Which of the following statements describing different methods for organizing Windows-based computers in networks are true? [3]
Which of the statements listed below apply to Windows workgroups? [3]
Which Control Panel applet in Windows provides access to computer name, domain, and workgroup settings?
system
Which of the following statements apply to Windows domains? [3]
Which of the following locations/steps allows to view network shares in Windows? [5]
In MS Windows, the “$” sign appended to the end of the name of a network share indicates that the shared folder or drive is:
hidden
Which of the following characters indicates that a Windows network share is intended for administrative access?
$
Which of the following locations in Windows 7 allows to create a shortcut to a shared folder or computer on a network?
Windows Explorer -> Computer -> Map network drive
Which of the following locations in Windows 8/8.1/10 allows to create a shortcut to a shared folder or computer on a network?
File Explorer -> This PC -> Computer tab -> Map Network drive
Which of the following locations in Windows 10 provide access to configuration options that allow to share a local printer with other PCs on a network? [2]
Which of the following locations in Windows 10 provide access to configuration options for connecting a network printer to a PC (network printer mapping)? [2]
Which of the following locations in Windows provide access to dial-up and VPN settings? [3]
A system that uses public network (such as the Internet) as a means for creating private encrypted connections between remote locations is known as:
Virtual Private Network (VPN)
Which of the following settings are used for establishing a VPN connection in Windows? [3]
Which of the following Internet access types takes advantage of PSTN lines?
Dial-up
Which of the following settings are used for establishing a dial-up connection in Windows? [3]
What type of configuration info is used for setting up a wireless connection in Windows? [4]
Network name
Encryption type
Security type
Security key
Which of the following terms describes the most common type of wired connections used in modern networks?
ethernet
Which of the following takes advantage of cell towers that provide wireless signal coverage for mobile devices?
wwan
In computer networking, a computer system or an application that acts as an intermediary between another computer and the Internet is commonly referred to as:
proxy
Which of the following locations provide access to proxy settings in Windows? [2]
Which of the following answers describe the features of Windows Remote Desktop tool? [3]
Which of the following answers refer(s) to the Windows Remote Assistance utility? [5]
Which of the Windows network profiles imposes the strongest security settings?
public