• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/39

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

39 Cards in this Set

  • Front
  • Back

Windows 7 will attempt to automatically configure a network interface during the initial setup process.

True

Internet Protocol version 6 (IPV6) is a 32 bit address space and is backwards compatible with IPV4 addresses.

False

You must first install the Link Layer Topology Discovery Responder (LLTDR), in Windows XP, in order for the computer to participate in network discovery.

True

In a home network, File sharing and network discovery are on by default.

True

For a computer to be discovered using Windows Network Discovery, it must have the LLTDR enabled, so that it can respond to queries from the LLTDIO

True

IPCONFIG /RELEASE will cause the computer to renew its IP address lease from the local DHCP server.

False

NTFS permissions (ACLs) are stored in a central database on the local computer.

False

When moving a file, between two separate NTFS volumes, the file will retain its permissions from the source folder.

False

An ACE consists of the users token and the associated permission in the ACL

True

Every file and folder, on an NTFS formated disk, has an Owner.

True

"Deny" will ALWAYS override an "Allow".

False

In order to share a printer, using windows print sharing, the computer must have a password protected local account.

True

InPrivate Browsing allows a user to selectively allow or disallow a website from creating cookies.

False

The "Local Intranet" security zone does not force Internet explorer to run websites in protected mode.

True

Internet Explore runs in Protected mode by default. This causes Internet Explorer to run with a Mandatory Integrity Mode of Medium.

False

There are no physical system requirements to run Windows XP mode, as it is a virtualized operating system.

False

A roll-up is a cumulative update, that contains two or more previous updates for the same operating system element.

True

Windows classifies Important updates as mandatory and enables them for download and installation by default

True

Windows Server Update Services is bandwidth intensive and may cause noticeable network congestion while serving updates to update clients.

False

The System log records installation as well as setup history.

False

The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to their underlying internal structure and technology. It accomplishes this goal through the process of ________________.

Encapsulation

Internet Protocol is the primary ____________ protocol used on most networks. It is responsible for transmitting data outside of the local network.

End-to-end

Network and print sharing is turned on, but you can not join a Homegroup. You network location is classified as:

Work

Lundbar wants to ping slow connection (approx. 6500ms delay in letentcy) recursively until his batch job finished. Which command will accomplish the desired result?

> ping -t -w 10000 172.16.51.8

An Access Control List (ACL) is comprised of:

Access Control Entries (ACEs)

Standard permissions are comprised of combinations of special permissions. There are a total of _____________ special permissions:

14

Which of the following tools can be found in the add-on manager in Internet Explorer? (choose all that apply)

Accelerators


InPrivate Filtering


Search Providers



To configure a client to pull updates from a WSUS server, you must first:

Enable and define a WSUS server using group policy.

Which of the following is a Default Event viewer log?

Application

Which of the following is a Windows update that addresses a potential vulnerability in Windows?

Security Update

Bubbles wants to allow a user to be able toread, modify and delete a file, but not take ownership. Which standard permission would he use?

Modify

Performance Monitor displays real time statistics of operating system elements. Using ______________, we can capture the statistics for review.

Data Collector Sets

What is the primary protocol used by Windows to communicate over a network?

TCP/IP

These two things are required for intra-network communication.

Subnet Mask


Internet Protocol (IP) Address

__________ is the command used to configure the basic IP parameters for a network connection.

NETSH

You cannot connect to the Internet. You run an IPCONFIG command and and it shows your network adapters IP address as 169.254.128.3 with a subnet mask of: 255.255.0.0. What is the issue? (2 points)

When a DHCP server fails, APIPA allocates IP addresses in the private range 169.254.0.1 to 169.254.255.254. Clients verify their address is unique on the network using ARP When the DHCP server is again able to service requests, clients update their addresses automatically

When applying permissions, there are two "philosophies" to approaching the problem: the additive and subtractive approach. Describe the two principles. (4 points) Which is optimal, and why? (2 points)

Additive approach is when you have no permissions and then you add the permissions you want them to have. The Subtractive approach is when you start off with all the permissions then you subtract permissions you don't what them to have. I like the additive approach so if you make a mistake on not giving someone a permission you will soon hear about it from the user. If you make a mistake and add permissions to someone who shouldn't have it you may never know about the mistake.When you take it away after the user has already had the permissions, they will be pissed.

What three elements make up a "token" that is used for authorization against and Access Control List?

identification


authorization


authentication

Organize the Application Restriction rules, in order of precedence

1. Hash


2. Cert


3. Path


4. Zone


5. Default