo have?
|
it can pass through IPv4 NAT's
|
|
What is 6to4?
|
an IPv6 over IPv4 tunneling protocol
|
|
What requirement does 6to4 have?
|
the endpoint routers must have public IPv4 addresses
|
|
What does ISATAP stand for?
|
Intra-Site Automatic Tunneling Addressing Protocol
|
|
What does ISATAP do?
|
provides IPv6 connectivity between IPv6 and IPv4 hosts over an IPv4 intranet; dual-layer nodes can use ISATAP to discover IPv6 routers
|
|
What IPv6 transition protocol will work through IPv4 NAT's?
|
Teredo
|
|
What IPv6 transition protocol requires the endpoint routers to have public IPv4 addresses?
|
6to4
|
|
What IPV6 transition protocol is best for use on an IPv4 intranet?
|
ISATAP
|
|
How is an IPv6 address divided between network and host?
|
the first 64 bits represent the network ID and the last 64 bits represent the network interface
|
|
How is each section of an IPv6 address represented?
|
with 4 hexidecimal characters
|
|
What is the main network configuration tool in Server 2008?
|
Network and Sharing Center
|
|
What OS's can use the Network Location parameter?
|
Vista and Server 2008
|
|
What are the 3 possible settings for Network Location?
|
Public, Private, and Domain
|
|
What Network Location are clients assigned to by default?
|
Public
|
|
What settings does the Public location in Network Location configure?
|
Windows Firewall on, Network Discovery off, file and printer sharing off, Network Map off
|
|
What settings does the Private location in Network Location configure?
|
Windows Firewall on, Network Discovery on, Network Map on, file and printer sharing off (but can be enabled on a per-host basis)
|
|
What changes does the Domain location in Network Location make?
|
allows settings for Windows Firewall, Network Discovery, and Network Map to be configured via Group Policy
|
|
What does Network Map do?
|
allows you to see devices on the local network and how they connect to each other and the internet
|
|
What two components does Network Map rely on?
|
Link Layer Topology Discovery (LLTD) Mapper and LLTD Responder
|
|
What does the Link Layer Topology Discovery (LLTD) Mapper do?
|
queries the network for devices to include in the Network Map
|
|
What does the LLTD Responder do?
|
responds to queries from the Mapper I/O
|
|
How can XP systems be included in Network Map?
|
install the LLTD Responder
|
|
What abilities are granted by enabling the File Sharing feature?
|
standard users can share documents from their profiles and administrators can share any file
|
|
What protocol is required and automatically enabled for File Sharing?
|
ICMP
|
|
What folder is automatically shared when Public Folder Sharing is enabled?
|
%systemroot%UsersPublic
|
|
What file-sharing feature is only available to non-Domain computers?
|
Password Protected Sharing
|
|
How can you control the order in which a computer will test network adapters for communication?
|
adjust the order of the adapters in Advanced Settings
|
|
What does bridging network connections do?
|
connects two network segments attached to a computer to act as a single segment
|
|
What does tracert do?
|
reports each hop and how long it took
|
|
What does pathping do?
|
sends packets over time and reports on the percentage successful for each router along the path
|
|
What does the Address Resolution Protocol (ARP) do?
|
translates IPv4 addresses into MAC addresses
|
|
What protocol replaces ARP in IPv6?
|
Neighbor Discovery (ND)
|
|
What is a Variable Length Subnet Mask (VLSM)?
|
a concept that allows you to use multiple subnet masks on the same network
|
|
What is the last character of a VLSM subnet mask?
|
always 0
|