Module 14 - Windows Networking, Security Settings, and Shares (CompTIA A+)

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/47

flashcard set

Earn XP

Description and Tags

Flashcards cover key topics from module 14, including Windows networking types, IP addressing and services, firewall and proxy settings, troubleshooting commands, security concepts (AAA, MFA, UAC), Active Directory concepts (domains, OU, GPOs, MDMs), NTFS permissions and inheritance, roaming/folder redirection, shares, printers, and network discovery.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

48 Terms

1
New cards

What are the four main sections covered in module 14?

Configure Windows networking, troubleshoot Windows networking, configure Windows security settings, and manage Windows shares.

2
New cards

What does the term COMTEAM refer to in the context of Windows networking topics discussed in the video?

The way you connect a device to a network—physically (wired) or wirelessly.

3
New cards

What is meant by a wired (Ethernet) connection in Windows networking?

Connecting a device to a network using a network cable (Ethernet) such as Cat5/Cat6; Ethernet cables are not limited to LAN cables and can be coaxial or fiber as well.

4
New cards

What is an SSID?

The wireless network name that appears when searching for Wi‑Fi networks.

5
New cards

What is IP addressing and what are the two main IP versions discussed?

Internet Protocol addressing; IP version 4 (IPv4) and IP version 6 (IPv6).

6
New cards

Why is IPv6 becoming more important than IPv4?

IPv6 provides a vastly larger address space to accommodate the growing number of devices connected to the Internet.

7
New cards

What is a default gateway?

The first device a host must reach to get to the outside world; typically a home router or a firewall in larger networks.

8
New cards

What is DNS and what is its basic function?

Domain Name System; translates human-friendly domain names to IP addresses and vice versa, and it caches lookups for faster access.

9
New cards

What is DHCP and where can it be located in a network?

Dynamic Host Configuration Protocol; assigns IP addresses automatically to devices. It can be built into a router or run on a dedicated DHCP server.

10
New cards

What is a Class C network in IPv4 terms?

A network using a 255.255.255.0 subnet mask, supporting up to 256 addresses (254 usable) per subnet.

11
New cards

What is a static IP address and what is its behavior?

An IP address manually configured on a device that does not change unless manually altered.

12
New cards

What is a dynamic IP address and how is it obtained?

An IP address assigned automatically by DHCP; can change over time when renewed.

13
New cards

What is APIPA and what do 169.254.x.x addresses indicate?

Automatic Private IP Addressing; the device could not obtain an IP via DHCP and assigned itself an APIPA address (169.254.x.x).

14
New cards

What is the purpose of ipconfig /flushdns?

To clear the DNS resolver cache on a Windows machine.

15
New cards

What is ipconfig /release used for, and when would you use it?

To release the current DHCP-assigned IP address; used when the device has a dynamic IP and needs a new lease.

16
New cards

What is ipconfig /renew used for, and when would you use it?

To request a new IP address from DHCP; used after releasing or when troubleshooting IP issues.

17
New cards

What is the practical relevance of the DNS cache in a computer?

Temporary memory storing recently resolved DNS lookups to speed up future access to the same domains.

18
New cards

What is a common exam-related tip about 169.254.x.x addresses in IP troubleshooting?

If you see 169.254.x.x, the device does not have an IP address assigned; focus on renewing/diagnosing DHCP rather than releasing in that case.

19
New cards

What is Windows Defender Firewall and how has it evolved in naming?

Windows' built-in firewall formerly known as Windows Firewall; renamed to Windows Defender Firewall in newer Windows versions but functionality remains the same.

20
New cards

What are inbound and outbound firewall rules?

Inbound rules control traffic entering the computer; outbound rules control traffic leaving the computer.

21
New cards

What is the purpose of creating a new firewall rule?

To block or allow a specific program, port, or traffic type through the firewall.

22
New cards

What is a proxy server and why is it being phased out in many environments?

A middleman for web access used to filter sites; being phased out due to evolving security measures and bypass methods (e.g., incognito/private browsing, VPNs).

23
New cards

What is a ping and what information does it provide?

A utility to test connectivity to a device or website; sends four ICMP echo requests and reports replies with latency (time).

24
New cards

What does a successful ping indicate?

The target is reachable and responding; latency is measured by the reply time.

25
New cards

What does a time-out or dropped packets in a ping indicate?

Possible network interference, latency, or a misconfiguration, with some packets failing to reach or return from the destination.

26
New cards

What is traceroute (tracert in Windows) used for?

To trace the path and delays to a destination across multiple hops (routers) and identify where issues occur.

27
New cards

What is UAC (User Account Control) and why is it important?

A principal security feature that prompts for consent or credentials when performing actions requiring elevated privileges; introduced to reduce unauthorized changes.

28
New cards

What are the typical Windows login options mentioned?

Username and password; PIN; picture password; Windows Hello biometrics.

29
New cards

What is a domain controller?

A server running Active Directory Domain Services that authenticates domain users and applies policies; there are root domain controllers and read-only domain controllers (RODCs) for branches.

30
New cards

What is an Active Directory Organizational Unit (OU)?

A container used to organize users, groups, and devices so that Group Policies can be applied in a scalable way.

31
New cards

What is least privilege in IT security?

Giving users only the minimum privileges necessary to perform their job to reduce risk of misuse or damage.

32
New cards

What is a group account and how does it relate to user accounts in Windows?

A group account provides a set of privileges for multiple users; users can be added to groups to inherit those permissions.

33
New cards

What is common terminology for Windows user accounts and admin rights today?

Administrators have elevated rights; standard users have limited rights; many environments use management tools to enforce policies (e.g., Intune).

34
New cards

What is User Account Control (UAC) and how does it behave for admins vs standard users?

UAC prompts for consent when performing actions requiring elevation; admins may approve; standard users are prompted for an admin credential.

35
New cards

What is MFA and what are its three main categories?

Multi-factor authentication; two or more categories: something you know, something you have, something you are.

36
New cards

What are Windows login options that correspond to MFA concepts?

Options include password/username, PIN (something you know), Windows Hello (biometrics), and picture password (gestures).

37
New cards

What is the difference between workgroups and domains in Windows networking?

Workgroups are simple, peer-based networks with minimal centralized control; domains use Active Directory for centralized authentication and policy enforcement.

38
New cards

What is a domain controller and what is an RODC?

A domain controller runs Active Directory; an RODC is a Read-Only Domain Controller placed at branch offices to reduce WAN traffic and improve logon performance.

39
New cards

What is NTFS permissions and inheritance?

NTFS permissions control access; permissions are inherited from parent to child folders, unless inheritance is disabled.

40
New cards

What happens when you disable inheritance on a folder in NTFS?

Inheritance stops, and permissions become explicit for that folder; existing inherited permissions remain unless changed.

41
New cards

What is a deny permission and how does it interact with allow permissions?

Deny permission overrides allow permissions; if any deny exists in the effective ACL, access is denied.

42
New cards

What is a roaming profile?

A user profile that is stored on a server and loaded on each domain-joined device so settings follow the user across devices.

43
New cards

What is folder redirection?

User data folders (like Documents) are redirected to a server share, so data follows the user to different devices.

44
New cards

What is the purpose of sharing NTFS permissions vs sharing preferences?

NTFS permissions control who can access files/folders; sharing permissions control how folders are shared over the network.

45
New cards

What is mapping a drive and how do you map one in Windows?

Creating a network location on the client that points to a shared folder or drive; can be done via GUI (Map Network Drive) or command net use.

46
New cards

What is printer sharing and how does it work in small offices?

Sharing a printer over the network so other devices can print via the host computer; the host must stay online for printing to work.

47
New cards

Why is simple sharing or advanced sharing mentioned, and where might you find these settings in Windows 11 vs Windows 10?

Different sharing interfaces; newer Windows versions show renamed options (e.g., give permission to) but functionality remains similar.

48
New cards

What is network discovery and why is it important for sharing?

The ability for devices on a network to see each other; must be enabled for devices to appear in network listings.