CpS 201 Chapters 3-4

Ace your homework & exams now with Quizwiz!

The computer was not connected to the Internet.

Abdul uses his Microsoft account to sign in to his desktop computer as well as his mobile device. He uses his mobile device to change his account's password. He signs out of his computer and tries signing in again. However, he is not able to. Why do you think he is not able to sign in?

10

After credentials are cached locally, you can sign in to a computer using a domain user account. By default, how many user sign-ins are cached?

By deselecting the Account is locked out option

After too many sign-in attempts, one of your colleagues has been blocked from using her Windows 10 user account. As a systems administrator, you need to help resolve this issue. How will you help her sign in using the computer management administrative tool?

Administrators

An Administrator account derives its privileges from being a member of which local group?

A host ID

An IP address is composed of a network ID and which of the following?

PPPoE

DSL connections usually use which protocol in order to secure connections?

Loopback address

Data sent to which of the following returns to the computer that sent it and does not appear on the actual network?

DNS

Which of the following protocols is used for resolving host names to IP addresses?

In Windows 10, the User Accounts applet in the Control Panel does not have the option to create new user accounts.

Arun has purchased a new Windows 10 computer. He wants to create user accounts for his family members. Unlike previous versions of Windows, he is not able to use the User Accounts applet in the Control Panel to create new users. What do you think is the issue?

Each computer in the network is assigned a static IP address.

As a network administrator, Joshua is helping a nearby library set up a local network. He manually assigns an IPv6 address, as well as a default gateway and DNS server, to each Windows 10 computer using the Network and Sharing Center. Which of the following is true of this configuration?

The host computer was manually configured using ICS.

As a network administrator, Lea helps a small start-up set up a temporary network at a rented space. She configures a host computer with the IP address provided by the ISP to act as a router. Other computers in the network share the Internet connection through the host computer. After few hours, the owners of the start-up complain that they are not able to connect to the Internet. Which of the following, if true, is preventing Internet access?

SAM

Each time a user logs on locally, which database is used to verify sign-in credentials?

No, only the Group Policy-based rules will be effective.

For security reasons, MedCorp, a pharmaceutical company, blocks all inbound connections to a proprietary program installed on its employees' computers through a Group Policy. One of the employees, to override this rule, creates a rule on a local computer that allows all inbound connections to the program. Will the employee be successful in his attempt?

Select the turn on network discovery option in the Network and Sharing Center.

How will you configure your computer to be visible on a remembered network that is profiled as a public network?

An administrator account can update device drivers, whereas a standard account cannot.

Identify a difference between a standard user account and an administrator account.

Disable-LocalUser Ignis

Identify the cmdlet that can be used to temporarily prevent users from signing in using the account name Ignis without deleting it.

Data protection

Identify the default settings that can be used to control the methods used for encryption in IPSec connections.

No authentication

Identify the network security type commonly used by public Wi-Fi networks.

The computers could not contact the DHCP server.

Lara works as a system administrator in a small start-up. The computers in her office are configured to use dynamic IP configuration. One day, the computers had intermittent Internet access, and as the administrator, she was trying to troubleshoot the issue. While the computers could not access the Internet, they were able to communicate with each another. Upon investigating, it was noted that the computers were connected to the 169.274.0.0/16 network. What do you think caused the connectivity issue?

The computers were assigned link-local unicast addresses.

Martha sets up a local peer-to-peer network at her home office. She has five Windows 10 computers connected to the network. The computers were not able to access the Internet. Upon troubleshooting, she noticed that the packets sent from the computers were blocked by an IPv6-aware router; however, she was able to send ping requests from one computer to another. Identify the issue with the network configuration.

Wi-Fi and Bluetooth are disabled on the laptop.

Mika is on a flight to visit her parents. Before the takeoff, she is instructed to turn off her devices or put them in Airplane mode. After she gets off the flight and enters the airport, she notices that her Windows 10 laptop does not detect the public network. What do you think is preventing the laptop from connecting to the network?

Isolation

Millie works as a network administrator in a multinational company. She configures security rules that use IPSec to authenticate the communication between computers connected in the company's network. She configures the firewall such that outbound connections are allowed only with those computers that can be authenticated. Which of the following rule types has she used?

Right-click on the user account to rename it

One of your friends, Steve, wants to rename a local user account using the Computer Management Administrative Tool. He opens the properties window; however, he does not find any option to rename the user account. What should he do instead?

His mobile device was within the range of the computer.

Ricky enables dynamic lock authentication on his computer using his mobile device. He walks around his cubicle without locking his computer. When he returns to his seat, he notices that the computer did not automatically lock the screen. Why do you think this happened?

Protocols

Rules for communicating across a network that define how much data can be sent and the format of that data is known as which of the following?

Everyone

The Guest account derives all of its privileges from being a member of the Guests group and which other group?

ICS

The two most common mechanisms for sharing an IP address are a router or which of the following?

A unique pattern

What does Windows Hello store when biometric authentication is being configured?

A domain network

When Windows 10 can communicate with a domain controller, the network connection is automatically placed in which location category?

tracert

Which IP utility is used to display response times for every router on the path to the destination?

Fast user switching

Which Windows 10 feature ensures that a second user can sign in to a locked computer without signing out the first user and losing their work?

QoS Packet Scheduler

Which Windows 10 service controls the flow of network traffic?

It can be renamed.

Which of the following statements is not true of the Administrator account?

Member of

Which of the following tabs in the properties window of a user account can be used to add the user account to a group?

A public profile

Which profile is different from other profiles because it is not a complete profile?

Users

You have created accounts for five people on a Windows 10 computer. They are able to sign in, work on files, and save them; however, they are not able to install new software on the computer. Which of the following groups do these accounts belong to?

The credentials are cached in Windows 10.

You use your domain account to sign in to your devices when you are within the premises of your organization. However, you can use the same credentials to sign in even when you have no access to the domain. How is this possible?

Check the existing IPv6 settings.

Computers in your organization are facing network connectivity issues. As a network administrator, you are tasked with troubleshooting the issue. Several colleagues had complained that they were not able to communicate with a remote host outside the local network. Which of the following actions would you first take?

APIPA

If Windows 10 is configured to use dynamic IP configuration and is unable to contact a DHCP server, the default action is to use which type of address?

Sysprep

In Windows 10, the only supported method to configure the default profile is to use which utility?

Shift

In order to stop the automatic sign-in from occurring, which key should be held down during the boot process?

To protect the computer against malware

In your organization, employees are made to press Ctrl + Alt + Delete before signing into a Windows 10 computer. Identify one reason why your organization may be enforcing this sign-in method.

She is using a security key.

Joanna uses a USB device to sign in to her Office 365 account. She can plug in the device on any computer with an Internet connection. However, in addition to the USB device she must also use a PIN for authentication. Identify the authentication method used by Joanna.

Miguel2

Joshua, a systems administrator, is configuring new Windows 10 laptops. He is creating new local users on each laptop. He realizes that two users have the same name, Miguel. He uses the name Miguel for one user. Which of the following is a valid user name that he can create for the second user?

Disable the account

Martha works as a systems administrator in a multinational corporation. One of her colleagues is going on a sabbatical for six months. Martha must ensure that no one uses the colleague's user account until he returns. Which of the following actions can she take to ensure this?

DHCP

Which of the following is an automated mechanism used to assign IP addresses, subnet masks, default gateways, DNS servers, WINS servers, and other IP configuration information to network devices?

It indicates that those options are restricted to administrative users.

Some options in the User Accounts applet has a shield displayed beside them. What does this indicate?

Hotspot 2.0 technology

SpeedNet is an Internet service provider. It provides Wi-Fi services to its subscribers at several cafes, restaurants, and other public places. When a subscriber moves from one place to another, the subscriber's Windows 10 laptop can automatically detect the network and connect to it. Which of the following is the company using to offer wireless connectivity?

TCP/IPv6

Which of the following is an updated version of TCP/IPv4 with a larger address space and additional features?

The public profile

The Windows 10 computers in your office are configured such that the files saved in the Documents folder can be viewed and edited by students singing in using different user accounts. The documents are visible in the Documents folder of each user. Which of the following user profiles does this configuration demonstrate?

A network driver

Which of the following is responsible for enabling communications between Windows 10 and the network device(s) in your computer?

/24

Which of the following is the CIDR notation of 255.255.255.0?

Secure sign-in

Which of the following is used to protect your computer from malware that may attempt to steal your password?

The Dynamic Host Configuration Protocol

Which of the following obtains IP configuration information when you connect a Windows 10 computer to a cable modem?

Guest

Which account has extremely limited access to resources and computer activities and is intended for occasional use by low-security users?

Administrator

Which account is the most powerful local user account possible?

Select the network in Wi-Fi settings and click Forget.

You have connected your smartphone to your home network to access the Internet. After few hours of browsing, you notice connectivity issues in your smartphone. Your friends suggest that you try resetting the network connection. Which of the following actions will you take?

A roaming profile

As a systems administrator, you are asked to set up an infrastructure that would allow employees to use any computer, and the files that a user stores on one computer should be available on any other computer that he or she signs into. Which of the following user profiles will you configure for the user accounts?

Get-NetFirewallRule

Assume that you work as a network administrator. A colleague approaches you with an issue that he is not able to access the company's services on the server. After troubleshooting, you identify the firewall as a possible cause for the issue. To confirm this, you need to verify the firewall configuration in your colleague's computer. Which of the following cmdlets will you use for this purpose?

Check if the wireless radio on her computer is turned on

Karen has installed a new router for her home network. She connects her Windows 10 computer and smartphone to the Wi-Fi to access the Internet. The next day, when she tries connecting to the Internet, she gets the error message "Check your Internet connection and try again." Which of the following should Karen do first to troubleshoot the issue?

Performance Monitor Users

Members of which group are able to monitor performance counters on the computer, but cannot access performance logs?

Performance Log Users

Members of which of the following groups are able to monitor performance counters and access performance logs on the computer?

Backup Operators

Members of which of the following groups can back up and restore all files and folders on the computer?

The user account she used must have been assigned a mandatory profile.

Nazreen, a media analyst, works on a backup computer as her laptop is corrupted. She saves her documents on the desktop and signs out. When she signs in the next day, she is shocked to see that all her files are gone. Why do you think her files were lost?

The network location awareness service in Sasha's laptop has been disabled.

Sasha is freelance graphic designer. She often works out of a café close to her house. The café provides free network connection for regular customers. When she tries to connect to the network using her Windows 10 laptop, she is prompted to confirm if she wants to make her laptop visible on the network. Assuming this is not the first time Sasha is connecting to the network, why do you think Windows 10 prompts her with this query?

A private network

Which location type is used when a computer is connected as part of a peer-to-peer network in a trusted location?

A public network

Which location type is used when a computer is connected in an untrusted public location, such as an airport?

An initial account

Which of the following accounts will you create during the installation of Windows 10?

Enter a PIN on the sign-in screen.

Which of the following actions will you perform on the Windows sign-in screen if your organization uses a virtual smart card for authentication?

Internet connection sharing

Which of the following allows a Windows 10 computer to act as a router to other computers?

Network location awareness

Which of the following allows you to configure the security settings for each location type differently?

A user account

Which of the following are required for individuals to sign in to Windows 10 and use resources on the computer?

A fingerprint reader

Which of the following can be used in an advanced authentication method?

Automatic assignment

Which of the following can be used to configure a dynamic IPv4 address in a Windows 10 computer?

Rename-LocalUser

Which of the following cmdlets can be used to change the user account Lea to Leahona?

New-LocalUser

Which of the following cmdlets will you use to create local users using Windows PowerShell?

ping

Which of the following commands will you use if you are asked to check the connectivity between two Windows 10 computers connected to a local network?

ping 192.168.1.100 -n

Which of the following commands will you use to check the basic connectivity between your computer and a computer with the IP address 192.168.1.100? You need to send a minimum of six requests.

A group policy setting is used to update the settings of all computers in the network.

Which of the following illustrates the use of a domain network?

Facial recognition

Which of the following is a biometric authentication method supported by Windows Hello?

netsh

Which of the following is a command-line utility that can be used to display, change, add, and delete network configuration settings on a computer, including basic and advanced settings?

A mandatory profile

Which of the following is a profile that cannot be modified?

Using Wi-Fi Sense

Which of the following ways of configuring a wireless network enables users to share the connection settings with Facebook contacts?

A roaming profile

Which profile is stored in a network location rather than on the local hard drive?

The default profile

Which profile is used when new user profiles are created?

TCP/IP

Which protocol is included with Windows 10 for network communication?

Link-Layer Topology Discovery Mapper I/O Driver

Which protocol is responsible for discovering network devices on the network, such as computers and routers?

Link-Layer Topology Discovery Responder

Which protocol is responsible for responding to discovery requests from other computers?

peer-to-peer

Which type of network consists of multiple Windows computers that share information, but no computer on the network serves as an authoritative source of user information?

Domain name server resolution

Xervent Corp. uses the domain name "www.Xervent.com" and the IP address 172.225.120.40 to provide employees access to its services. Several employees report intermittent connectivity issues. When the network administrator troubleshoots the issue, the communication to the remote host works with the IP address but fails when the name is used. Identify the cause of the connectivity issue.


Related study sets

Abnormal Psychology Chapters 10-15 Multiple Choice

View Set

U.S. Presidents (in order) last names only

View Set

final exam- the ear and hearing and equilibrium

View Set

Chapter 7: Incremental Analysis for Short Term Decision Making

View Set

Module 1-8 Investigating MIS, Ethics and Privacy Concerns, Competitive Advantage, Cybersecurity, Social Media Marketing, Databases, Computer Networks and the Internet, Data Analytics,

View Set

ИКТ ДЖИГИ ЕБАЛЬНИЧКИ СМЕЛО 100 АЛАМЫЗ

View Set

Ch. 1 - Introduction to Employee Training and Development

View Set