CompTIA A+ Core 2 Lesson 5 Quiz - Managing Windows Networking
A server administrator wants to connect to a user's computer. They are trying to get their patching numbers up and discover that users must pull the updates, so the administrator wants to push a script that forces the pull. The administrator wants to copy the file to users' automatically hidden shares. Which of the following could the administrator use? (Select all that apply.) A) C:\Windows$ B) C$ C) C:\Users$ D) ADMIN$
B) C$ & D) ADMIN$ In addition to any local shares created by a user, Windows automatically creates hidden administrative shares. This includes the root folder of any local drives (C$). It also includes the system folder (ADMIN$). Administrative shares can only be accessed by members of the local Administrators group.
A company contracted out a development project to another country and had to grant certain permissions to the team, but during the extent of the project, the team was accessing files they should not have. The administrator investigates why they were able to access certain files. Which of the following applies last and sets the precedence for access? A) Inherited allow B) Explicit permissions C) Inherited deny D) RBAC
B) Explicit permissions Directly assigned permissions (explicit permissions) always override inherited permissions, including "deny" inherited permissions.
A security manager reviews user roles and grants the minimum privileges necessary. What did the manager implement? A) Implicit deny B) Least privilege C) ACL D) Authentication
B) Least privilege Least privilege means that a user should be granted the minimum possible rights necessary to perform the job. This can be complex to apply in practice, however.
A security engineer investigates legacy applications and employees that are still using them. Which of the following user groups represent a security concern? A) Guest B) Power users C) Standard account D) Local users and groups
B) Power users The power users group is present to support legacy applications. This approach created vulnerabilities that allowed accounts to escalate to the administrator's group.
A server administrator sets up static network configurations for servers since they do not want the IP address to change. The administrator sets up the IP address on a 24-bit subnet. What should the administrator set the subnet mask to? A) 255.255.0.0 B) 255.0.0.0 C) 255.255.255.0 D) 0.0.0.0
C) 255.255.255.0 Administrators can also adjust the IP configuration via the settings app. In this dialog, they need to enter the mask as a prefix length in bits. A 255.255.255.0 mask is 24 bits.
A user calls in to support, complaining that they can not seem to reach anything on the network. The user was able to receive an IP address of 169.254.15.83 though. What is most likely the problem? A) No internet access. B) The computer does not receive a DNS entry. C) It cannot find the wireless SSID. D) No DHCP server found.
D) No DHCP server found When no Dynamic Host Configuration Protocol (DHCP) server can be contacted, the adapter will either use an address from the automatic IP addressing (APIPA) 169.254.x.y range or will use an address specified as an alternate configuration in IPv4 properties.
A support technician receives a call from a user who cannot seem to go anywhere on the network, except for the share drive \\192.168.8.20\ShareDrive. Which of the following should the technician check first? A) DNS B) RTT C) Firewall D) APIPA
A) DNS If a service such as domain name service (DNS) is not working, users will be able to connect to servers by IP address but not by name.
An administrator sets up a network share for the marketing team to collaborate. The requirement is to protect the files from a user who has local access to the computer that hosts the shared resource. What type of permission should the administrator set up? A) NTFS B) Share-level C) FAT32 D) ACE
A) NTFS New Technology File System (NTFS) permissions are applied for both network and local access and can be applied to folders and to individual files.
A penetration tester looks to harvest credentials from users who log in locally. Where should the penetration tester look for users who authenticated locally? A) SAM B) Kerberos C) VPN D) Web portal
A) SAM In a Windows local sign-in, the Local Security Authority (LSA) compares the submitted credential to the one stored in the Security Accounts Manager (SAM) database, which is part of the registry. This is also referred to as interactive logon.
A server administrator wants to connect to a user's computer and push a file through Server Message Block (SMB). How should the administrator connect to the computer? A) \\userhost\C$ B) userhost C) comptia.com D) 192.168.14.25
A) \\userhost\C$ To connect to a computer via SMB, the administrator should use \\userhost\C$.
A user calls into the helpdesk after receiving a recent update to their computer and now certain functions are no longer working properly. The helpdesk technician asks for their FQDN. What would be an example of the FQDN? A) userhost.comptia.com B) userhost C) comptia.com D) 192.168.14.25
A) userhost.comptia.com userhost.comptia.com would be an example of a fully qualified domain name (FQDN). This includes both the name of the host as well as the domain it is on.
A user is experiencing what seems to be latency, which is affecting their ability to work. They decide to validate their theory with a ping test. What will indicate latency? A) ARP B) RTT C) APIPA D) DNS
B) RTT If the ping is successful, it responds with the message Reply from IP Address and the time it takes for the host's response to arrive. The millisecond (ms) measures of round-trip time (RTT) can be used to diagnose latency problems.
A transportation company outfits its mobile units with devices that will enable them to analyze routes, patterns, and create efficiencies. The devices will connect to their cloud servers through a 4G WWAN. What will the company need to ensure the devices have? A) VPN B) SIM C) NLA D) Link-layer Topology Discovery
B) SIM For GSM and 4G or 5G services, the adapter must also be fitted with a subscriber identity module (SIM) card issued by the network provider. The bandwidth depends on the technologies supported by the adapter and by the local cell tower (3G, 4G, or 5G, for instance).
A security conscientious administrator wants to make computer authentication more secure. Which of the following would be the optimal method? A) Device token B) Facial recognition C) MFA D) UAC
C) MFA An authentication technology is considered strong if it is multifactor. Multifactor authentication (MFA) means that the user must submit at least two different kinds of credentials.
Two IT friends are best friends and want to map each other's root shares. Which of the following commands will accomplish this? A) net view M: \\BestFriend\C$ B) net view M: \\BestFriend\ADMIN$ C) net use M: \\BestFriend\C$ D) net use M: \\BestFriend\ADMIN$
C) net use M: \\BestFriend\C$ To map the root share on the computer BestFriend to the M: drive, they would use net use M: \\BestFriend\C$.
A network administrator responds to users calling in about a slow network. Which command should the administrator use to diagnose the chokepoint? A) ipconfig B) hostname C) pathping D) msconfig
C) pathping The pathping command performs a trace and then pings each hop router a given number of times for a given period to determine the round-trip time (RTT) and measure link latency more accurately.
A Windows administrator wants to divide a domain up into different administrative realms to delegate responsibility for administering company departments. What should the administrator use to do this? A) Security groups B) Member server C) Group policy D) OU
D) OU An organizational unit (OU) is a way of dividing a domain up into different administrative realms. Administrators might create OUs to delegate responsibility for administering company departments or locations.
A PC user is looking at the wireless card adapter properties on their Windows computer. Which of the following is the most important setting to verify in order to ensure the PC is capable of connecting to an existing network? A) Power transmission B) SSID C) Automatic connection D) Protocol support
D) Protocol support Wi-Fi properties for the adapter are configured via Device Manager. The most important setting on a wireless card is support for the 802.11 standards supported by the access point.
A server administrator's profile is set up to copy the whole profile from a share at logon and copy the updated profile back at logoff. This allows the administrator to hop on to any of the company's computers. What technique was set up? A) Folder redirection B) Home folder C) Group policy D) Roaming profile
D) Roaming profile Roaming profiles copies the whole profile from a share at logon and copies the updated profile back at logoff.
A vulnerability manager cleans up the patching program in their enterprise. After getting it back to a good state, the manager focuses efforts on hardening. They begin with a test box and want to look at open connections from services. What command should the manager use? A) nslookup B) tracert C) ipconfig D) netstat
D) netstat The netstat command can be used to investigate open ports and connections on the local host. This can be used to see what ports are open on a server and whether other clients are connecting to them.