Chapter 6 Configuring Networking

11 September 2022
4.7 (114 reviews)
31 test answers

Unlock all answers in this set

Unlock answers (27)
question
Which of the following are true regarding IPv4? a. 32-bit address b. 128-bit address c. Consists of a network ID and MAC address d. Consists of a host ID and MAC address
answer
a. 32-bit address
question
How many bits does a standard IPv6 unicast address use to represent the network ID? a. 32 b. 64 c. 128 d. 10
answer
b. 64
question
Which of the following Windows PowerShell commands performs a DNS name query for www.contoso.com? a. ping www.contoso.com b. dnsquery www.contoso.com c. resolve-DNSName -Name www.contoso.com d. resolve-DNSquery www.comcast.net
answer
c. resolve-DNSName -Name www.contoso.com
question
Which of the following commands is used to test network connectivity between two hosts? a. ipconfig b. ping c. nslookup d. netstat
answer
b. ping
question
802.11b uses a frequency of _______. a. 2.4 GHz b. 3.7 GHz c. 5 GHz d. 8 GHz
answer
a. 2.4 GHz
question
Which of the following forms of wireless security is easily cracked? a. WEP b. WPA c. WPA2 d. IPsec
answer
a. WEP
question
_______ provides an authentication framework for wireless LANs. a. WEP b. WPA c. 802.1n d. 802.1X
answer
d. 802.1X
question
Which of the following modes should be used when connecting to a wireless access point that requires a pre-shared encryption key? a. Personal mode b. Enterprise mode c. Share mode d. Password mode
answer
a. Personal mode
question
Which of the following rules specifies how and when authentication occurs? a. Public rule b. Inbound rule c. Connection security rule d. Outbound rule
answer
c. Connection security rule
question
Which of the following is true regarding WFAS rules? (Choose all that apply.) a. Outbound traffic is allowed by default. b. Unsolicited inbound traffic is not allowed. c. Solicited inbound traffic is allowed. d. Connection security rules require inbound/outbound rules to allow connections.
answer
a. Outbound traffic is allowed by default. c. Solicited inbound traffic is allowed. d. Connection security rules require inbound/outbound rules to allow connections.
question
Which of the following Windows Firewall profiles should a user configure if she is at the airport? a. Domain b. Private c. Public d. Protected
answer
Which of the following Windows Firewall profiles should a user configure if she is at the airport? a. Domain b. Private c. Public d. Protected
question
If a user wants to use VPN Reconnect, which of the following VPN protocols should be used? a. PPTP b. L2TP c. IKEv2 d. SSTP
answer
c. IKEv2
question
An administrator wants to change a server running Windows Server 2016 into a VPN server. However, the networking team allows only HTTPS through the firewall. Which of the following VPN protocols should be used? a. PPTP b. L2TP c. IKEv2 d. SSTP
answer
d. SSTP
question
Which of the following methods is the easiest way to set up a VPN client on a computer for a user who is not technical? a. Use PAP. b. Type up step-by-step instructions with screenshots to give to the user. c. Use a group policy to configure the settings. d. Use CMAK to create an executable to install.
answer
d. Use CMAK to create an executable to install.
question
With DirectAccess, which table is used to determine the behavior of the DNS clients when determining the address of internal resources? a. NAP b. NPS c. NRTP d. NCA
answer
c. NRTP
question
Which of the following TCP/IP settings should be configured to specify DNS suffixes to use other than resolving names through a parent domain? a. DNS suffix for this connection b. Append these DNS suffixes (in order) c. Append primary and connection-specific DNS suffixes d. DNS server address, in order of use
answer
b. Append these DNS suffixes (in order)
question
When communicating with a server on another subnet, which of the following settings is used to determine which direction it needs to go to get to its final destination? a. Subnet mask b. Default gateway c. DNS d. IP address
answer
b. Default gateway
question
A user has a personal computer that she uses at her workplace. Which of the following network locations should she use? a. Home b. Work c. Public d. Domain
answer
b. Work
question
When connecting a Windows 10 computer to a wireless AP, which of the following Wi-Fi encryption protocols provides the highest level of security? a. WPA b. WEP c. WPA v2 d. IPsec
answer
c. WPA v2
question
A user is at work with a laptop that is running Windows 10. He brings up the list of available wireless networks, but the corporate network is not available. What should he do? a. Provide the SSID and security key. b. Turn on the wireless adapter. c. Turn off airplane mode. d. Turn on Network Discoverability.
answer
a. Provide the SSID and security key.
question
Which of the following is the primary objective of a firewall? To permit traffic in and out for legitimate users, and to block the rest To authenticate and authorize users past the network perimeter To compare traffic information against a list of known valid traffic To protect a network by allowing certain types of network traffic in and out of the system
answer
To permit traffic in and out for legitimate users, and to block the rest
question
When creating a firewall exception, what is the difference between opening a port and allowing an application? Opening a port is permanent, and thus is less risky than allowing an application. Allowing an application opens the specified port only while the program is running, and thus is less risky. Both options are available in the Windows Firewall with Advanced Security console. There is no functional difference between opening a port and allowing an application.
answer
Allowing an application opens the specified port only while the program is running, and thus is less risky.
question
A company has a main office and 12 branch offices. The users and computers are within a single domain. All servers are Windows Server 2016. The administrator must make sure that all data is encrypted by using end-to-end encryption. In addition, instead of using user names and passwords, he needs to use computer-level authentication. What should he do? a. Configure a PPTP connection and MS-CHAPv2. b. Configure L2TP with IPsec and EAP-TSL authentication. c. Configure L2TP with IPsec and MS-CHAPv2. d. Configure SSTP with IPsec and PAP.
answer
b. Configure L2TP with IPsec and EAP-TSL authentication.
question
AAAA record
answer
4. An IPv6 address (host name) mapping to its IP address
question
DNS server
answer
Used to associate a computer name to an IP address; stores host-to-IP address mappings in a zone file
question
LLMNR
answer
A fallback name resolution technique when DNS and WINS are not available
question
Subnet mask
answer
Used to determine the bits associated with the network ID and host ID
question
ANDing
answer
The process a computer uses to determine whether another computer is on the same network
question
Stateful
answer
One of the ways you can configure a DHCP IPv6 server; provides IP address configuration to DHCP clients
question
Identify the Wi-Fi Technology standard (802.11a, 802.11b, 802.11g, 802.11i, 802.11n, and 802.1x).
answer
802.11a Supports bandwidth up to 54 Mbps by using 5 Ghz 802.11b Supports bandwidth up to 54 Mbps by using 2.5 GHz 802.1X Uses RADIUS authentication 802.11n Can use 2.5- and 5-GHz frequencies and support up to 300 Mbps 802.11i Uses encryption for wireless protocols
question
Specify the correct order of the steps that must be completed to create an outbound rule that blocks a program. _____ Browse to the program's install location, select the program's executable, and then click Open. _____ Open the Windows Firewall with Advanced Security console. _____ Select the program to block and then click Next. _____ Right-click Outbound Rules and then choose New Rules. _____ Select Block the connection. _____ Type a name and description for the rule and then click Finish. _____ Select Domain, Private, and/or Public profile.
answer
1_____ Open the Windows Firewall with Advanced Security console. 2_____ Right-click Outbound Rules and then choose New Rules. 3_____ Select the program to block and then click Next. 4_____ Browse to the program's install location, select the program's executable, and then click Open. 5_____ Select Block the connection. 6_____ Select Domain, Private, and/or Public profile. 7_____ Type a name and description for the rule and then click Finish.