• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/322

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

322 Cards in this Set

  • Front
  • Back
What does a file screen do?
prevents storage of particular files within folders
What are the 3 configuration settings for file screens?
file groups
Within file screens
what are file groups?
What does active screening do within file screens?
prevents saving files to the specified folder
What does passive screening do within file screens?
reports when someone saves a restricted file within the specified folder
What is print pooling?
configuring a single printer object to print to multiple devices
Which encryption system encrypts full volumes
EFS or BitLocker?
Which encryption system encrypts individual files and folders
EFS or BitLocker?
What happens if an unencrypted file is moved to an EFS-encrypted folder?
the file is encrypted
What happens if an EFS-encrypted file is moved to an unencrypted folder?
it remains encrypted
What security risk exists in transferring EFS-encrypted files?
the files are not encrypted during transfer
What command-line command can be used to encrypt and decrypt files and folders with EFS?
cipher.exe
Who controls encryption with EFS?
the individual user
Within file screens, what are file groups?
groups of files that should belong or not belong to a group
Which encryption system encrypts full volumes, EFS or BitLocker?
BitLocker
Which encryption system encrypts individual files and folders, EFS or BitLocker?
EFS
What are the 3 firewall actions?
block, allow, and secure
How are outbound connections handled by default by Windows Firewall?
they are not filtered by default
How are inbound connections handled by default by Windows Firewall?
they are blocked by default
What command-line command will show what applications are listening for incoming connections?
netstat -a -b
What does Network Access Protection do?
connects hosts to different network resources based on current health state
What are the 4 NAP enforcement types?
IPSec connection security, 802.1x access points, VPN servers, and DHCP servers
What additional component is required for IPSec connection security?
Certificate Services
What two methods can 802.1x used to control access levels?
access control list (ACL) or VLAN
What advantage do ACL's have as an 802.1x enforcement method?
non-compliant machines can't communicate amongst themselves
How does DHCP Server Enforcement prevent unauthorized network access?
only compliant machines are issued IP addresses
What subnet mask is granted to non-compliant machines when using DHCP Server Enforcement?
255.255.255.255
How does DHCP Server Enforcement handle non-compliant hosts?
they are given host routes for resources to become compliant
In IPSec, what do connection security rules do?
configure IPSec settings between computers
What protocol does IPSec Transport Mode use to create a tunnel?
L2TP
When should IPSec Tunnel Mode be used?
when a VPN gateway isn't compatible with IPSec/L2TP
What range of addresses does ICS use?
192.168.0.0/24
What IP address does ICS assign to the internal adapter?
192.168.0.1
What two roles does an ICS computer play for clients sharing that connection?
default gateway and primary DNS server
What two types of WPA does Microsoft support?
WPA-PSK and WPA-EAP
What does WPA-EAP require that WPA-PSK does not?
certificates
What component provides RADIUS services for Windows?
Network Policy Server (NPS)
Where is the RADIUS log file stored?
%systemroot%system32Log Files
How is the RADIUS log file named?
IN<date>.log</date>
Which Event Viewer log holds RADIUS events?
the Security log
What 3 VPN technologies are supported by 2008 and Vista?
Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP), and Secure Socket Tunneling Protocol (SSTP)
What protocol do Microsoft VPN protocols use for user authentication?
PPP
What protocol does PPTP use for data encryption?
Microsoft Point-to-Point Encryption (MPPE)
What protocol does L2TP use for computer and data authentication and encryption?
IPSec
Which VPN technologies require computer certificates?
L2TP and SSTP
What protocol does SSTP use for data authentication and encryption?
SSL
What advantage does SSTP have over other VPN technologies?
it can pass most NATs, firewalls, and proxies
What Event Log are VPN connection events added to?
the System log
What are the 3 default Windows Firewall profiles?
public, private, and domain
What are the 4 Windows Firewall rule types?
Program (allow/block connections based on executable), Port, Predefined (Windows component), and Custom
What happens to a link-local address after a machine obtains a routable address?
it is added as a secondary address
What is a zone ID?
an ID appended to a link-local address to identify the interface
What format does a zone ID take?
%<zoneid></zoneid>
What IPv4 address are analagous to an IPv6 global address?
IPv4 public address
What IPv6 address is analagous to an IPv4 public address?
IPv6 global address
What IPv4 address is analgous to an IPv6 link-local address?
IPv4 APIPA address
What IPv6 address is analagous to an IPv4 APIPA address?
IPv6 link-local address
What IPv4 address is analagous to an IPv6 unique local address?
IPv4 private address
What IPv6 address is analogous to an IPv4 private address?
IPv6 unique local address
How do IPv6 hosts confirm tentative addresses?
by broadcasting a Neighbor Solicitation message
What is an IPv6 preferred address?
a valid IPv6 address within its valid lifetime
What is an IPv6 deprecated address?
a valid IPv6 address that has exceeded its lifetime
How is the IPv6 loopback address?
::1
What IPv6 protocol should generally be used for intranets?
ISATAP
What IPv6 protocol is generally used to communicate across the internet?
6to4
What IPv6 protocol should be used if an endpoint is protected by an IPv4 NAT?
Teredo
Which IPv6 transition protocol should only be used if others won't work?
Teredo
What are the 4 parts of a Teredo infrastructure?
Teredo client, Teredo server, Teredo relay and Teredo host-specific relay
What is a Teredo server?
a public server connected to both the IPv4 and IPv6 internets
What does a Teredo server do?
helps Teredo clients with address configuration and facilitates initial communication between clients
What is a Teredo relay?
an IPv4/v6 router that acts as a tunnel endpoint
What does a Teredo relay do?
forwards packets between the IPv4 and IPv6 internets
What is a Teredo host-specific relay?
a host enabled with IPv4 and IPv6 that acts as its own Teredo relay
How is Teredo host-specific relay functionality enabled in Vista and 2008?
it is automatically enabled if the host has a global address
What OS's can use Link Local Multicast Name Resolution (LLMNR)?
Vista/2008
What does Link Local Multicast Name Resolution (LLMNR) do?
uses multicasting to resolve IPv6 names on the local subnet
What network tool does Link Local Multicast Name Resolution require?
Network Discovery
Which is simpler to configure, LLMNR or NetBIOS?
LLMNR
What local name resolution protocol is IPv6-compatible?
Link-Local Multicast Name Resolution (LLMNR)
Which service is smaller, LLMNR or NetBIOS?
LLMNR
Which protocol can resolve hostnames for legacy hosts, LLMNR or NetBIOS?
NetBIOS
What protocol is used to map hostnames to IPv4 addresses?
NetBIOS
What order are name resolution protocols used in to resolve a name?
DNS, LLMNR, and then NetBIOS
How can you determine in ping if DNS was used to resolve an address?
it will have the domain name appended to the host name
How can you determine in ping if LLMNR was used to resolve an address?
it will display an IPv6 address
How can you determine in ping if NetBIOS was used to resolve a name?
it will display the host name but no domain name
What 3 methods does NetBIOS use for name resolution?
broadcasts, WINS, and Lmhosts file
What is WINS?
a server-based directory with NetBIOS name-to-IP mappings
What is the Lmhosts file?
a local file with NetBIOS-to-IP mappings
Where is the Lmhosts file located?
%SystemRoot% System32 Drivers Etc
How is the Lmhosts file created?
it must be manually created
What are the 4 NetBIOS node types?
broadcast (b-node), point-to-point (p-node), mixed (m-node), and hybrid (h-node)
How does the NetBIOS b-node work?
by using broadcasts on the local subnet
What limitation does NetBIOS b-node have?
it only works on the local subnet
How does the NetBIOS p-node work?
NetBIOS queries a WINS server
How does the NetBIOS m-node work?
uses broadcasts first, then queries WINS
How does the NetBIOS h-node work?
uses WINS queries first, then Lmhosts, then broadcasts
What NetBIOS mode do Windows clients use by default?
h-node
What does IPv6 use for DNS host records?
AAAA (quad-A) records
What 3 pieces of information are contained in DNS queries?
FQDN, resource record type (query type), and specified class
How is the Hosts file used?
the DNS Client service loads it into the cache when the service starts or the Hosts file is updated
Where is the root hints file stored?
WINDOWS System32 DNS Cache.dns
What is the default TTL for DNS records?
1 hour
What additional file is needed when installing DNS on Server Core without AD DS?
an unattended answer file
How can DNS servers in child domains be configured to resolve names for parent domains?
configure DNS servers to forward queries to DNS servers in the forest root domain
What is conditional forwarding?
forwarding queries for a particular domain to specific DNS servers
Why might you use conditional forwarding?
if 2 private networks merge, etc.
What DHCP scope sets a DNS server?
006: DNS Server
What are the 2 functions of a client's primary DNS suffix?
it allows hosts to register its host record in that DNS zone, and adds the suffix to DNS queries that don't have a suffix
When does a host automatically receive a primary DNS suffix?
when it is joined to a domain
What DHCP scope sets a connection-specific suffix?
015 DNS Domain Name
What does configuring a DNS suffix search list do?
allows users to search for host names in more than one DNS domain
What is the default search order in regards to DNS suffixes?
hostname.primary DNS suffix, hostname.connection-specific suffix, hostname.parent suffix
What requirement in regards to DNS suffixes exists for clients to perform dynamic DNS updates?
the client must have a primary or connection-specific DNS suffix that matches a primary zone of the preferred DNS server
What command will force a client to attempt dynamic DNS registration?
ipconfig /registerdns
What command will show the DNS client cache?
ipconfig /displaydns
What command will clear a client's DNS cache?
ipconfig /flushdns
What system was created to replace WINS?
GlobalNames Zone
What does GlobalNames do?
allows DNS to resolve single-label names
What command will show all the zones on a DNS server?
dnscmd /enumzones
What command-line command is used to add a zone to a DNS server?
dnscmd /zoneadd
What command-line command is used to display zone records?
dnscmd /ZonePrint
What command configures a DNS server to allow or disallow dynamic updates?
dnscmd /allowupdates
How is a DNS server configured to be caching-only?
do not configure any zones for it
How long does DNS store addresses in its cache?
24 hours
What is the DHCP scope for a DNS server?
006 DNS Server
What are the two functions of a client's primary DNS suffix?
allows the host to register in that DNS zone, and appends the suffix to queries where a suffix isn't listed
What is the DHCP scope for a DNS domain name?
015 DNS Domain Name
What is the default search order for hosts and DNS suffixes?
hostname.primary_dns_suffix, hostname.connection-specific_suffix, hostname.parent_suffix
Why is it important that a host's primary DNS suffix match the name of a primary zone hosted by its preferred DNS server?
it is necessary so the host can register its address in the database
What command will force a client to attempt to register its DNS address?
ipconfig /registerdns
What command is used to enable GlobalNames support on a DNS server?
dnscmd /config /enableglobalnamesupport 1
What types of DNS zones can be stored in Active Directory?
primary and stub zones
What is the default name for locally-stored primary DNS zone files?
<zone_name>.dns</zone_name>
Where are locally-stored primary DNS zone files stored by default?
%systemroot%system32DNS
What type of zones can secondary DNS servers get data from?
primary or secondary servers
What is the source of DNS data for a secondary DNS server called?
the master
In a delegated DNS environment, what are stub zones often used for?
helping a parent zone keep an updated list of name servers for child zones
What records will DNS clients with static addresses attempt to update?
both host and pointer records
What records will DNS clients with dynamic addresses attempt to update?
host records only (DHCP server updates pointers)
What restrictions does enabling secure updates on DNS create?
only AD domain members may update records, and only from the computer that originated the registration
What is a secondary server refresh interval?
the amount of time a secondary server waits before querying the master server for an update
What is the default secondary server refresh interval?
15 minutes
What is the secondary server retry interval?
how long a secondary server waits before retrying a failed transfer
What is the default secondary server retry interval?
10 minutes
What is the Expires After value for a secondary DNS server?
how long a secondary server will continue to answer queries without contact with a master
What is the default Expires After value for a secondary DNS server?
1 day
In DNS, what does the Minimum (Default) TTL value do?
sets the default TTL for all records
What is the length of the Minimum (Default) TTL?
1 hour
What DNS servers make use of the Minimum (Default) TTL value?
only secondary servers--primary servers automatically know when the value changes
How does DNS handle multiple MX records?
records with the lower preference are tried first
What is the no-refresh DNS interval?
the period following a timestamp when a zone or server will refuse a timestamp refresh
What is the refresh DNS interval?
the period following the no-refresh interval when timestamp refreshes are accepted and the record will not be scavenged
What are the default refresh and no-refresh intervals?
7 days
What are the 3 steps in creating the GlobalNames zone?
enable GlobalNames zone support, create the GlobalNames zone, and populate the zone
What command is used to enable GlobalNames zone support?
dnscmd /config /enableglobalnamessupport 1
How should the GlobalNames zone be configured?
as a FLZ called GlobalNames replicated to the forest
What is zone replication?
the synchronization of data for AD-integrated DNS zones
What are zone transfers?
the synchronization of data between master and secondary DNS servers
What partition should DNS data be stored in to replicate it to Windows 2000 DNS servers?
domain partition (replicated to all DC's)
What permissions are required to create an application directory partition?
Enterprise Administrator
What does the Reload option for secondary DNS zones do?
reloads the zone from local storage
What does the Transfer from Master option for secondary DNS zones do?
initiates a zone transfer if the SOA has expired
What does the Reload From Master option for secondary DNS zones do?
initiates a zone transfer regardless of the status of the SOA
What are the two methods of updating routing tables?
dynamic and static routing
What are the 3 ways to use routing to send data over a network?
unicasting, multicasting, and broadcasting
What sort of address is used for multicasting?
a Class D address
What is the address range of a Class D address?
224-239
What is demand-dial routing?
routing along non-permanent routes (ISDN, PPP, etc.)
What are the 2 states of a demand-dial interface?
connected and disconnected
What are the 2 types of connections that can be made on a demand-dial interface?
on-demand connections and persistent connections
What is a connection establishment delay?
the length of time it takes to set up a demand-dial connection
What sort of routing do on-demand connections use?
static routing
What sort of routing do persistent connections use?
dynamic routing
What requirement does dynamic routing have that static routing does not?
all routers have to use the same routing protocol
What are the 2 most common routing protocols?
RIP and OSPF
What are the 2 components of a dynamic routing protocol?
the routing protocol and the routing algorithm
What are the 2 most common types of routing protocols?
distance vector and link state
What type of routing algorithm is RIP?
distance vector
What type of routing algorithm is OSPF?
link state
What does RIP use to determine a route?
hop count
How many hops will RIP support?
up to 15 hops
What type of routing protocols should be used if using CIDR?
distance vector routing protocols
What type of routing protocols should be used if using multicasting to update routing tables?
distance vector routing protocols
What type of routing protocols should be used if simple password authentication is being used between routers?
distance vector routing protocols
How does an OSPF router advertise its presence?
it sends hello packets to neighbors on power up
What type of routing protocol provides faster convergence?
link state routing protocols
What does OSPF advertise instead of advertising all routes?
changes
What type of routing protocol should be used if route changes are frequent?
link state routing protocols
What type of routing protocol should be used if the network includes redundant paths?
link state routing protocols
What type of routing protocol should be used if there are more than 50 subnets in the internetwork?
link state routing protocols
What type of routing protocol should be used if you want to assign specific costs to routes?
link state routing protocols
When should RIPv2 broadcasts be used as the RIP outgoing protocol?
if there are RIPv1 routers on the network
When should RIPv2 multicasts be used as the RIP outgoing protocol?
when there are only RIPv2 routers or it is a demand-dial interface
When should RIP v1 and v2 be used as the RIP incoming protocol?
when there are both RIP v1 and v2 routers on the network
When should RIP v2 only be used as the RIP incoming protocol?
if there are only v2 routers or it is a demand-dial interface
How is the default route designated in a routing table?
0.0.0.0
What subnet mask do host routes in a routing table have?
255.255.255.255
In a routing table, what does a gateway entry represent?
the IP address of the next router in a route
In a routing table, what does a metric represent?
the relative cost of a route
In a routing table, which is better, a high metric or a low metric?
low metric
What are the two types of routes in a routing table?
temporary and persistent
What command will display the routing table?
route print
What command is used to add a route to a routing table?
route add
What command is used to delete a route from a routing table?
route delete
What command is used to modify a route in a routing table?
route change
What command is used to add a persistent route to a routing table?
route -p add
What command is used to display the IPv6 routing table?
route print -6
How do IPv6 routers advertise their presence and autoconfiguration information to other subnet hosts?
by sending Router Advertisement messages
What OSI layer does IPSec operate at?
the Network layer
How many IPSec policies can be configured on a computer?
only one--but the policy can have multiple rules
What are the two IPSec modes (not security association modes)?
main mode and quick mode
What are the 3 main mode authentication methods for IPSec filter rules?
preshared keys, digital certificates, and Kerberos v5
Where are preshared IPSec keys stored?
in the registry
What limitation exists for using Kerberos v5 as the IPSec authentication method?
the endpoints must be in the same forest
What IPSec encryption algorithm has been updated for Server 2008?
AES
What key exchange protocol does Server 2008 use for IPSec?
2048-bit Diffie-Hillmen
What are the two IPSec security association modes?
transport mode and tunnel mode
Which IPSec security association mode requires more configuration?
tunnel mode
Which IPSec security association mode is more commonly used?
transport mode
What does IPSec Transport Mode do?
encrypts UDP/TCP header and payload, but leaves IP header unencrypted
How does IPSec tunnel mode differ from transport mode?
tunnel mode encrypts the entire packet as the payload for another packet
What two protocols does IPSec use to create and manage keys?
Internet Security Association Key Management Protocol (ISAKMP) and Internet Key Exchange (IKE)
What 2 protocols does IPSec use to to provide data and identity protection for packets?
Authentication Header (AH) and Encapsulating Security Payload (ESP)
Which provides better performance, Authentication Header or Encapsulating Security Payload?
Authentication Header
What protocol is required for IPSec to tunnel through a NAT?
Encapsulating Security Payload
What are the 2 main methods of configuring IPSec?
through Group Policy or with Windows Firewall with Advanced Security
What are the 5 main components of IPSec rules?
filter list, filter action, authentication method, tunnel endpoint, and connection type
What are the 3 options for an IPSec filter action?
permit, block, or secure
What is the default rule in IPSec?
a rule used in XP/2003 whenever a computer requests secure communications and doesn't fall under an existing rule
What OS's can use the IPSec default rule?
Windows XP and Server 2003
What are the 3 pre-generated IPSec policies?
Client (Respond Only), Server (Request Security), and Secure Server (Require Security)
Why should you create new IPSec policies rather than modify the pre-generated ones?
the pre-generated policies will be replaced whenever you update the OS
What are the two IPSec-related netsh contexts?
netsh ipsec (for XP/2003) and netsh advfirewall (2008)
How can IPSec be used to isolate servers and domains?
require security on inbound traffic and request security on outbound traffic
What is the address range for a Class A address?
0.0.0.0-127.255.255.254
What is the address range for a Class B address?
128.0.0.1-191.255.255.254
What is the address range for a Class C address?
192.0.0.1-223.255.255.254
What is a link-local address?
an IPv6 address assigned when a DHCP server can't be reached
What is a local unicast address?
a non-routable private address space (similar to 192.168 address space)
What is a global unicast address?
a routable IPv6 address
What is an anycast address?
an IPv6 address assigned to multiple interfaces
What is the Class A private address range?
10.x.x.x
What is the Class B private address range?
172.16.x.x--172.31.x.x
What is the Class C private address range?
192.168.x.x
What is the APIPA address range?
169.254.x.x
What is a subnet identifier?
the bits borrowed from a host ID to create a subnet
What is the formula to determine the number of subnets enabled by a given subnet mask?
2^n, where n=number of subnet identifier bits
What is the formula to determine a subnet's host capacity?
2^n-2, where n=number of bits in the host ID
What is supernetting?
combining adjacent networks of the same class into blocks
What is another name for a supernet?
classless network
What organization is responsible for distributing IP address ranges?
the Internet Assigned Numbers Authority (IANA)
What disadvantage does supernetting create?
routers have to store an entry for each network in a supernet
What technology was created to deal with the drawbacks of supernetting?
Classless Interdomain Routing (CIDR)
What is an alternate configuration?
a private IP address configured for use if a DHCP server is unavailable
What two sorts of IP addresses can DHCP assign?
static and dynamic
What two methods can be used to allow a DHCP server to provide addresses to hosts on a remote segment?
connect the segments with a BOOTP-compliant router or add a DHCP relay agent on the remote segment
What sort of device usually acts as a DHCP relay agent?
a router
What is a reservation?
an IP address held for a particular DHCP client
How is the client a DHCP reservation is held for identified?
by MAC address
What two sorts of classes can be defined for DHCP in Server 2008?
vendor classes and user classes
What is a vendor class used for?
managing DHCP options based on vendor type
What is a DHCP user class used for?
managing DHCP options based on common needs
What is the hard drive footprint of Server 2008 Core?
3 Gb
What does ocsetup do?
adds roles on Server 2008 Core
What command is used to install roles on Server 2008 Core?
ocsetup
What does oclist do?
lists roles installed on Server 2008 Core
What command is used to view roles installed on Server 2008 Core?
oclist
What does netsh do?
allows you to view and modify network configurations on both local and remote computers
What are the six main netsh DHCP contexts?
DHCP, DHCP server, DHCP v4, DHCP v6, DHCP server scope, and DHCP server mscope
What are the 7 layers of the OSI model?
Application, Presentation, Session, Transport, Network, Data Link, and Physical
What are the 4 layers of the TCP/IP model?
Application, Transport, Internet, and Network Interface
What OSI layer(s) does the TCP/IP Application layer map to?
Application, Presentation, and Session
What OSI layer(s) does the TCP/IP Transport layer map to?
Transport
What OSI layer(s) does the TCP/IP Internet layer map to?
Network
What OSI layer(s) does the TCP/IP Network Interface layer map to?
Data Link and Physical
What sort of things does the Data Link layer describe standards for?
network adapters, hardware addresses, cabling, hubs, switches
What network layer do hubs and switches reside on?
the Data Link/Network Interface level
What is the purpose of the Data Link layer?
to deliver messages from one device to the next
What is the lowest layer of the OSI model that is routable?
the Network/Internet layer
What are two common Data Link Layer protocols?
ethernet and token ring
What is the primary Network layer protocol?
IP
What is the primary device that resides at the Network OSI layer?
router
What are two common Transport layer protocols?
TCP and UDP
What does TCP do with a data stream from a higher-layer protocol?
breaks it into bytes
How does TCP determine what application to send data packets to?
port numbers
What does Vista and Server 2008's dual-layer architecture do?
allows them to communicate with both IPv4 and IPv6 clients
What is Teredo?
an IPv6 technology that uses tunneling to allow IPv4 and IPv6 hosts to communicate with IPv6 hosts on the internet
What special quality does Teredo have?
it can pass through IPv4 NAT's
What is 6to4?
an IPv6 over IPv4 tunneling protocol
What requirement does 6to4 have?
the endpoint routers must have public IPv4 addresses
What does ISATAP stand for?
Intra-Site Automatic Tunneling Addressing Protocol
What does ISATAP do?
provides IPv6 connectivity between IPv6 and IPv4 hosts over an IPv4 intranet; dual-layer nodes can use ISATAP to discover IPv6 routers
What IPv6 transition protocol will work through IPv4 NAT's?
Teredo
What IPv6 transition protocol requires the endpoint routers to have public IPv4 addresses?
6to4
What IPV6 transition protocol is best for use on an IPv4 intranet?
ISATAP
How is an IPv6 address divided between network and host?
the first 64 bits represent the network ID and the last 64 bits represent the network interface
How is each section of an IPv6 address represented?
with 4 hexidecimal characters
What is the main network configuration tool in Server 2008?
Network and Sharing Center
What OS's can use the Network Location parameter?
Vista and Server 2008
What are the 3 possible settings for Network Location?
Public, Private, and Domain
What Network Location are clients assigned to by default?
Public
What settings does the Public location in Network Location configure?
Windows Firewall on, Network Discovery off, file and printer sharing off, Network Map off
What settings does the Private location in Network Location configure?
Windows Firewall on, Network Discovery on, Network Map on, file and printer sharing off (but can be enabled on a per-host basis)
What changes does the Domain location in Network Location make?
allows settings for Windows Firewall, Network Discovery, and Network Map to be configured via Group Policy
What does Network Map do?
allows you to see devices on the local network and how they connect to each other and the internet
What two components does Network Map rely on?
Link Layer Topology Discovery (LLTD) Mapper and LLTD Responder
What does the Link Layer Topology Discovery (LLTD) Mapper do?
queries the network for devices to include in the Network Map
What does the LLTD Responder do?
responds to queries from the Mapper I/O
How can XP systems be included in Network Map?
install the LLTD Responder
What abilities are granted by enabling the File Sharing feature?
standard users can share documents from their profiles and administrators can share any file
What protocol is required and automatically enabled for File Sharing?
ICMP
What folder is automatically shared when Public Folder Sharing is enabled?
%systemroot%UsersPublic
What file-sharing feature is only available to non-Domain computers?
Password Protected Sharing
How can you control the order in which a computer will test network adapters for communication?
adjust the order of the adapters in Advanced Settings
What does bridging network connections do?
connects two network segments attached to a computer to act as a single segment
What does tracert do?
reports each hop and how long it took
What does pathping do?
sends packets over time and reports on the percentage successful for each router along the path
What does the Address Resolution Protocol (ARP) do?
translates IPv4 addresses into MAC addresses
What protocol replaces ARP in IPv6?
Neighbor Discovery (ND)
What is a Variable Length Subnet Mask (VLSM)?
a concept that allows you to use multiple subnet masks on the same network
What is the last character of a VLSM subnet mask?
always 0