Preview (11 of 35 pages)

This Document Contains Chapters 5 to 8 Chapter 5 Review Questions 1. An IPv6 address is made up of how many bits? a. 64 b. 32 c. 48 d. 128 Answer: d. 128 2. The subnet mask of an IP address does which of the following? a. Determines the default gateway b. Defines network and host portions of an IP address c. Resolves domain names to IP addresses d. Configures DHCP settings Answer: b. Defines network and host portions of an IP address 3. If a protocol is routable, which TCP/IP layer does it operate at? a. Application b. Internetwork c. Transport d. Network Access Answer: b. Internetwork 4. Which of the following is a private IP address and can’t be routed across the Internet? a. 10.0.0.1 b. 172.19.243.254 c. 192.168.1.1 d. 203.0.113.5 Answer: b. 172.19.243.254 5. Which TCP/IP model layer takes a large chunk of data from the Application layer and breaks it into smaller segments? a. Network Access b. Network c. Transport d. Application Answer: c. Transport 6. Which of the following protocols resolves logical addresses to physical addresses? a. DHCP b. ARP c. DNS d. RARP Answer: b. ARP 7. Which of the following protocols provides connectionless service? (Choose all that apply.) a. IP b. UDP c. TCP d. SMTP Answer: a. IP b. UDP 8. If you want to design an Application-layer protocol that provides fast, efficient communication and doesn’t work with large amounts of data, what Transport-layer protocol would you design it to use? a. TCP b. SCTP c. HTTP d. UDP Answer: d. UDP 9. Which of the following is the term for identifying packets used by TCP to establish a connection? a. Three-step handshake b. Two-way handshake c. Three-way handshake d. Four-way handshake Answer: c. Three-way handshake 10. What is the term for each grouping of 8 bits in an IP address? a. Byte b. Word c. Packet d. Octet Answer: d. Octet 11. When using TCP/IP, which of the following must computers on the same logical network have in common? (Choose all that apply.) a. Network ID b. Subnet mask c. IP address d. Default gateway Answer: a. Network ID b. Subnet mask 12. Which of the following IPv6 features is an enhancement to IPv4? (Choose all that apply.) a. Larger address space b. NAT c. Built-in security d. Broadcast support Answer: a. Larger address space c. Built-in security 13. Which protocol can configure a computer’s IP address and subnet mask automatically? a. DNS b. ARP c. ICMP d. HTTP e. DHCP Answer: e. DHCP 14. How many bits must be reallocated from host ID to network ID to create 16 subnets? a. 2 b. 4 c. 6 d. 8 Answer: b. 4 15. For the Class C network address 192.168.10.0, which of the following subnet masks provides 32 subnets? a. 255.255.255.192 b. 255.255.255.248 c. 255.255.255.240 d. 255.255.255.128 Answer: a. 255.255.255.192 16. How many host bits are necessary to assign addresses to 62 hosts? a. 6 b. 7 c. 8 d. 9 Answer: a. 6 17. Which IP addressing process enables workstations to use private IP addresses to access the Internet? a. PAT b. NAT c. DHCP d. ARP Answer: b. NAT 18. When a Windows computer is configured to use DHCP but no DHCP server is available, what type of address is configured automatically for it? a. Static IP b. APIPA c. Reserved IP d. Link-local Answer: b. APIPA 19. Which of the following represents a valid IPv6 address? a. 192.168.1.1 b. 2001:345:abcd::BEEF:44 c. 2001:db8:85a3::8a2e:370:7334 d. 10.0.0.1 Answer: b. 2001:345:abcd::BEEF:44 20. Which of the following is a reason to subnet? (Choose all that apply.) a. Networks can be divided into logical groups. b. Subnetting can reduce the need for routing protocols. c. Subnetting can decrease the size of broadcast domains. d. Subnetting can increase the speed of data transmission. Answer: a. Networks can be divided into logical groups c. Subnetting can decrease the size of broadcast domains 21. Which of the following Application-layer protocols typically uses the UDP Transport-layer protocol? (Choose all that apply.) a. FTP b. DNS c. DHCP d. HTTP Answer: b. DNS c. DHCP 22. Which is the correct order of headers, from left to right, in a completed frame? a. IP, Frame, TCP b. Frame, IP, TCP c. TCP, IP, Frame d. Frame, IP, UDP Answer: b. Frame, IP, UDP 23. Which of the following is a task performed by the Network Access layer? (Choose all that apply.) a. Verifies that incoming frames have the correct destination MAC address b. Manages data encryption c. Transmits and receives bit signals d. Provides error recovery Answer: a. Verifies that incoming frames have the correct destination MAC address c. Transmits and receives bit signals 24. What field of the IP header does the Tracert program use to get the IP address of routers in the path? a. Source IP b. TTL c. Destination IP d. Checksum Answer: b. TTL 25. Which of the following is not found in a connectionless Transport-layer protocol? (Choose all that apply.) a. Three-way handshake b. Connection establishment c. Sequencing d. Acknowledgements Answer: a. Three-way handshake b. Connection establishment c. Sequencing d. Acknowledgements Challenge Labs Challenge Lab 5-1 What capture filter did you use to limit Wireshark to capturing only packets related to HTTP? The capture filter should be TCP port 80 or TCP port http. Find the three-way handshake that immediately precedes the first HTTP packet. Which Transport-layer protocol was used to create the connection? The Transport-layer protocol is TCP. For the fields in the Transport-layer header of the first packet in the three-way handshake, answers will vary, but the following values will always be the same: • Destination port: 80 • Sequence number: 0 • Flags: Syn: 1 or Set Find the following fields in the Transport-layer header of the third packet in the three-way handshake. Research their meanings, and then write down their values along with brief descriptions of them: • Window size: Answers will vary. • Maximum segment size: Answers will vary. • How are the sequence number and acknowledgement used to make this protocol reliable? The sequence number is used to put packets (segments) back in their original order if they arrive out of sequence, and the acknowledgement is used along with the sequence number to ensure that all packets (segments) were received. If an acknowledgement isn’t received, the sending station resends the data since the last received acknowledgement. Challenge Lab 5-2 • Number of subnets needed: 5 • Subnet mask: 255.255.255.224 • Number of subnets created: 8 Network number Host address range 192.168.1.0/27 192.168.1.1 to 192.168.1.30 192.168.1.32/27 192.168.1.33 to 192.168.1.62 192.168.164/27 192.168.1.65 to 192.168.1.94 192.168.1.96/27 192.168.1.97 to 192.168.1.126 192.168.1.128/27 192.168.1.129 to 192.168.1.158 192.168.1.160/27 192.168.1.161 to 192.168.1.1190 192.168.1.192/27 192.168.1.193 to 192.168.1.222 192.168.1.224/27 192.168.1.225 to 192.168.1.254 Case Projects Case Project 5-1 Subnet mask: 255.255.255.240 First four subnets: 197.14.88.0/28, 197.14.88.16/28, 197.14.88.32/28, 197.14.88.48/28 Case Project 5-2 Students should write an e-mail to the employee, explaining that she should open a command prompt window and enter the command ipconfig /all. Based on the information she gives, students should state that this employee is receiving an APIPA address, which means her computer was unable to contact a DHCP server. The DHCP server should be checked for functionality, and if it’s okay, the employee’s network connection should be checked. Case Project 5-3 Students should say they need to set up a NAT device (usually the router that connects the network to the Internet) and use PAT. All four public addresses can be used for PAT, or just one or two of the public addresses can be used for PAT, with the remaining public addresses used to set up a publicly accessible Web server or another service they want to be available through the Internet. Chapter 6 Review Questions 1. The original commercial version of Ethernet supported 10 Mbps bandwidth; the version introduced in the early 1990s supports 100 Mbps; and in 1998, Gigabit Ethernet was introduced. All versions use the same data frame formats, with the same maximum PDU sizes, so they can interoperate freely. Given this information and what you know of layered technologies, which of the following statements is true? (Choose all that apply.) a. Ethernet works at the Data Link and Physical layers of the OSI model, and upgrades to newer, faster versions of Ethernet can be made by changing only the components that work at these layers. b. Changes in technology at one layer of the OSI model affect the operation of other layers. c. Changes in technology at one layer of the OSI model don’t usually affect the operation of other layers. d. Ethernet operates only at the Physical layer of the OSI model. Answer: a. Ethernet works at the Data Link and Physical layers of the OSI model, and upgrades to newer, faster versions of Ethernet can be made by changing only the components that work at these layers. c. Changes in technology at one layer of the OSI model don’t usually affect the operation of other layers. 2. The addition of information to a PDU as it’s passed from one layer to the next is called which of the following? a. Fragmentation b. Encapsulation c. DE encapsulation d. Segmentation Answer: b. Encapsulation 3. Layers acting as though they communicate directly with each other across the network are called which of the following? a. Peers b. Endpoints c. Interfaces d. Neighbors Answer: a. Peers 4. Place the following layers in the correct order to represent the OSI model from Layer 7 to Layer 1: a. Presentation b. Data Link c. Session d. Physical e. Application f. Transport g. Network Answer: e. Application a. Presentation c. Session f. Transport g. Network b. Data Link d. Physical 5. Which OSI layer creates and processes frames? a. Physical b. Network c. Transport d. Data Link Answer: d. Data Link 6. Which OSI layer handles flow control, data segmentation, and reliability? a. Application b. Presentation c. Transport d. Network Answer: c. Transport 7. Which OSI layer governs how a NIC is attached to the network medium? a. Data Link b. Network c. Application d. Physical Answer: d. Physical 8. Which OSI layer determines the route a packet takes from sender to receiver? a. Data Link b. Transport c. Network d. Session Answer: c. Network 9. Which OSI layer is responsible for setting up, maintaining, and ending ongoing information exchanges across a network? a. Application b. Presentation c. Network d. Session Answer: d. Session 10. Which of the following elements might the Data Link layer add to its PDU? (Choose all that apply.) a. Physical addresses b. IP addresses c. Port numbers d. CRC Answer: a. Physical addresses d. CRC 11. When and how many times is a CRC calculated? a. At the source only b. At each intermediary device only c. At the destination only d. At the source and destination and at each intermediary device Answer: d. At the source and destination and at each intermediary device 12. Which layer of the OSI model does Project 802 divide into two sublayers? a. Physical b. Data Link c. Network d. Transport Answer: b. Data Link 13. What are the names of the sublayers specified as part of Project 802? (Choose all that apply.) a. Logical Link Control (LLC) b. Network Interface (NI) c. Media Access Control (MAC) d. Media Link Control (MLC) Answer: a. Logical Link Control (LLC) c. Media Access Control (MAC) 14. Which term refers to stripping header information as a PDU is passed from one layer to a higher layer? a. DE encapsulation b. Encapsulation c. Fragmentation d. Segmentation Answer: a. DE encapsulation 15. Which IEEE 802 standard applies to Ethernet? a. 802.11 b. 802.3 c. 802.5 d. 802.15 Answer: b. 802.3 16. Which IEEE 802 standard applies to wireless LANs? a. 802.3 b. 802.5 c. 802.15 d. 802.11 Answer: d. 802.11 17. What is the name of the PDU at the Transport layer? a. Frame b. Packet c. Segment d. Datagram Answer: c. Segment 18. At which OSI layer does the PDU contain sequence and acknowledgement numbers? a. Network b. Transport c. Data Link d. Application Answer: b. Transport 19. Which of the following is an example of software found at the Application layer? (Choose all that apply.) a. FTP b. SNMP c. HTTP d. ARP Answer: a. FTP c. HTTP 20. At which Data Link sublayer does the physical address reside? a. Media Access Control (MAC) b. Logical Link Control (LLC) c. Network Interface (NI) d. Data Link Control (DLC) Answer: a. Media Access Control (MAC) 21. Which of the following problems can occur at the Physical layer? a. Packet loss b. Frame corruption c. Signal errors caused by noise d. Connection resets Answer: c. Signal errors caused by noise Hands-On Projects Hands-On Project 6-2 Hands-On Project 6-3 Hands-on Project 6-4 Challenge Labs Challenge Lab 6-1 Map the header names in the captured packet to the layers of the OSI model: Ethernet II: Data Link layer Internet Protocol: Network layer Transmission Control Protocol: Transport layer Hypertext Transfer Protocol: Session, Presentation, Application layers For each header, find two fields pertaining to that OSI layer’s function, and be prepared to explain why: Ethernet II: Source and destination MAC addresses Internet Protocol: Source and destination IP addresses Transmission Control Protocol: Source and destination ports, sequence number, acknowledgement number Hypertext Transfer Protocol: Accept-Encoding—Presentation; Keep-Alive-Session, Get HTTP—Application Challenge Lab 6-2 To get all the MAC addresses, students can ping each device and then use Arp -a to display the MAC addresses. They can copy and paste output from Arp -a to a text file or use a command such as Arp -a >macs.txt. Case Projects Case Project 6-1 1. Physical 2. Network 3. Application 4. Physical 5. Presentation 6. The CRC is in the Data Link layer, but CRC errors are usually caused by a Physical-layer problem. 7. Transport 8. Session 9. Application 10. Network layer Case Project 6-3 This document transfer should work. There’s no problem with transferring data between an Ethernet and a token ring network; they are simply different networking technologies, and the data in the document will be unaffected. The first italicized phrase about encrypting the document involves the Presentation layer, as that’s where data conversion takes place. The next italicized phrase involves the Network layer, where routing of packets takes place. The last italicized phrase involves the Data Link and Physical layers, where networking technologies are defined. Chapter 7 Review Questions 1. When a switch receives a frame on a port and floods the frame, what does it do with the frame? a. Forwards it only to the destination port b. Discards it c. Forwards it out all other connected ports d. Stores it for later use Answer: c. Forwards it out all other connected ports 2. You have two eight-port switches. On each switch, seven stations are connected to ports, and the two switches are connected with the eighth port. How many collision domains are there? a. 7 b. 15 c. 8 d. 14 Answer: b. 15 3. Which of the following is considered a Layer 2 device? a. Router b. Switch c. Hub d. Repeater Answer: b. Switch 4. You just purchased some new switches for your company’s network. Your junior technicians are doing most of the work connecting switches to workstations and to each other, and you don’t want to confuse them by requiring them to use both patch cables and crossover cables. How can you test the switches to determine whether you need both types of cable, and what’s the feature for using only one type of cable for all connections? a. Connect two switches using a crossover cable. If the connection works, the switch supports auto-MDIX. b. Connect two workstations using a patch cable. If the connection works, the switch supports auto-MDIX. c. Connect a workstation to a switch using a patch cable. If the connection works, the switch supports auto-MDIX. d. Connect two switches by using a patch cable. If the connection works, the switch supports auto-MDIX. Answer: d. Connect two switches by using a patch cable. If the connection works, the switch supports auto-MDIX. 5. What feature of a switch keeps switching table entries from becoming stale? a. Flooding b. Aging time c. Forwarding d. Address Resolution Protocol (ARP) Answer: b. Aging time 6. Which is the fastest switching method? a. Store-and-forward b. Fragment-free c. Cut-through d. Adaptive Answer: c. Cut-through 7. There can be only one MAC address per port in a switching table. True or False? a. True b. False Answer: b. False 8. What does it mean if the first 24 bits of a MAC address are 01:00:5E? a. It’s a unicast frame. b. It’s a multicast frame. c. It’s a broadcast frame. d. It’s a reserved frame. Answer: b. It’s a multicast frame. 9. What feature should you look for in switches if your network is cabled like the one in Figure 7-16? a. VLAN support b. Link aggregation c. STP d. QoS Answer: c. STP 10. What should you configure on a switch that’s connected to three broadcast domains? a. Routing protocols b. VLANs c. STP d. Trucking Answer: b. VLANs 11. Which of the following is a Layer 3 device? a. Switch b. Hub c. Bridge d. Router Answer: d. Router 12. What does a router do after receiving a frame on one of its interfaces? (Choose all that apply.) a. DE encapsulates the frame to create a packet b. Forwards the packet to the next hop c. Encapsulates the packet to create a new frame d. Encapsulates the packet to create a new frame Answer: a. DE encapsulates the frame to create a packet c. Encapsulates the packet to create a new frame 13. Which of the following is found in a routing table? (Choose all that apply.) a. IP address of the destination b. MAC address of the next hop c. Metric d. Next hop Answer: c. Metric d. Next hop 14. Which of the following accurately describes a distance-vector routing protocol? a. It calculates the best path based on the number of hops. b. It learns from its neighbors. c. It uses a link-state database. d. It performs path computation using Dijkstra’s algorithm. Answer: b. It learns from its neighbors. 15. Which of the following is a characteristic of routing protocols? (Choose all that apply.) a. They use static routing to update routes. b. Network changes are reflected in the routing table automatically. c. They require manual updates to routing tables. d. They add routing table entries dynamically. Answer: b. Network changes are reflected in the routing table automatically. d. They add routing table entries dynamically. 16. Which of the following is the best routing solution for a network that includes redundant links? a. RIP b. EIGRP c. OSPF d. BGP Answer: c. OSPF 17. If you don’t want wireless clients to view the name of your wireless network, what feature should you use? a. WPA2 encryption b. Disabling SSID broadcasts c. MAC address filtering d. IP address masking Answer: b. Disabling SSID broadcasts 18. To prevent a war driver from being able to interpret captured wireless network data, you should enable which of the following? a. WEP b. WPA c. WPA or WPA2 d. Open system authentication Answer: c. WPA or WPA2 19. What feature can you use to wirelessly connect the wired networks in two buildings? a. Access Point b. Repeater c. Bridge mode d. Router Answer: c. Bridge mode 20. Which AP feature is useful when you have many guests accessing your network and you don’t want them to be able to access the computers of other guests? a. SSID hiding b. AP isolation c. MAC address filtering d. WPA2 encryption Answer: b. AP isolation 21. Which PC bus uses up to 32 lanes to achieve very high data transfer rates? a. PCI b. PCI-X c. PCIe d. ISA Answer: c. PCIe 22. Which PC bus allows you to connect a NIC to your computer easily without powering off? a. PCI b. PCI-X c. USB d. ISA Answer: c. USB 23. Which NIC feature do you need to configure on a thin client? a. Wake-on-LAN b. PXE c. VLAN tagging d. Bonding Answer: b. PXE 24. Which device is used to communicate between broadcast domains? a. Switch b. Hub c. Router d. Repeater Answer: c. Router 25. What feature should you configure to prevent users on one subnet from accessing the Web server on another subnet? a. NAT b. Access control lists c. Routing protocols d. DHCP Answer: b. Access control lists Challenge Labs Challenge Lab 7-1 Which security protocol was the easiest to configure? Which protocol is the most secure? Answers will vary depending on which protocols are available. Generally, WPA2 is easy to configure with a passphrase and is the most secure. How did disabling the SSID broadcast affect your ability to connect to the AP? In most cases, student will respond that they had to enter the SSID manually to connect to the AP. How did MAC filtering affect your ability to connect to the AP? Students should reply that only the addresses they allowed with the filter should be able to connect to the AP. Challenge Lab 7-2 Router A How Network Via/next hop Metric Interface C 192.168.1.0/24 Connected 0 Ethernet0 C 192.168.2.0/24 Connected 0 Ethernet1 C 192.168.3.0/24 Connected 0 Serial0 R 192.168.4.0/24 192.168.3.2 1 Serial0 R 192.168.5.0/24 192.168.3.2 1 Serial0 R 192.168.6.0/24 192.168.3.2 2 Serial0 R 192.168.7.0/24 192.168.3.2 1 Serial0 R 192.168.8.0/24 192.168.3.2 2 Serial0 R 192.168.9.0/24 192.168.3.2 2 Serial0 Router B How Network Via/next hop Metric Interface R 192.168.1.0/24 192.168.3.1 1 Serial1 R 192.168.2.0/24 192.168.3.1 1 Serial1 C 192.168.3.0/24 Connected 0 Serial1 C 192.168.4.0/24 Connected 0 Ethernet0 C 192.168.5.0/24 Connected 0 Serial0 R 192.168.6.0/24 192.168.5.2 1 Serial0 C 192.168.7.0/24 Connected 0 Serial2 R 192.168.8.0/24 192.168.5.2 and 192.168.7.2 1 1 Serial0 Serial2 R 192.168.9.0/24 192.168.7.2 1 Serial2 Router C How Network Via/next hop Metric Interface R 192.168.1.0/24 192.168.5.1 2 Serial0 R 192.168.2.0/24 192.168.5.1 2 Serial0 R 192.168.3.0/24 192.168.5.1 1 Serial0 R 192.168.4.0/24 192.168.5.1 1 Serial0 C 192.168.5.0/24 Connected 0 Serial0 C 192.168.6.0/24 Connected 0 Ethernet0 R 192.168.7.0/24 192.168.8.2 and 192.168.5.1 1 1 Serial1 Serial0 C 192.168.8.0/24 Connected 0 Serial1 R 192.168.9.0/24 192.168.8.2 1 Serial1 Router D How Network Via/next hop Metric Interface R 192.168.1.0/24 192.168.7.1 2 Serial1 R 192.168.2.0/24 192.168.7.1 2 Serial1 R 192.168.3.0/24 192.168.7.1 1 Serial1 R 192.168.4.0/24 192.168.7.1 1 Serial1 R 192.168.5.0/24 192.168.7.1 and 192.168.8.1 1 1 Serial1 Serial0 R 192.168.6.0/24 192.168.8.1 1 Serial0 C 192.168.7.0/24 Connected 0 Serial1 C 192.168.8.0/24 Connected 0 Serial0 C 192.168.9.0/24 Connected 0 Ethernet0 Case Projects Case Project 7-1 Students should mention the following in their Reponses: VLANs to group users for projects no matter what their physical locations are STP support on switches to ensure fault tolerance between floors Use of routers to break up the large broadcast domain and to route between VLANs Case Project 7-2 A wireless bridge is the most likely solution. Case Project 7-3 With statically configured routing, the router can’t adjust to changing conditions in the network, such as offline links. An administrator would have to change the static routes to solve the problem leading to downtime. To address this problem, students should suggest using a routing protocol. Because redundancy is needed, a protocol such as OSPF or EIGRP might be necessary, as RIP doesn’t deal with redundant links efficiently. However, RIP would probably still work. Chapter 8 Review Questions 1. Which of the following is an objective of a file system? (Choose all that apply.) a. Organize space on a drive. b. Organize files hierarchically. c. Secure access to files. d. Secure access to files. Answer: a. Organize space on a drive. b. Organize files hierarchically. d. Secure access to files. 2. A cluster is composed of which of the following? a. One or more 512-byte sectors b. One or more 1024-byte sectors c. One or more 512-byte sectors d. One or more 2048-byte sectors Answer: c. One or more 512-byte sectors 3. Large cluster sizes can result in which of the following on a disk drive? a. Faster performance for large files, more wasted space for small files b. Slower performance for large files, less wasted space for small files c. Faster performance for small files, less wasted space for large files d. No impact on performance or space utilization Answer: a. Faster performance for large files, more wasted space for small files 4. Which of these file systems includes file and folder permissions? (Choose all that apply.) a. FAT32 b. Ext3 c. NTFS d. Ext2 Answer: b. Ext3 c. NTFS 5. What feature of a file system makes it possible to find a file based on keywords in it? a. Indexing b. Compression c. Encryption d. Deduplication Answer: a. Indexing 6. Which of the following is best described as a program loaded into memory that has no user interface but communicates with other programs? a. Application b. Daemon c. Service d. Process Answer: c. Service 7. The DNS function is built into most applications. True or False? a. True b. False Answer: b. False 8. Which best describes context switching? a. Switching between different network interfaces b. The OS suspending the running process and activating another process c. Changing the priority of a running process d. Switching between different user accounts Answer: b. The OS suspending the running process and activating another process 9. The most common form of multitasking in current OSs is cooperative multitasking. True or False? a. True b. False Answer: b. False 10. The OS component that schedules processes to run is the __________. a. File system b. User interface c. Device driver d. Kernel Answer: d. Kernel 11. Which best describes a thread? a. A complete process with its own memory space b. The smallest schedulable unit of software c. A large, complex application d. An isolated environment within a process Answer: b. The smallest schedulable unit of software 12. Which answer shows the correct order of DHCP packets generated when a computer requests a new address lease? a. DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck b. DHCPRequest, DHCPDiscover, DHCPAck, DHCPOffer c. DHCPOffer, DHCPDiscover, DHCPRequest, DHCPAck d. DHCPAck, DHCPOffer, DHCPRequest, DHCPDiscover Answer: a. DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck 13. If you want a computer to query DNS by appending more than one domain name to the computer name, which of the following should you configure? a. DNS suffix b. DNS zone c. Additional DNS suffixes d. DNS record Answer: c. Additional DNS suffixes 14. Which port does your Web browser use to communicate securely with the Web server by using SSL? a. 80 b. 21 c. 25 d. 443 Answer: d. 443 15. Why should you set the "Register this connection’s addresses in DNS" option? a. To enable DNS query logging b. So that the computer’s name and address are added to the DNS database automatically c. To restrict DNS updates d. To disable DNS for the connection Answer: b. So that the computer’s name and address are added to the DNS database automatically 16. Which is the correct syntax for mapping drive letter W to a shared folder named Accounting on the Finance server? a. net use W: FinanceAccounting b. net map W: FinanceAccounting c. net connect W: FinanceAccounting d. net link W: FinanceAccounting Answer: a. net use W: FinanceAccounting 17. A text file containing a list of commands is called which of the following? a. Script file b. Command file c. Configuration file d. Batch file Answer: d. Batch file 18. The default protocol Windows uses to share folders is which of the following? a. FTP b. SMB c. NFS d. AFP Answer: b. SMB 19. Which of the following refers to a Windows server with Active Directory installed? a. File server b. Application server c. Domain controller d. Web server Answer: c. Domain controller 20. Which of the following best describes an NAS? a. A dedicated device designed to provide shared storage for network users b. A general-purpose server with attached storage c. A server used for database management d. A type of cloud storage service Answer: a. A dedicated device designed to provide shared storage for network users 21. Which of the following is an element of a DNS server? (Choose all that apply.) a. Zone b. Root hints c. Forwarding address d. Cache Answer: a. Zone b. Root hints 22. If you want one server to take over the processing of a server that has failed, what should you configure? a. Load balancer b. Failover cluster c. Backup server d. Redundant array Answer: b. Failover cluster 23. Software that creates and monitors the virtual hardware environment is called what? a. Virtual Machine Manager b. Hypervisor c. Virtualization Engine d. Virtual Hardware Controller Answer: b. Hypervisor 24. Bare-metal virtualization is best for desktop virtualization. True or False? a. True b. False Answer: b. False 25. If you want your virtual machine to have direct access to the physical network, which virtual network option should you configure? a. Bridged b. NAT c. Host-only d. Internal network Answer: a. Bridged Challenge Labs Challenge Lab 8-1 • What filter did you use to capture only DHCP packets? The filter string should be “udp port 69.” • What commands did you use to create the DHCP request packets? The ipconfig /release command releases the current address. This packet shouldn’t be captured. The ipconfig /renew command requests a new DHCP lease. • List the packets created when your computer made the DHCP request; you can find packet descriptions in the Info column of Wireshark. DHCPDiscover, DHCPOffer, DHCPRequest, DHCPAck • What type of packets were created in the DHCP request: unicast, multicast, or broadcast? Broadcast • Capture the packets involved in the DHCP renewal of the address lease. What packets were created (based on the description in the Info column of Wireshark), and were they unicast, multicast, or broadcast? DHCPRequest and DHCPAck packets were created. They’re unicast packets. Challenge Lab 8-2 • What advantages do you see in using an .iso file instead of a physical DVD to install an OS? Answers will vary, but students should state that it’s not necessary to burn a DVD or have a working DVD-ROM drive on the host system, and the .iso file can be shared from a network location. • List three examples of using hosted virtualization in a business environment Answers will vary but might include the ability to run older OSs required for legacy applications while running the latest OS on the host system. In addition, VMs can be used for training, trying out new applications, and delivering applications on preconfigured VMs. • What disadvantages do you see with using hosted virtualization? Answers will vary but might include that the host system must have more memory and a faster CPU to use virtualization. Case Projects Case Project 8-1 Answers will vary. Students should include information about the maximum volume sizes of each file system and special attributes (for example, whether they support features such as permissions, compression, quotas, and encryption). Case Project 8-2 Automatic IP address configuration: Requires the DHCP service. Name resolution: Requires the DNS service. Centralized account management: A directory service is needed, such as Active Directory. Ability to store files in a centralized location easily: A file-sharing service is needed. Case Project 8-3 This situation calls for virtualization. Virtual machines for each OS can be created on a host computer, and the software can be installed on each guest OS and tested. Case Project 8-4 Answers will vary. Some questions might include the following: • What applications will the server need to run? • Will you need infrastructure services, such as DHCP and DNS? • How many clients must the server support? • What server OS is running in the other offices? • Do you need remote access? • Do you use now or do you plan to use virtualization? Solution Manual for Guide to Networking Essentials Gregory Tomsho 9781111312527, 9781305105430, 9788131502136

Document Details

Related Documents

Close

Send listing report

highlight_off

You already reported this listing

The report is private and won't be shared with the owner

rotate_right
Close
rotate_right
Close

Send Message

image
Close

My favorites

image
Close

Application Form

image
Notifications visibility rotate_right Clear all Close close
image
image
arrow_left
arrow_right