Managing Windows Networking
Troubleshoot Windows Networking
Configure Windows Security Settings
Manage Windows Shares
Other
100

An encrypted "tunnel" between two networks over the internet.

What is a Virtual Private Network (VPN)?

100

A command line utility to test whether an IP address or a domain is reachable.

What is ping?

100

A system where the user must submit at least two different types of credentials.

What is Multi-Factor Authentication?

100

A fleet of computers that are grouped together for security and centralized administration.

What is a domain?

100

A security manager reviews roles and grants the minimum necessary permissions. The security manager implemented ____.

What is Least Privilege?

200

A type of server that forwards traffic from a local network to the internet, providing performance and security benefits.

What is a Proxy?

200

Automatic Private IP Addresses always begin with ___.

What is 169.254?

200

____ controls like fences, doors, and locks control access to sites, ____ controls like management oversight are applied and enforced by people, and ____ controls like antivirus and firewalls are applied by digital systems and software.

What are physical, procedural, and logical controls?

200

A folder or even a drive on a computer that can be accessed by different devices across the network.

What is a File Share?
200

A security engineer investigates legacy applications and employees that are still using them. Which of the following user groups represent a security concern?

What is Power Users?

300

The type of firewall that Windows Defender would be considered.

What is a host firewall?

300

A command line utility to see the path that a packet takes to its destination.

What is tracert?

300

A class of software designed to apply security policies to mobile devices in the enterprise.

What is Mobile Device Management?

300

A computer that hosts file shares.

What is a File Server?

300

A server administrator sets up static network configurations for servers since they do not want the IP address to change. The administrator sets up the IP address on a 24-bit subnet. What should the administrator set the subnet mask to?

What is 255.255.255.0?

400

The number of bits in an IPv4 address vs and IPv6 address.

What is 32 bits versus 128 bits.

400

A command line tool used to troubleshoot issues with port forwarding by determining if ports are open

What is netstat?

400

A ____ is a way of dividing up a domain into administrative realms.

What is an Organizational Unit?

400

A command that lets you display a list of servers on your local network.

What is net view?

400

An administrator sets up a network share for the marketing team to collaborate. The requirement is to protect the files from a user who has local access to the computer that hosts the shared resource. What type of permission should the administrator set up?

What is NTFS?

500

Applet where network adapters can be configured.

What is the Network Connections applet (ncpa.cpl)?

500

Command line tool used to query DNS records.

What is nslookup?

500

A server configured as a _____ stores a database of network information called Active Directory.

What is a domain controller?

500

The two ways to share files on Windows (not the command line).

What are File Shares and NTFS permissions?

500

A hacker looks to harvest credentials from users who log in locally. Where should the penetration tester look for users who authenticated locally?

What is the Security Accounts Manager (SAM)?