What is the format of an IPV4 address?
An IPv4 address consist of four octets, usually shown individually as a series of decimal values ranging from 0 to 255, each separated by a dot.
How does IPv6 support differ on various Microsoft operating systems?
2003/XP use dual stack where IPv4 and IPv6 are separate protocols. 2008 uses dual architecture protocol stack that use common transport layers.
By default, which type of traffic is allowed through the firewall?
Outbound
How does switch-dependent mode differ from switch-independent mode?
Switch-dependent mode requires all network adapters to be connected to the same switch
In switch-independent mode, each adapter is connected to a different switch. Switch- independent mode provides fault tolerance.
You run a custom application on a Windows server. You want to configure the firewall to allow the application to use a specific port but restrict access to only Wrk1 and Wrk2.
How can you make the change using the least amount of effort possible?
A. In Windows Firewall with Advanced Security, add an inbound rule. Edit the scope for the rule and use the keyword Workstation.
B. In Windows Firewall with Advanced Security, add a outbound port rule and edit the scope.
C. In Windows Firewall with Advanced Security, add an inbound rule. Require only secure connections for the rule and add the users to the list of authorized users.
D. In Windows Firewall with Advanced Security, add an inbound rule. Require only secure connections for the rule and add the computers to the list of authorized computers.
D. In Windows Firewall with Advanced Security, add an inbound rule. Require only secure connections for the rule and add the computers to the list of authorized computers.
What is the purpose of a subnet mask?
A subnet mask is used to divide an IP address into two parts.
What limitations are associated with ISATAP in an IPv6 implementation?
Does not work through NAT. requires ISATAP compatible router
What is the benefit of using connection security rules?
Prevent man in the middle attack and ensure data is encrypted/going to the right destination
What are some advantages of NIC teaming?
More aggregate bandwidth, Fault tolerance, Load Balancing and Failover (LBFO),
To configure an exception for use by only specific users, use Windows _______________.
Windows Firewall with Advanced Security
What is the default address class of the IP address 132.11.166.5?
Class B
Which IPv6 tunneling methods work through NAT?
Manually configured tunnel. Teredo. 6-to-4 tunneling
What does a policy file do?
A POLICY file is a configuration file used by Java Runtime Environment (JRE) and Java SE Development Kit (JDK) to determine the granted permissions for each Java program
What does hashing do?
Hashing is an algorithm that calculates a fixed-size bit string value from a file.
You are configuring a NIC team on a Windows Server system using two physical network adapters in the system. You want the new team to aggregate the throughput of both network adapters to increase performance.
You want to configure the team such that all packets from the same stream are sent to the same network adapter in the team.
From the drop-down list, select the load balancing mode you need to choose to implement this configuration.
- Address Hash
- Address Hash
- Hyper-V Port Dynamic
Hyper-V Port
What is the decimal equivalent of the IP address 132.11.166.5?
5
What technology allows an IPv4-only host to communicate with an IPv6-only host?
PortProxy
How do connection security rules differ from firewall rules?
Unlike firewall rules, which operate unilaterally, connection security rules require that both communicating computers have a policy with connection security rules or another compatible IPsec policy. Connection security rules use IPsec to securetraffic while it crosses the network.
What are benefits of a Hyper-V switch port?
The advantage to this method is that the switch balances the traffic based on the MAC address for the virtual machine.
You are configuring NIC Teaming on a Windows Server system using four physical network adapters. Each network adapter is connected to a different network switch.
You want to configure the team to provide both load balancing and failover protection. You want the day-to-day network load to be balanced between the first three network interfaces. You want to use the fourth network adapter as a failover adapter so that it can immediately take over if one of the other adapters in the team fails.
From the drop-down list, select the standby adapter option you need to choose to implement this configuration.
Ethernet3
- None (adapters Active) Ethernet0
- Ethernet1
Ethernet2
Ethernet3
Ethernet 3
Define these terms:
Supernetting
Classless Addressing
ANDing
Supernetting: The process of dividing a large network into smaller networks. When you subnet a network, each network segment, or subnet, has a different network address, or subnet address.
Classless Addressing: Using custom subnet masks is often called classless addressing because the subnet mask Addressing cannot be inferred simply from the class of a given IP address.
ANDing: ANDing refers to performing a logical AND comparison. ANDing is used to determine the network address of a classless IP address. When determining network addresses, you convert the IP address and the subnet mask to their binary equivalents and compare each bit. The result is 1 when both numbers being compared are 1.
When you want to use IPV6 over IPV4 through a NAT
Define these terms:
Firewall
Network Location Awareness (NLA)
Firewall: A device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Using these rules you create a system to prevent unauthorized access to or from a private network.
Network Location Awareness: This is a Windows feature that enables a user to assign a specific network profile to a particular network connection based upon the type of connection.
Define these terms:
NIC
Hyper-V
NIC: A network interface card (NIC) in a computer allows the computer to connect to a computer network. A NIC is also known by other terms, such as a network adapter and LAN adapter.
Hyper-V: Hyper-V is the virtualization platform that is included in the applicable Windows operating system, V such as Windows 10 and Windows Server 2016.
You manage a network with all Windows clients. As part of your IPv6 migration strategy, you have implemented ISATAP on your network.
You would like to test the communication of a client computer using ISATAP. What should you do?
A. Ping the address beginning with ::FFFF
B. Ping the address beginning with 2002:
C. Ping the address beginning with FE80:
D. Ping the address beginning with 2001:
C. Ping the address beginning with FE80: