Windows 10 - Quiz 6

10 September 2022
4.7 (114 reviews)
38 test answers

Unlock all answers in this set

Unlock answers (34)
question
b. 32 bits
answer
How many bits in length is an IPv4 address? a. 16 bits b. 32 bits c. 64 bits d. 128 bits
question
d. 11000000.10100000.00000000.00000010
answer
Which of the following is the correct binary representation of the IP address 192.168.0.2? a. 11110000.10111000.00000000.00000010 b. 10100000.10010000.00000000.00000010 c. 11100000.10110000.00000000.00000010 d. 11000000.10100000.00000000.00000010
question
a. Class A
answer
Which IPv4 IP class provides for 126 unique networks, each having up to 16,777,214 hosts? a. Class A b. Class B c. Class C d. Class D
question
b. A network address
answer
The IP address of 10.240.0.0 with a subnet mask of 255.255.255.0 represents which of the following? a. A loopback address b. A network address c. A broadcast address d. A multicast address
question
b. Address Resolution Protocol
answer
The Windows operating system supports three name-resolution systems. Which of the following is not a name-resolution system? a. Domain Name System b. Address Resolution Protocol c. Windows Internet Name Service d. Link Local Multicast Name Resolution
question
b. microsoft.com
answer
Which of the following would be considered a second-level domain? a. .com b. microsoft.com c. data.contoso.com d. east.microsoft.com
question
b. NS d. MX
answer
Which of the following DNS resource record types depend on the existence of a host A record in order to provide their intended function? (Choose all that apply) a. AAAA b. NS c. PTR d. MX
question
a. An iterative query is a call to a name server to reply with the requested data or tell it who else to talk to in order to find an answer to its request d. A recursive query places the entire responsibility for answering the query on the name server itself
answer
Regarding iterative and recursive DNS queries, which of the following statements are correct? (Choose all that apply) a. An iterative query is a call to a name server to reply with the requested data or tell it who else to talk to in order to find an answer to its request b. A recursive query is a call to a name server to reply with the requested data or tell it who else to talk to in order to find an answer to its request c. An iterative query places the entire responsibility for answering the query on the name server itself d. A recursive query places the entire responsibility for answering the query on the name server itself
question
c. Only when the primary and secondary DNS servers are unreachable
answer
When would an LLMNR client use LLMNR instead of other forms of name resolution? a. Only when the primary DNS server is unreachable b. Only when an APIPA IP address is configured c. Only when the primary and secondary DNS servers are unreachable d. Only at boot to map the network for nearby IPv6 computers
question
b. 50 percent of the lease time
answer
By default, after how much time has elapsed in a client's DHCP lease will the client attempt to renew the lease? a. 4 days b. 50 percent of the lease time c. 8 days d. 75 percent of the lease time
question
d. nslookup
answer
Which troubleshooting utility allows the generating of DNS request messages and the transmission of them to specific DNS servers on the network? a. tracert b. pathping c. netstat d. nslookup
question
c. tracert
answer
Which command is used to determine the route a packet takes? a. nslookup b. route c. tracert d. ping
question
c. Global unicast
answer
Which IPv6 address type can be used to communicate with any IPv6 device? a. Unique local unicast b. Node local unicast c. Global unicast d. Site local unicast
question
d. Network discovery
answer
Which of the following features searches for other devices on the network and allows other computers and devices on the same network to find your Windows-based computer or device? a. Stateful address configuration b. Public folder sharing c. HomeGroup d. Network discovery
question
a. The home network b. The work network d. the domain network
answer
In which of the following Windows 10 network locations is network discovery enabled by default? (Choose all that apply) a. The home network b. The work network c. the public domain d. the domain network
question
b. Enterprise mode
answer
Which WPA mode of operation uses a session key that is changed each time the wireless client communicates with the AP? a. v2 mode b. Enterprise mode c. Secure mode d. Session mode
question
d. 802.1x
answer
Which IEEE standard for 802.11 networks uses RADIUS for authentication and provides key management? a. 802.11i b. 802.11g c. 802.11n d. 802.1x
question
b. 802.11g
answer
Which IEEE standard defines wireless networks that are backward compatible with 802.11b and provides a maximum bandwidth of 54 Mbps? a. 802.11i b. 802.11g c. 802.11n d. 802.11x
question
a. 802.11i
answer
Which IEEE standard defines improved encryption for wireless networks, including AES? a. 802.11i b. 802.11g c. 802.11n d. 802.11x
question
c. 802.11n
answer
Which IEEE standard defines dual-band wireless networks with bandwidth up to 300 Mbps? a. 802.11i b. 802.11g c. 802.11n d. 802.11x
question
a. Unique local unicast
answer
Which IPv6 address type is routable within an organization but not outside the organization? a. Unique local unicast b. Node local unicast c. Global unicast d. Site local unicast
question
a. Personal mode
answer
Which WPA mode allows users to provide authentication via a pre-shared key or password? a. Personal mode b. Enterprise mode c. Extensible Authentication Protocol mode d. Wired Equivalent Privacy mode
question
b. Wi-Fi Direct
answer
Which Microsoft implementation uses ad hoc wireless networking that allows users to easily connect to another wireless device? a. Wi-Fi Protected Access b. Wi-Fi Direct c. Wired Equivalent Privacy d. Internet Sharing
question
a. Ad hoc
answer
Which wireless mode allows wireless clients to connect to each other directly without a wireless access point? a. Ad hoc b. Infrastructure mode c. Wired Equivalent Privacy d. Internet Sharing
question
b. Infrastructure mode
answer
Which wireless mode allows wireless clients to connect to a network by using a wireless access point? a. Ad hoc b. Infrastructure mode c. Wired Equivalent Privacy d. Internet Sharing
question
d. Public
answer
Which of the following Windows Firewall with Advanced Security (WFAS) profiles is most appropriate when a user is connected to an open hotspot at a local coffee shop? a. Private b. Domain c. Open d. Public
question
c. Both inbound and outbound
answer
Windows Firewall in Windows 10 can have rules configured that allow traffic to flow in which direction(s)? a. Either inbound or outbound, but not both b. Only inbound c. Both inbound and outbound d. Only outbound
question
a. Default
answer
When using the Windows Firewall with Advanced Security console, three distinct network locations impact the behavior of Windows Firewall. Which of the following is NOT one of these network locations used by Windows Firewall? a. Default b. Public c. Domain d. Private
question
c. .wfw
answer
A Windows Firewall policy file has which of the following file extensions? a. .wfp b. .waf c. .wfw d. .wfs
question
d. Connection security rules
answer
In Windows Firewall with Advanced Security, which type of rule should be configured to perform IPsec? a. Inbound rules b. Outbound rules c. Inbound and outbound rules d. Connection security rules
question
d. DirectAccess
answer
Which Microsoft technology provides seamless intranet connectivity to client computers when they are connected to the Internet? a. SSTP b. L2TP with IPSec c. PPTP d. DirectAccess
question
A records (AAAA records for IPv6)
answer
Which type of DNS resource record should be used to provide a name resolution for a host on a network?
question
Windows Firewall with Advanced Security
answer
Which tool is used to configure IPsec when communicating with a server?
question
8) On the taskbar, right‐click the network status icon and then click Open Network and Sharing Center. 3) Click Change adapter settings. 5) Right‐click a network adapter, such as Ethernet, and then select Properties. 1) When the Ethernet Properties dialog box opens, as shown in Figure 6‐5, click Internet Protocol Version 4 (TCP/IPv4) and then click Properties. 4) Select Use the following IP address and then type the IPv4 address, subnet mask, and default gateway you want to use. 2) Select Use the following DNS server addresses and then type an IP address for a preferred DNS server and an alternate DNS server. 6) Click OK to accept your settings and to close the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box. 7) Click Close to close the Ethernet Properties dialog box.
answer
List the correct order of steps necessary to configure a static IPv4 address on a Windows 10 computer. 1) When the Ethernet Properties dialog box opens, as shown in Figure 6‐5, click Internet Protocol Version 4 (TCP/IPv4) and then click Properties. 2) Select Use the following DNS server addresses and then type an IP address for a preferred DNS server and an alternate DNS server. 3) Click Change adapter settings. 4) Select Use the following IP address and then type the IPv4 address, subnet mask, and default gateway you want to use. 5) Right‐click a network adapter, such as Ethernet, and then select Properties. 6) Click OK to accept your settings and to close the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box. 7) Click Close to close the Ethernet Properties dialog box. 8) On the taskbar, right‐click the network status icon and then click Open Network and Sharing Center.
question
2) Discover 3) Offer 4) Request 1) Acknowledge (DORA)
answer
List the correct order of steps necessary for the DHCP process. 1) Acknowledge 2) Discover 3) Offer 4) Request
question
10) In File Explorer, navigate to the folder, or drive you want to share. 3) Right‐click the item to be shared, select Properties, click the Sharing tab in the Properties dialog box, and then click the Advanced Sharing button. 9) In the Advanced Sharing dialog box, select the Share this folder check box. 2) Use the Limit the number of simultaneous users to spin box to select the number of users who may access the item simultaneously. 5) In the Comments text box, type a description of the shared item. 8) To specify users or groups, or change permissions, click the Permissions button. The Permissions dialog box opens. 7) Click Add to add a user or group. (You can also click Remove to remove a user or group from the share.) The Select Users or Groups dialog box displays. 1) Type a user or group name in the text box or click Locations to find a user or group to add. When you're finished, click OK. 4) In the Permissions dialog box, select a user or group, select the checkboxes for the permissions you want to assign, and then click OK. 6) When you're finished, click OK to close the Advanced Sharing dialog box.
answer
List the correct order of steps necessary to configure advanced sharing. 1) Type a user or group name in the text box or click Locations to find a user or group to add. When you're finished, click OK. 2) Use the Limit the number of simultaneous users to spin box to select the number of users who may access the item simultaneously. 3) Right‐click the item to be shared, select Properties, click the Sharing tab in the Properties dialog box, and then click the Advanced Sharing button. 4) In the Permissions dialog box, select a user or group, select the checkboxes for the permissions you want to assign, and then click OK. 5) In the Comments text box, type a description of the shared item. 6) When you're finished, click OK to close the Advanced Sharing dialog box. 7) Click Add to add a user or group. (You can also click Remove to remove a user or group from the share.) The Select Users or Groups dialog box displays. 8) To specify users or groups, or change permissions, click the Permissions button. The Permissions dialog box opens. 9) In the Advanced Sharing dialog box, select the Share this folder check box. 10) In File Explorer, navigate to the folder, or drive you want to share.
question
3) Select the network icon from the notification area to open the network flyout. 1) Make sure Wi-Fi is turned on. 4) Click or tap the network name you want to connect to. 7) Decide whether to always connect to the network automatically when it's in range. 5) Press the Connect button 2) Either enter the network password. 6) Click or tap Next.
answer
List the correct order of steps necessary to connecting to a Wireless network with a broadcasted SSID. 1) Make sure Wi-Fi is turned on. 2) Either enter the network password. 3) Select the network icon from the notification area to open the network flyout. 4) Click or tap the network name you want to connect to. 5) Press the Connect button 6) Click or tap Next. 7) Decide whether to always connect to the network automatically when it's in range.
question
2) Look for the WiFi icon on the lower-right corner of your screen. 4) Click Network settings. 6) Under WiFi, click Hidden Network. 1) Click Connect. 3) Enter the name SSID and click Next. 5) Enter the security key or passphrase and click Next. 7) Wait for the network to become connected.
answer
List the correct order of steps necessary to connecting a hidden wireless network. 1) Click Connect. 2) Look for the WiFi icon on the lower-right corner of your screen. 3) Enter the name SSID and click Next. 4) Click Network settings. 5) Enter the security key or passphrase and click Next. 6) Under WiFi, click Hidden Network. 7) Wait for the network to become connected.