windows/ windows server
networking protocols
hardware**
n-central/ cove
365
100

use this command to renew the IP address of a windows computer

what is "ipconfig /renew"?

100
this protocol is used for resolving domain names to IP addresses

what is DNS (Domain Name System) ?

100

one stores data permanently and is non-volatile, the other stores data temporarily and is volatile.

What is the difference between a HDD/SSD and RAM?

100

This is where you should look if you have installed the windows agent on a device but dont see it in the list of devices.

what is asset discovery?

100

this is how you would assign or remove license to a user's account

what is logging into the 365 admin center, going to users > active users > selecting user and clicking the check box with the license you want to assign.

200
Logs of system events can be found and displayed here.

what is event viewer?

200

This networking protocol dynamicaly assigns IP addresses to devices on a network

what is DHCP (Dynamic Host Configuration Protocol)?

200

this is the primary function of a network firewall?

what device monitors and controls incoming and outgoing traffic based on predetermined security rules?

200

these are the steps to schedule a task to execute a script or automation policy on a remote device.

what is...

1. select device from list 

2. then click add task select 'run a script' or 'run an automation policy'

3. select which script or automation policy you want to run from the drop down

4. go to the schedule tab and from the drop down select 'once' or 'recurring'

5. specify the time(s) you would like the task to run

6. click save

??

200

this is what you must do to convert a deactivated user's mailbox to a shared mailbox.

if the user has already had their licenses removed you must first add a license back to the account then go into the exchange admin center > mailboxes. then select the user and click "convert to shared mailbox" once the mailbox has been converted you can remove the license.

300

This windows server feature allows you to run a virtualized instance of another operating system.

what is hyper-V?

300

this protocol is responsible for sending an receiving email messages

what is smtp (simple mail transfer protocol)?

300

these are the 7 layers of the OSI model

what are...

  • #1. The Physical Layer.
  • #2. The Data Link Layer.
  • #3. The Network Layer.
  • #4. The Transport Layer.
  • #5. The Session Layer.
  • #6. The Presentation Layer.
  • #7. The Application Layer.

?

300

this is what you should do when a system state back up fails and gives the error message "There is no data available for the backup..."

Restart the VSS service on the device and run a manual system state backup.

300

this is where you would go look after you suspect a bad guy may have had access to your 365 environment.

what are office 365 audit logs, forwarding rules, sign-in logs, threat intelligence dashboard ?

400

Configuration settings and options for the operating system and installed applications are stored here.

what is Windows Registry?

400

this is often used to limit access to specific users and devices in a network by dividing the network into isolated segments.

what are VLANs?

400

This level RAID combines mirroring and striping for added performance and redundacy.

what is RAID 10

400
These are the steps one would take to use a custom property to override the sentinel one installer.

what is...

go to the device you do not want sentinel one to be installed on > settings > custom properties. Then on the custom property named "S1 EDR - Device Override" select "Enabled" from the drop down.

??

400

this is where you would go to register an application to use SSO

what is logging into the admin center > Browsing to entra > Identity > applications > app registrations. and clicking new registration.

500
This device manages security authentication requests, enforces security polcies, and maintains the Active directory database.

what is a domain controller?

500

this protocol is used to securely transmit files over a network.

what is SFTP (ssh file transfer protocol)?

500

this is the order of the wires t568b wiring standard

what is...

orange stripe,

orange,

green stripe, 

blue stripe, 

blue, 

green, 

brown stripe, 

brown

??

500

Filters in N-central can be used to discover that this TSTS employee has the most games installed on their work laptop.

who is Justin Nichols?

500
These are the steps to set up an application deployment policy in intune.

what is...

1. sign into endpoint manager

2. click "add" and then provide necessary details ofapplication such as installer files

3. specify deployment details (do you want to install or uninstall)

4. go to assignments and select the devices/groups of devices

5. configure deployment settings (available or required)

6. review and save configuration.

7. monitor deployment status.

??

M
e
n
u