What network locations have network discovery enabled by default? (Choose all that apply)

We weren't able to detect the audio language on your flashcards. Please select the correct language below.

Front

audio not yet available for this language

Back

audio not yet available for this language

Cancel Save changes

  • Flashcards
  •  » 
  • MCTS CH8 Review questions

Mcts Ch8 Review Questions

by ru2303, Nov. 2013

Subjects: MCTS CH8 Review questions

  • Click to Rate "Hated It"
  • Click to Rate "Didn't Like It"
  • Click to Rate "Liked It"
  • Click to Rate "Really Liked It"
  • Click to Rate "Loved It"
  • 4.5 1

Favorite

Introducing Cram Folders! Find out how you can intelligently organize your Flashcards.

Flag

Add to Folders

Close

Please sign in to add to folders.

Sign in

Don't have an account? Sign Up »

Upgrade to Cram Premium

Close

You have created 2 folders. Pleaseupgrade to Cram Premium to create hundreds of folders!

Upgrade Cancel

flashcards

  • Flashcards
  • Memorize
  • Test
  • Games new

  • Tweet

  • Advantages Of A Home Area Network

    2. Broadband Internet connection: Broadband Internet connection: Broadband connection is consistently attached to the internet there is no lust to connect...

  • ARP And The Dynamic Host Configuration Protocol

    d) Then DHCP server updates network server with IP address and required configurations for machine. e) Finally, DHCP server sends acknowledgement to client...

  • Dynamic Host Configuration Protocol Analysis

    Introduction Business users and applications rely on core infrastructure components to be available in order to effectively do the job for which they have be...

  • The Importance Of Mobile Education In Distance Education

    Wireless internet(3G/4G): Mobiles that have the facility for 3G/4G internet can play a great role in mobile

  • Unit 1 P1 Research Paper

    Wi-Fi – Allows devices to gain access to the internet wirelessly. IrDA - Cellular radio - GSM/UMTS - WAP - WML

  • Nt1310 Unit 3 Case Study

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be ...

  • Emergence Of Mobile Technology Essay

    Emergence of mobile technology Mobile technology can be defined that the technology extends computing and the Internet into the wireless medium (Sheng, Nah a...

  • Nt1330 Final Exam Paper

    21 Which operating system doesn't support networking between computers? a. Windows 3.1 b. Windows 95 c. Windows 2000 d. Windows NT 22Which Operating System ...

  • TCP/IP And OSI Models

    (Choose two answers.) a. 48 bits in length b. Can be written in DDN format c. Are listed in the data-link trailer d. Used by routers to ma...

  • Difference Between Wire Line And Wireless Technologies

    The immense world -wide success of mobile wireless communication and now with the growing urge of mobile data conclusively demonstrates the need for mobile-o...

    Because most computers are connected to the Internet through dialup, broadband (such as DSL or cable modems), or a local area network (LAN), computers are vulnerable to attack or unauthorized access. To help protect your system, you should have a firewall between you and the outside world. The firewall monitors all traffic coming in and going out to prevent unauthorized access.

    Windows Firewall is a packet filter and stateful host-based firewall that allows or blocks network traffic according to the configuration. A packet filter protects the computer by using an access control list (ACL), which specifies which packets are allowed through the firewall based on IP address and protocol (specifically the port number). A stateful firewall monitors the state of active connections and uses the information gained to determine which network packets are allowed through the firewall. Typically, if the user starts communicating with an outside computer, it remembers the conversation and allows the appropriate packets back in. If an outside computer tries to start communicating with a computer protected by a stateful firewall, those packets are automatically dropped unless granted by the ACL.

    Firewall rules that can be defined include

    • Inbound rules: These rules help protect your computer from other computers making unsolicited connections to it.
    • Outbound rules: These rules help protect your computer by preventing your computer from making unsolicited connections to other computers.
    • Connection-specific rules: These rules enable a computer's administrator to create and apply custom rules based on a specific connection.

    Basic Configuration

    Windows Firewall is on by default. When Windows Firewall is on, most programs are blocked from communicating through the firewall. If you want to unblock a program, you can add it to the Exceptions list (on the Exceptions tab). For example, you might not be able to send photos in an instant message until you add the instant messaging program to the Exceptions list.

    To turn on or off Windows Firewall:

    1. Open Windows Firewall by clicking the Start button, clicking Control Panel, clicking System and Security, and then clicking Windows Firewall.
    2. In the left pane, click Turn Windows Firewall on or off, as shown in Figure 7.4. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
    3. Below each network location type, click Turn on Windows Firewall, and then click OK. It is recommended that you turn on the firewall for all network location types.

    Besides turning the firewall off and on for each profile, you also have the following options:

    • Block all incoming connections, including those in the list of allowed programs: This setting blocks all unsolicited attempts to connect to your computer. Use this setting when you need maximum protection for your computer, such as when you connect to a public network in a hotel or airport, or when a known computer worm is spreading over the Internet. With this setting, you aren't notified when Windows Firewall blocks programs, and programs in the list of allowed programs are ignored. When you block all incoming connections, you can still view most web pages, send and receive email, and send and receive instant messages.
    • Notify me when Windows Firewall blocks a new program: If you select this checkbox, Windows Firewall informs you when it blocks a new program and gives you the option of unblocking that program.

    The first time you connect to a network, you must choose a network location (sometimes known as profiles). This automatically sets the appropriate firewall and security settings for the type of network that you connect to. If you connect to networks in different locations, such as work, home, or your favorite coffee shop or hotel, choosing a network location can help ensure that your computer is always set to the appropriate security level. See Figure 7.5.

    What network locations have network discovery enabled by default? (Choose all that apply)

    Figure 7.5 Setting Network Location in Windows Firewall.

    Traditionally with firewalls, you can open or close a protocol port so that you can allow or block communication through the firewall. With the Windows Firewall included with Windows 7, you specify which program or feature you want to communicate through the firewall. The most common options are available by clicking the Allow a program or feature through Windows Firewall option, as shown in Figure 7.6. If you need to open a port instead of specifying a program, you have to use the Windows Firewall with Advanced Security uses authentication rules to define IPsec policies. No authentication rules are defined by default. To create a new authentication rule, follow these steps:

    Which WA mode allows users to provide authentication via a pre shared key or password?

    Wi-Fi Protected Access Pre-Shared Key or WPA-PSK is a system of encryption used to authenticate users on wireless local area networks. It's typically utilized by telecom companies for end user access in home local area networks. WPA-PSK may also be called WPA2-PSK or WPA Personal.

    Which of the following is used to configure the Windows 11 accessibility options?

    Press the Windows + I keyboard shortcut to directly open Windows Settings. Click on Accessibility on the left side.

    Which protocol is used by the client for Microsoft networks and file and printer sharing?

    The Server Message Block (SMB) protocol provides the basis for file and print sharing and many other networking operations, such as remote Windows administration.

    Which addresses represent valid local loopback addresses?

    Local Loopback Address: In IPv4, IP addresses that start with decimal 127 or that has 01111111 in the first octet are loopback addresses(127. X.X.X). Typically 127.0. 0.1 is used as the local loopback address.