Client Operating System Ch 9, 10, 11, 13

11 September 2022
4.7 (114 reviews)
47 test answers

Unlock all answers in this set

Unlock answers (43)
question
Most cabled networks today use what type of cabling?
answer
Unshielded Twisted Pair
question
Which of the following is a characteristic of a packet-switching network?
answer
Individual packets are all routed along the same path from source to destination
question
The process of applying a header and footer to a data packet is known as what?
answer
Encapsulation
question
What protocol do most devices currently use at the network layer?
answer
TCP/IP
question
What feature of windows 8.1 allows a computer to function as a router, providing Internet access to other computers in the same location?
answer
Internet Connection Sharing
question
What protocol is responsible for the end-to-end transmission of a packet, to its final destination on a network?
answer
IP
question
IPv4 addresses are how long?
answer
32 bits
question
What governing organization defines networking protocols such as TCP/IP?
answer
Internet Engineering Task Force
question
What is the correct binary representation of the IP address 192.168.10.2
answer
11000000.10100000.00001010.00000010
question
Which IPv4 IP class provides for 126 unique networks, each having up to 16,777,214 hosts?
answer
Class A
question
What does the IP address of 10.240.0.0 with a subnet mask of 255.255.255.0 represent?
answer
A network address
question
Which of the following does not represent valid IPv6 addresses?
answer
FDC0:X:X:02BD:FF:BECB:FEF4:961D
question
Firewalls typically base their filtering on the TCP/IP characteristics at the network, transport, and application layers using what information?
answer
IP addresses, Ports, Protocol Numbers
question
Which troubleshooting utility allows you to generate DNS request messages and transmit them to specific DNS servers on the network?
answer
nslookup
question
What type of attack is occurring when attackers are replaying data packets on a wireless network?
answer
Data tampering
question
A 2x2 MIMO device has how many total transceivers?
answer
Four
question
The original WPA implementation utilized what encryption method?
answer
TKIP
question
802.11n wireless networking equipment uses two, three, or more different frequencies for transmission and the subsequent receiving of traffic. The sending system splits its data into multiple signals for transmission, and the receiving device reassembles the signals into a single data stream. What is the name of this process?
answer
Spatial multiplexing
question
The 802.11n wireless networking protocol specifies what approximate values for indoor and outdoor range?
answer
70 meters, 250 meters
question
Why should you NOT deploy a wireless network using WEP for security?
answer
WEP is insecure due to very weak cryptographic protocols.
question
What command can you issue from the command line to view all configured wireless networks on your windows 8.1 computer?
answer
netsh wlan show profiles
question
Within the windows UI, what option will you need to select to delete a wireless network profile?
answer
Forget this network
question
Location-aware printing utilizes what two services to determine network information and the current location of the windows 8.1 computer?
answer
Network Location Awareness service, Network List Service
question
What type of attack is occurring when attackers gain access to otherwise restricted network resources, using a wireless network?
answer
Masquerading
question
What term is given to software that includes viruses, Trojan horses, worms, spyware, and adware?
answer
Malware
question
In most cases, how is malware introduced into a computer system?
answer
Through a deliberate act of the computer's user.
question
Which of the following items is NOT found in the Security section of the windows 8.1 Action Center?
answer
Automatic Maintenance
question
The Windows Firewall in windows 8.1 can have rules configured that allows traffic to flow in which direction(s)?
answer
Both Inbound and Outbound
question
Which of the following is NOT an item that can be used when building Windows Firewall rules?
answer
Packet sequence numbers
question
When using the Windows Firewall with Advanced Security console, you will see three distinct network locations that impact the behavior of the Windows Firewall. Which of the following is NOT one of these network locations used by the Windows Firewall?
answer
Default
question
A windows Firewall policy file has what file extension?
answer
.wfw
question
When do data protection technologies such as the windows 8.1 encrypting file system (EFS) and BitLocker protect data?
answer
Only when the data is stored on a disk
question
A 2x2 MIMO device has how many total transceivers?
answer
Four
question
Windows 8.1 provides three basic methods for sharing the files and folders on the computer. WHich of the listed items is not one of these methods?
answer
All folder sharing
question
Which of the following statements is true of Public folder sharing?
answer
Places all shared files in a single location
question
For users at home, which file sharing is most likely the simplest to set up and use?
answer
Homegroup sharing
question
How do you start the process to modify the default homegroup sharing configuration?
answer
Select one of your shared libraries in File Explorer and click Share in the toolbar.
question
If you plan to activate Public folder sharing in Windows 8.1, what must be done before you can select the Turn on sharing so anyone with network access can read and write files in the Public folders option on the Advanced sharing settings control panel?
answer
Enable Network Discovery
question
It is possible to create a share that is invisible to users browsing the network simply by appending what character to the end of the share name?
answer
$
question
Which of the following statements are true concerning share permissions?
answer
For drives formatted with the FAT/FAT32 file system, share permissions are the only option available; AND they determine the type of access that others will have to the folder when they connect it over the network.
question
What is the net effect of the following combination of share and NTFS permissions when the share is accessed over the network? -Share permission - Sales group: Full Control -NTFS permission - Sales group: Read & Execute, Modify, Write
answer
Members of the sales group will be able to edit content and delete files.
question
Which of the following printer-related terms refers to the actual physical hardware that prints data?
answer
Print device
question
When you connect a print device directly to a windows 8.1 computer, what components of the printing architecture are provided by the computer?
answer
Printer, Print server, Printer driver
question
To share a printer on a windows 8.1 computer, you must enable the appropriate settings in the network and sharing center, just as you have to do to share files and folders. To share printers, which sharing and discovery settings must be turned on?
answer
Network Discovery, File and Printer Sharing
question
By default, which accounts are assigned the Print permission?
answer
Every account assigned to the Everyone special identity
question
What is the first step that you must perform if you wish to give certain users in your organization priority access to a print device so that when a print device is busy, their jobs are processed before those of other users?
answer
Create multiple printers
question
What is the first step to create a printer pool?
answer
Install multiple identical print devices.