See Part 1 Here
1.
Describe how the DHCP lease is obtained.
It’s a four-step process consisting of (a) IP request, (b) IP offer, © IP
selection and (d) acknowledgement.
2.
I can’t seem to access the Internet, don’t have any access to the
corporate network and on ipconfig my address is 169.254.*.*. What happened? The 169.254.*.* netmask is assigned to Windows machines running
98/2000/XP if the DHCP server is not available. The name for the technology is
APIPA (Automatic Private Internet Protocol Addressing).
3.
We’ve installed a new Windows-based DHCP server, however, the users
do not seem to be getting DHCP leases off of it. The
server must be authorized first with the Active Directory.
4.
How can you force the client to give up the dhcp lease if you have
access to the client PC? ipconfig /release
5.
What authentication options do Windows 2000 Servers have for remote
clients? PAP, SPAP, CHAP, MS-CHAP and EAP.
6.
What are the networking protocol options for the Windows clients if
for some reason you do not want to use TCP/IP? NWLink
(Novell), NetBEUI, AppleTalk (Apple).
7.
What is data link layer in the OSI reference model responsible for?
Data link layer is located above the physical layer, but below the network layer. Taking raw data bits and packaging them into frames. The network
layer will be responsible for addressing the frames, while the physical layer
is reponsible for retrieving and sending raw data bits.
8.
What is binding order? The order by
which the network protocols are used for client-server communications. The most
frequently used protocols should be at the top.
9.
How do cryptography-based keys ensure the validity of data
transferred across the network? Each IP
packet is assigned a checksum, so if the checksums do not match on both
receiving and transmitting ends, the data was modified or corrupted.
10.
Should we deploy IPSEC-based security or certificate-based security?
They are really two different technologies. IPSec
secures the TCP/IP communication and protects the integrity of the packets.
Certificate-based security ensures the validity of authenticated clients and
servers.
11.
What is LMHOSTS file? It’s a file stored
on a host machine that is used to resolve NetBIOS to specific IP addresses.
12.
What’s the difference between forward lookup and reverse lookup in
DNS? Forward lookup is name-to-address, the reverse
lookup is address-to-name.
13.
How can you recover a file encrypted using EFS? Use the domain recovery agent.
Set IP address from CMD Prompt
How do you set the IP address by using the
command prompt?
Troubleshooting a Slow Computer
Blackberry Synchronization
Add a User to Network
Low Level Formatting
FireWire Port
Larger Desktop Icons
Desktop Icons
Answer: This is
very simple on you main desktop just right click the mouse button in a blank
space, then scroll down and click properties. You are at the display settings
menu on the top bar you will see a tab that reads appearance, click on this
tab. Once you ...
No comments:
Post a Comment
Dear visitor,
Please do not post spam. All comments will be moderated before approval.