Which document format is similar to XPS? | |
Which of the following are languages used by printers? (Choose all that apply.) | XPS PCL PostScript |
Which utilities can be used to manage printers? (Choose all that apply.) | Devices and Printers in Control Panel Print Management snap-in Printers & scanners in Settings |
Which of the following are features available only in the Print Management snap-in? | Manage remote printers Manage local printers Update printer drivers |
Which utility is used to add printer drivers to the printer driver store? | pnputil.exe |
When a printer is configured with a lower priority value, the print jobs for that printer are | False |
By default, all users are able to manage their own print jobs because the ___________________ | Creator Owner |
When you create a new document in the root of a library, where is the document created? | in the default save location of the library |
Which file locations are indexed by default? (Choose all that apply.) | Offline files the Windows folder the Users folder |
For each type of file, you can specify whether the contents of the file are indexed. True or | True |
Which Internet Explorer 11 security zone is only relevant if the computer is joined to a | Local intranet |
When Internet Explorer 11 runs in Protected Mode, it runs with lower privileges than the | True |
What is the default folder synchronized with OneDrive? | C:\Users\%username%\OneDrive |
Which actions for OneDrive can only be performed when accessing files through the web | Recover deleted files from the Recycle bin. Edit files by using web-based applications. Access previous versions of files. |
Access to shared files in OneDrive can be restricted to specific people. True or False? | True |
Which of the following are characteristics of Branch Office Direct Printing? (Choose all | The print server is responsible for rendering the print job. You can centrally manage printers for multiple locations from a single print server. |
Microsoft Edge supports ActiveX controls. True or False? | True |
Which steps are required to configure Enterprise Mode with Microsoft Edge? (Choose all | Create an XML file with a list of websites requiring Internet Explorer |
The SmartScreen filter is used to prevent malware in Microsoft Edge and Internet Explorer | True |
The ___________________ service is responsible for processing print jobs. | Spooling |
1.2 The minimum specifications for Windows 10 require greater CPU and RAM resources than Windows 7 T or F | False |
1.1 A friend has asked you which version of Windows 10 should be purchased to start a new home-based business. Your friend needs only one computer for now, and requires support for Windows Store applications needed to manage their business. They are not very experienced with computers and have asked for easy-to-use features. Which version of Windows 10 do you recommend? – Windows 10 Education | Windows 10 Home |
1.23 A thread represents the files, data, and instructions that make up a single running task or application. T or F | True |
1. 24 You are installing a computer to run a nuclear reactor management system. The software lists Windows 10 as a requirement. To ensure that future feature updates do not impact the stability of the software, you should consider what type of Windows 10 installation? – Waas | D. LTSB |
1.25 Which of the following is a disadvantage of workgroup computing? | C. no centralized security management |
1.4 The new web browser included with Windows 10 is called ___. – Charlie | Microsoft Edge |
1.5 You are adding a new 500 GB hard drive to your computer. The hard drive must be formatted with a file system to organize files into folders on that drive. The recommended file system to use is ___. – exFAT | NTFS New Technology File System. |
1.6 You are considering purchasing an inexpensive computer from a friend that has a 32-bit CPU and 8 GB of RAM. You install Windows 10 Home, 32-bit edition, but you can’t see the full amount of RAM. What is wrong? – The CPU does not support hyper threading | Windows 10, 32- bit editions cannot support more than 4 GB of RAM |
1.7 Your workstation is running Windows 10 Professional and you decide to share a folder on your computer. Twenty-two people in your office are trying to connect to that folder at the same time over the network. The first 20 people can connect, the other two cannot. To fix this you could ___. – buy a computer, software, and licenses to run Windows Server 2016 | by a computer, software, and licenses to to run Windows Server 2016. |
1.8 Computers that belong to the same domain can access a common security database of user and computer account information. This type of database on Windows Server 2016 domain controller servers is also known as a(n) ___ database. – primary | Active Directory |
1.9 Which of the following is an advantage of domain networking? | C. centralized security management |
1.10 A new company will have 40 workstations in one building sharing a single network. All users must be able to share files and printers with each other. Access to shared information must be secure and simple to administer. The best technology for this system is: | D. domain networking |
1.12 In tablet mode, Windows 10 will assume that ___ is not generally available: | B. keyboard and mouse |
1.13 The main network protocol used to communicate between Windows 10. computers is _______? – TCP/IP | A. TCP/IP |
1.14 The Window 10’s version of TCP/IP supports the newer communication protocol called ___. | B. IPv6 |
1.15 A user has a computer running Windows 7 but cannot seem to activate the free upgrade offer to Windows 10. The computer is a 32-bit CPU model with 4 GB of RAM and a 500 GB hard drive with 200 GB of free space. The free upgrade is likely unavailable because ___. -their system does not meet minimum hardware specifications | C. the system is missing prerequisite Windows updates |
1.16 Application windows can be docked to the sides and corners of the screen using a feature called ____. | A. Snap |
1.18 Windows Hello supports multiple biometric authentication methods, including facial recognition. The failsafe method to authenticate in case the facial recognition method is unavailable is ___. | C. PIN |
1.19 Some hardware can be added to the computer without having to restart or power down the computer. After a short period of time the device driver automatically loads and the hardware is available to applications and the user. This type of hardware is considered compatible with what type of technology? | C. Plug and Play |
1.20 Windows 10 takes up less room on storage devices when the operating system is installed. One reason for this could be the enhanced ___ feature of the newer edition NTFS file system: | B. compression |
1.21 Software Assurance customers can take advantage of extra applications provided with Windows 10 Enterprise edition. What feature included with this edition will allow a virtual computer to be hosted by the computer running Windows 10? -Soc | D. Client Hyper-V |
1.22 Which of the following is an advantage of HomeGroup computing? | D. simple to set up initially |
1.3 _____________on a Chip is a hardware component capable of reducing the overall size of a computer. | System6 |
1.17 An administrator of a manufacturing company would like to manage corporate computers with group policy. They are reviewing a purchase request for 20 new computers from the business owners. Which version of Windows 10 should they consider for installation on the new computers they would like to buy (select two)? | B. Windows 10 Professional D. Windows 10 Enterprise |
1.11 The new virtual personal assistant built into Windows 10 can search multiple places for information that relates to your needs, including (select three): | A.The local computer, C.The web D.External accounts |
the Windows 10 feature that automatically adjusts Windows 10 between desktop mode and tablet mode as the device state changes | Continuum |
a personalized virtual search assistant | Cortana |
the traditional configuration for a Windows 10 computer that is optimized for use with a mouse and keyboard | desktop mode |
software written by the developer of a hardware component that tells the operating system how to talk to and control the hardware | device driver |
server responsible for holding a domain security database | domain controller |
a file that holds application code modules | Dynamic Link Library |
a technique used in certain Intel processors to improve their overall performance by working on more than one independent piece of code at a time | hyperthreading |
term used to describe the appearance of more than one application sharing the CPU of the computer | Multitasking |
the amount of time allocated to a program running in a preemptive multitasking environment | Quantum |
T or F—Business enhancements such as encrypted files, joining a domain, and processing Group Policy settings are available in Windows 10 Home. | False |
T or F—Cortana can optionally link external accounts that the user has on services such as Office 365. | True |
T or F—In Windows 10, the standard protocol for computers to format and exchange data across a network is Remote Assistance. | False |
T or F—Windows 10 Enterprise and Education editions do not include support for tablet computers as a standard feature. | False |
T or F —The installation process of Windows 10 takes a snapshot of the computer’s hardware and calculates a digital signature to identify that computer. | True |
What Windows 10 feature should you use if you need to run an older application on an earlier version of Windows using the same computer you are using to run Windows 10? | Client Hyper-V |
Which of the following terms is a collection of computers and users that are identified by a common security database? | domain |
2.1 Which task cannot be performed by using DISM? | C. add service pack to an image |
Which utility is used to create answer files for unattended installations? -DISM | Windows System Image Manager |
Which utility is used to prepare computers for imaging by removing specific information, such as the computer name and computer SID? -DVD boot installation | image-based installation |
Which folder is used to store user profiles in Windows 10? C:\Documents and Settings | C:\Users |
Which utility can be used update drivers in an existing Windows 10 image? -WISM | DISM |
Which configuration pass can be used to perform disk partitioning operations? -windowsPE | generalize configuration |
Which tool is used to create provisioning packages? -Windows PE | Windows ICD |
Which installation methods require booting into Windows PE before Windows 10 starts? (Choose all that apply.) – DVD boot installation | -distribution share installation – image-based installation |
Which methods can you use to migrate user settings from a previous operating system to Windows 10? (Choose all that apply.) – Copy the user profile from the old computer to the new computer. | – Copy the user profile from the old computer to the new computer. – Use Windows Easy Transfer. |
Which methods can you use to place applications from a previous operating system on Windows 10? (Choose all that apply.) – Perform an upgrade over the top of the previous operating system. | – Reinstall the applications on the new computer. – Perform an upgrade over the top of the previous operating system. |
Which configuration passes automatically search for an autounattend.xml file, if an answer file is not specified? (Choose all that apply.) – windowsPE | – windowsPE – offlineServicing |
Which options must be used with DISM to save changes to an image? (Choose two.) | – /commit – /unmount-image |
Which of the following are benefits of DISM? (Choose all that apply.) – There is no charge to use DISM for Windows 10 imaging. | – WIM image file size is minimized by single instance storage. – Images can be taken of an entire partition or just a single folder. – There is no charge to use DISM for Windows 10 imaging. |
Which of the following are scenarios where you could use provisioning? Choose all that apply. – Deploying Microsoft Office. | – Deploying new Windows Store applications. – Updating Windows 10 Pro to Window 10 Enterprise. |
The __________ installation method is best suited to small organizations that install Windows 10 only occasionally. -DVD Boot | DVD Boot |
A WIM image file containing two Windows 10 images will be approximately twice as big as a WIM image file containing one Windows 10 image. -True | False |
Windows To Go is available in Windows 10 Pro and Windows 10 Enterprise. -True | False |
Windows ICD cannot be used to completely automate the deployment of Windows 10. -True | True |
A clean installation is an installation of Windows 10 performed on a computer that has existing data or applications. -True | False |
The DVD boot installation method is the most suitable method for a large volume of computers. -True | False |
Windows PE includes networking components and allows you to use current Windows drivers for network connectivity. -True | True |
A distribution share installation is always faster than a DVD boot installation. -True | -False |
Windows 10 maximizes user involvement during attended installation with an abundance of prompts that user must answer in the middle part of the installation. -True | -False |
Which of the following moves desktop settings and applications from one computer to another? -ImageX | User State Migration Tool (USMT) |
The functionality provided by which of the following Windows 7 features has now been included in DISM for Windows 10? -Windows PE | ImageX |
Which of the following is a limited and non-GUI version of Windows based on Windows 10 technologies that can be used for installing, troubleshooting, and repairing Windows 10? -Windows PE | -Windows PE |
Which of the following is used to perform offline servicing of WIM images? – WDS | Deployment Image Servicing and Management (DISM) |
Which of the following installation methods is the least suitable method for a large volume of computers? – DVD boot | DVD boot |
The Account Policies in the Local Security Policy can be used to control domain accounts. | False |
NTFS permissions can be easily circumvented when you have physical access to a computer. | False |
In Windows 10, advanced audit policies can only be edited at a command-line. | False |
Every object in Windows 10 has audit events related to it. | True |
Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time? | privilege use |
Newer Windows applications use which of the following to describe the structure of an application? – manifest | manifest |
Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following? | Application Compatibility Toolkit |
Which of the following is considered one of the biggest sources of malware (malicious software)? | the Internet |
What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior? | Spyware |
Which of the following accurately describe the Administrative Tools available in Control Panel? (Choose all that apply.) | Most are MMC consoles. You can schedule tasks. You can manage device drivers. |
Which of the following are found in Administrative Tools? (Choose all that apply.) | Event Viewer Windows Memory Diagnostic Computer Management Task Scheduler |
Which snap-ins are available in Computer Management? (Choose all that apply.) | Task Scheduler Services Device Manager |
Which tasks can you accomplish using the Services administrative tool? (Choose all that apply.) | Stop a service. Configure a service to start automatically. Configure the credentials for a service. |
Which tasks can you perform in Device Manager? (Choose all that apply.) | – Determine which devices do not have a driver loaded. – Disable devices – View hardware resource configuration. – Roll back device driver. |
With a signed device driver, which of the following can Windows 10 do? (Choose all that apply.) | Determine if a driver has been modified. Determine if the publisher is valid. |
Hybrid sleep is a combination of which ACPI power states? (Choose two.) | S3 S4 |
Which requirements must be met for display adapters in Windows 10? (Choose all that apply, | Support for WDDM Support for DirectX9 |
Which Settings category allows you to control whether apps can access your location? | Privacy |
Which of the following is used by apps to connect to databases? | ODBC |
Which MMC access mode allows users to create new windows, but prevents them from viewing some of the console tree? | User mode—limited access, multiple window |
Which new function in Windows 10 allows you to switch a single monitor between sets of open apps? | Multiple desktops |
Modern Standby puts the computer in which ACPI power state? | S0 |
A _____________ is a type of Windows application that runs in the background without user intervention. | service |
You can build a customized MMC console by adding ___________ to the console. | snap-ins |
A __________________ is software used to manage communication between hardware components and Windows 10. | device driver |
To find a list of hardware components certified to run on Windows 10, you should consult the Hardware Compatibility List. | False |
You can use the Get-Member cmdlet to view the properties available for an object. | TrueThe primary purpose of a screen saver is to prevent screen burn in. |
The primary purpose of a screen saver is to prevent screen burn in. | False |
Windows 10 supports attaching more than two monitors to a computer and extending the desktop across all of them. | True |
Local user accounts can be used to access resources on other computers in a workgroup or a domain. | True |
Secure sign-in increases security on your computer by forcing you to press Ctrl+Alt+Delete before signing in. | True |
With fast user switching, only one user can be actively using the computer at a time. | False |
The Administrator and a user-specified initial account are called built-in accounts because they are created on every Windows 10 computer. | False |
In Windows 10, most actions that are triggered by an Administrator do not result in a prompt from User Account Control. | True |
Which of the following are required for individuals to log on to Windows 10 and use resources on the computer? | User accounts |
Each time a user logs on locally, which database is used to verify sign-in credentials? | SAM |
Which of the following is used to protect your computer from malware that may attempt to steal your password? | Secure sign-in |
Which Windows 10 feature ensures that a second user can log on to a locked computer without logging off the first user and losing their work? | Fast user switching |
In order to stop the automatic sign-in from occurring, which key should be held down during the boot process? | Shift |
What type of startup firmware best supports Windows 10 with regard to device operation and management? | UEFI |
A VHD has been created using the Disk Management utility. Before the newly created VHD can be used to store files it must be ______. | initialized |
A drive is attached to a custom hardware RAID controller. It does not show up as being available for use with Storage Spaces. To make the drive appear for use with Storage Spaces the hardware RAID controller must be: | Configured as mirrored RAID 1 |
You have just plugged a USB portable hard drive into an older laptop and the disk has not appeared as available. You are concerned that the hard disk controller hardware has not been recognized by the computer. What utility would you use to verify that the controller is functioning correctly? | Device Manager |
The number of physical disks required to implement three-way resilience for a Storage Spaces volume is ___. | 5 |
The preferred technology to set up disk storage with mirrored fault tolerance for a user’s backup data is _____ | – Storage Spaces |
A NTFS partition has disk quotas enabled. You would like to run a weekly report that summarizes how much space each user is consuming. The _____ utility allows you to review quota details from the command line. | fsutil |
A 127 GB volume on a dynamic disk can be formatted with which file system? | NTFS |
The _____ file system is the only one that supports file compression in Windows 10. | NTFS |
A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a different folder on a different NTFS-formatted volume where the user has been given Modify permission for that folder. The file is then moved to a folder on a FAT32-formatted volume. When the user signs in to the computer holding the file and accesses it via a drive letter, what is the user’s effective permission to the file? | No permissions apply |
A user is assigned Read permission to the NTFS folder C:\ACCOUNTING. The user requires full access to the folder C:\ACCOUNTING\FORMS and its contents. This can be accomplished by ___. -blocking permission inheritance at C:\ACCOUNTING and signing the user full control to C:\ACCOUNTING\FORMS -assigning the user Full control to C:\ACCOUNTING\FORMS -assigning the user Full control to C:\ACCOUNTING -blocking permission inheritance at C:\ACCOUNTING\FORMS and assigning the user Full control to C:\ACCOUNTING\FORMS -not possible | assigning the user Full control to C:\ACCOUNTING\FORMS |
A user checks the free space in a folder, Y:\BusReports, and notices that 3 GB of disk space is reported as available. When the user checks free space in Y:\BusReports\Archive, he notices that 5 GB of disk space is reported as available. The difference in available disk space is probably because the folder Y:\BusReports\Archive is ___ | a mount point |
Upon opening the Disk Management console, you notice a disk whose status is reported as Foreign Disk. This is most likely because ____. | the disk was moved from another computer |
A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a different folder on a different NTFS-formatted volume where the user has been given Full control permission to that folder. When the user signs in to the computer holding the file and accesses its new location via a drive letter, what is the user’s effective permission to the file? | Full control |
A user is given Read permission to a file stored on an NTFS-formatted volume. The file is then moved to a folder on the same NTFS-formatted volume where the user has been given Modify permission to that folder. When the user signs in to the computer holding the file and accesses its new location via a drive letter, what is the user’s effective permission to the file? | Read |
A storage ____ acts as a logical container grouping multiple physical disks. | pool |
You have recently added a new USB portable hard disk to your computer. You have received a notice that new hardware has been detected but the disk does not appear as a storage location. Which utility would you use to verify that the hard disk’s logical disk information is recognized by Windows 10 (select two)? | – DiskPart – Disk Management console |
Windows 10 supports locally encrypted files stored on these types of partitions (Select all that apply). | – NTFS – FAT32 |
A file is currently compressed in its local file system. For security reasons, the file is required to be encrypted. The file can be both compressed and encrypted. | False |
When assigning NTFS permissions, an ACE entry can explicitly define who is denied access to a resource. | False |
The choice of file system can limit the total amount of data stored in a partition or volume. | True |
NTFS stores files and folders in a way that looks very similar to the FAT file system. | False |
Files and folders on an NTFS file system in Windows 7 cannot use Unicode characters in the filename. | False |
Changes in the ownership of a file do not change the amount of data that is considered to belong to a user. | False |
Which of the following types of storage can be partitioned using MBR or GPT and are supported by all versions of Windows? | Basic disk |
Most of the partition attributes are stored in a data table that is part of the MBR or GPT specification. What is this table is commonly called? | partition table |
On dynamic disks, the term partition is not used to define the space where a file system is installed. What term is used? | volumes |
What is a mirrored volume also known as? | RAID 1 |
Which of the following storage space types can only be created with three or more physical disks? | Parity |
Until a new disk is initialized, what is its status reported as? | Unknown |
Local user accounts are stored in the SAM database. | True |
Because the initial user account created during installation is a member of the Administrators group, it has all of the characteristics of the Administrator account. | False |
A roaming profile is located on a network server. | True |
After you set a PIN for a domain account on your laptop, that PIN can be used only on your laptop. | True |
In a domain-based network, each server authenticates users by using the SAM database. | False |
Each user account is assigned a(n) _______________ to ensure that security is kept intact if the account is renamed. | SID |
The _____________ group becomes a member of the Administrators local group when a Windows 10 computer joins a domain. | Domain Admins |
How do you reset the password for a Microsoft account? – Use a password reset disk. – The user needs to reset the password on the Microsoft website for Microsoft accounts. – A local administrator can reset the password in the User Accounts applet in Control Panel -A local administrator can reset the password in ACCOUNTS settings. – A local administrator can reset the password by using the Local Users and Groups MMC snap-in. | The user needs to reset the password on the Microsoft website for Microsoft accounts. |
Which sign-in method requires users to press Ctrl+Alt+Delete before signing in? | Secure sign-in |
Which sign-in method allows multiple users to have applications running on the computer at the same time? – Fast user switching | – Fast user switching |
Standard users are members of which built-in local group? | Users |
Which user management tool is required to assign a logon script to a user? | Local Users and Groups MMC snap-in |
Which file in a profile contains user-specific registry settings? | – NTUSER.DAT |
Which profile is copied to create a profile for new user accounts? | Default |
Which profile is merged into each user profile when the user is signed in? | Public |
Which authentication method can use a fingerprint scanner to authenticate users? | Windows Hello |
Which characters are not allowed in user account names? (Select all that apply.) | * \ |
Which characteristics apply to the Administrator account? (Choose all that apply.) | – It has a blank password by default. – It cannot be deleted. |
Which characteristics apply to the Guest account? (Choose all that apply.) | – It has a blank password by default. – It cannot be deleted. – It is disabled by default. – It can be locked out. |
Local user accounts are stored in SAM database. | True |
Because user names are case sensitive, you can use capitalization to ensure that they are unique. | False |
Which security feature in Windows 10 prevents malware by limiting user privilege levels? | User Account Control (UAC) |
Which password policy setting should you use to prevent users from reusing their passwords too quickly? | Minimum password age |
Which account lockout policy setting is used to configure the time frame in which incorrect logon attempts must be conducted before an account is locked out? | Reset account lockout counter after |
Which type of AppLocker rule condition can uniquely identify any file regardless of its location? | Hash |
How would you create AppLocker rules if you wanted to avoid updating the rules when most software is already installed? | Create default rules |
To which event log are audit events written? | Security |
What are you disabling when you configure UAC to not dim the desktop? | secure desktop |
Which type of encryption is the fastest, strongest, and best suited to encrypting large amounts of information? | Symmetric |
Which of the following is not true about BitLocker Drive Encryption? – You must use a USB drive to store the startup PIN. – BitLocker Drive Encryption requires at leas two disk partitions. – BitLocker Drive Encryption is designed to be used with a TPM. – Two encryption keys are sued to protect data. | -You must use a USB drive to store the startup PIN. |
Which servicing branch for Windows Update should be used for computers where changes cannot be tolerated? | Long Term Servicing Branch |
What is the name of the Group Policy setting that configures Windows Update for Business? | – Defer Upgrades and Updates |
Which of the following passwords meet complexity requirements? (Choose all that apply.) | – passw0rd$ – a1batr0$$ – A%5j |
Which utilities can be used to compare the settings in a security template against a computer configuration? (Choose all that apply.) | Security Configuration and Analysis tool Secedit |
How can you recover EFS-encrypted files if the user profile holding the digital certificate is accidentally deleted? (Choose all that apply.) | – Restore the user certificate from a backup copy. – Another user that has access to open the file can decrypt it. – Decrypt the file by using the recovery certificate. |
The _____ local policy controls the tasks users are allowed to perform. | user |
An ____ is used to describe the structure of an application and trigger UAC when required. | application manifest |
To prevent malware installation, you should configure Windows Defender to perform _____. | real-time scanning |
Evaluating DLL files for software restrictions has a minimal impact on performance because of caching. | False |
To encrypt a file by using EFS, the file must be stored on an NTFS-formatted partition. | True |
BitLocker Drive Encryption is user aware and can be used to protect individual files on a shared computer. | False |
The Account Policies in the Local Security Policy can be used to control domain accounts. | False |
The most common use for AppLocker is malware prevention. | True |
NTFS permissions can be easily circumvented when you have physical access to a computer. | True |
Which advanced audit policy setting tracks when tasks are performed that require a user rights assignment, such as changing the system time? | privilege use |
Newer Windows applications use which of the following to describe the structure of an application? | manifest |
Applications that are not designed for Windows 10 and that require administrative privileges do not properly request elevated privileges, generating an error. You can eliminate this error by using which of the following? | Application Compatibility Toolkit |
Which of the following is considered one of the biggest sources of malware (malicious software)? | – the Internet |
What type of software is silently installed on your computer, monitors your behavior, and performs actions based on your behavior? | – Worm |
H.W.-1 | – ipconfig a command-line utility that can be used to display and manage IP address settings for network interfaces on a computer. – netsh a command-line utility that can be used to display, change, addend delete network configuration settings on a computer, including basic and advanced settings |
H.W-2 | -route a command-line utility that can be used to display and manage the routing table. -netstat a command-line utility that can be used to display protocol statistics and current TCP/IP network connections. -netsh a command-line utility that can be used to display, change, addend delete network configuration settings on a computer, including basic and advanced settings |
H.W. -3 | -clients a client allows you to communicate with a particular service running on a remote computer -services an application that provides functionality to remote clients over the network -protocols a standard set of rules that defines how different components of a system operate together -network drivers the software responsible for enabling communication between Windows 10 and the network device in your computer |
H.W. -4 | – /24 is a Class C default subnet mask value (in CIDR) notation, CIDR is classless interdomain routing notation – 255.255.255.0 is a Class C default subnet mask value pg. 260 |
H.W.-5 | – IP address is the unique address used by computers on an IPv4 or IPv6 network. An IPv4 address is commonly displayed in dotted decimal notation 10.10.0.50 – Subnet mask is a number that defines which part of an IP address is the network ID and which is the host ID – Default gateway a router on the local network that is used to deliver packets to remote networks – DNS Domain Network Server is a system for converting computer host names to IP addresses |
H.W. -6 | – 172.32.0.1 – 38.15.222.299 – 99.99.99.99 pg-268-269 |
H.W.- 7 | – Static configuration is manually entering IP configuration – APIPA stands for automatic private IP addressing and are the 169.254.0.0/16 network and are designed as a solution for very small networks with no Internet connectivity. Computers are on the local network. page 262 |
H.W.-8 | – 10.16.160.45 – 10.16.122.2 – 10.16.185.45 – 10.18.114.3 |
H.W.-9 | – 127.0.0.1 first octet 127 identifies loopback address in IPv4 – ::1 in IPv6 loopback address is 0:0:0:0:0:0:0:1 |
H.W.-9 | – Netsh – Group Policy – Windows Firewall and Advanced Security – Windows PowerShell |
H.W.-10 | – 192.168.0.254 – 192.168.0.1 |
H.W. -12 | – Public network |
H.W. -13 | – Network Discovery |
H.W. -14 | – SMB |
H.W.- 15 | – FE80::2cab:2a76:3f57:8499 |
H.W. -16 | – Modify |
H.W.- 17 | – 192.168.112.5 |
H.W.-18 | – Share with |
H.W. -19 | – Public folder sharing |
H.W.- 20 | – View the shares in Computer Management |
H.W. – 21 | – WWAN |
H.W.- 22 | – DSL |
H.W. -23 | – netsh wlan show wlanreport |
H.W.-24 | – 2001:0:4137:9e74:2cab:2a76:3f57:8499 |
H.W. -25 | DNS Domain Network Server |