This Document Contains Chapters 4 to 6 Network+ Guide to Networks, 6th Edition Chapter 4 Solutions Review Questions 1. Which of the following occurs at the Network Access layer of the TCP/IP model? a. Routing b. Address translation c. Password authentication d. Signaling 2. What field in an IPv4 packet can be used to indicate that a packet should be routed before any other packets? a. Flags field b. Identification field c. Differentiated Services field d. Fragment offset field 3. What happens to an IPv6 packet when its hop limit reaches 0? a. It is retransmitted by the connectivity device that last received it. b. It is bounced back to its source node. c. It is discarded. d. It is assigned a new hop limit. 4. Before you connect to your office network, you want to verify that your workstation’s TCP/IPv6 protocols are functioning. Which of the following addresses do you ping? a. ::1 b. FE08::0 c. 0::0 d. 1::1 5. What is the function of ARP? a. To acknowledge that a data frame was received b. To obtain the IP address of a host, then map that IP address to a registered domain name c. To measure the number of dropped packets in a single transmission d. To obtain the MAC address of a host, and then map that MAC address to the host's IP address 6. Which of the following applications would be best suited to multicasting? a. Sending e-mail to your coworker b. Participating in a company-wide video conference via the Internet c. Updating an inventory database d. Logging on to a host over the Internet 7. Suppose you have a workstation that uses the IP address 203.12.176.55 on a traditional IPv4 network. To what network class does the workstation belong? a. A b. B c. C d. D 8. How many bytes are used for an IPv4 address? a. 4 b. 16 c. 31 d. 64 9. Suppose your computer's IP address is 155.61.9.188, and your network administrator has not subnetted the network to which you're connected. What is your computer's subnet mask? a. 255.0.0.0 b. 255.255.0.0 c. 255.255.255.0 d. 255.255.255.255 10. Suppose you send data to the 11111111 11111111 11111111 11111111 IP address on an IPv4 network. To what device(s) are you transmitting? a. Your own device b. All devices that are reachable c. All devices on your network segment d. Your domain name server 11. Suppose you send data to an address that begins with the Format Prefix FF0E on a network running IPv6. To what device(s) are you transmitting? a. All devices on your network segment b. All devices that are reachable c. Your own device d. Your domain name server 12. If you are connected to a network that uses DHCP, and you need to terminate your Windows workstation's DHCP lease, which of the following commands would you use? a. ipconfig /term b. ipconfig /exit c. ipconfig /release d. ipconfig /stop 13. At a minimum, what fields would you find in a hosts file? a. IP address and MAC address b. IP address and host name c. IP address and subnet mask d. Host name and MAC address 14. What devices are the highest authorities in the domain name system hierarchy? a. Root servers b. Top-level domain routers c. IANA-operated gateways d. Authoritative hosts 15. Which of the following DNS records identifies a mail server? a. mail1 IN A 178.99.201.12 b. mailserver IN AAAA 178.99.201.12 c. mail1 IN MX 178.99.201.12 d. mailserver IN PTR 178.99.201.12 16. On a client/server network running TCP/IPv4, what computer initiates the process of assigning an IP address through DHCP? a. The DHCP server b. The gateway c. The client's primary authentication server d. The client 17. You issue a transmission from your workstation to the following socket address on your LAN: 10.1.1.145:110. Assuming your network uses standard port designations, what Application layer protocol are you using? a. FTP b. POP c. Telnet d. HTTP 18. You are the network manager for a computer training center that allows clients to bring their own laptops to class for learning and taking notes. Clients need access to the Internet, so you have configured your network's DHCP server to issue them IP addresses automatically. What DHCP option should you modify to make sure you are not wasting addresses that were used by clients who have completed a class and no longer need them? a. The number of available addresses in the DHCP pool b. The subnet mask for client computers, to isolate their group of IP addresses c. The priority with which DHCP address requests are handled by the server d. The lease duration for client computers 19. Which of the following IP addresses might have been assigned by APIPA? a. 169.180.23.5 b. 255.254.254.0 c. 192.285.128.3 d. 255.127.0.0 20. You have just set up a new wireless network in your house, and you want to determine whether your Linux laptop has connected to it and obtained a valid IP address. Which of the following commands will allow you to find the information you need? a. ifconfig /all b. ifconfig -a c. ifconfig -n d. ifconfig /net Hands-On Projects Project 4-1 In this project, students learn how to view and modify TCP/IP properties via the command line on a Windows XP, Vista, or 7 workstation. Steps 1 – 3: Students should obtain the results of a simple ipconfig command issued from a C: prompt. Steps 4 – 5: Students observe the output of an ipconfig /all command. Steps 6 – 8: Students learn how to release and renew a DHCP-assigned address. Project 4-2 In this project, students learn how to use the graphical interface in Windows 7 to view the same information they found through the command line in Project 4-1. They also learn how to modify the DHCP settings in the TCP/IP configuration of a workstation running Windows 7 via the graphical user interface. Steps 1 – 6: Students access the TCP/IP properties for a LAN interface. Steps 7 – 11: Students modify the configuration by entering a static IP address and default gateway. Step 12: Students observe how their changes affected the output of the ipconfig /all command. Steps 13 – 14: Students access the LAN interface’s TCP/IP configuration once more, this time to restore the default values. Steps 15 – 19: Students view detailed information about their TCP/IP connection using the Windows 7 graphical interface. Project 4-3 In this project students experiment with the ping command. Note that the exercise can be conducted on a computer running the Windows XP, Vista, or 7 operating system. Steps 1 – 3: Students run a simple loopback test by pinging the address 127.0.0.1 and note the TTL values. Steps 4 – 7: Students attempt to ping an external host by both its hostname and IP address, noting the information returned by the command. Project 4-4 In this project students become familiar with the DNS cache stored on a Windows computer. Steps 1 – 2: From the command prompt, students use the ipconfig command to view the current contents of the DNS cache, noting how many and what type of resource records appear. Step 3: Students clear the cache. Step 4: Students attempt to view the cache once again, but because it is empty now, they receive an error message. Step 5: Students re-fill the local DNS cache by accessing some Web pages. Step 6: Students view the DNS cache once more to see what kind of name and IP address associations now appear after the names of the Web sites were resolved. Case Projects Case Project 4-1 Students should demonstrate an understanding of the main hazard of using statically assigned IP addresses, which is the potential for two nodes to be assigned the same address, causing transmission difficulties for one or both nodes. Next, students should be able to name the steps involved in changing a Windows workstation’s TCP/IP settings, so that it will rely on DHCP. Case Project 4-2 Although the students will have to respond to the bank president’s questions in general terms, after re-reading the chapter and conducting additional research they should be able to list advantages of switching to IPv6, including the benefits of autoconfiguration, better traffic prioritization and delivery assurance, better inherent security, and a virtually endless supply of IP addresses. On the other hand, transitioning to IPv6 is not always seamless. Students should understand, after some research, that the bank will need to purchase equipment that supports both IPv4 and IPv6 for its transition. It will also need to ensure that all of its applications and TCP/IP services also support IPv6. It will have to coordinate with other organizations with which it’s connected to determine how to handle their IPv4 or IPv6 traffic. The bank will also have to devise a new addressing approach for its network. Case Project 4-3 The student could verify the loan officer’s IPv6 connectivity using the ipconfig /all command, the ping command, or by checking the network adapter properties through the Windows graphical interface. In responding to the loan officer’s concerns, the student should demonstrate ways of calmly assessing a situation and communicating clearly with a client. The student might first express empathy, realizing how frustrating it is for people who are not computer experts to be faced with a problem that’s utterly new and mysterious. Next the student could explain the diagnostic steps that he or she took to verify the workstation’s connectivity. The student could train the loan officer to perform those same steps when he suspects his computer isn’t connected to the network. Finally, the student could provide the loan officer with a way of supplying useful feedback the next time the problem occurs. Case Project 4-4 The inability to access a Web site could be caused by TCP/IP problems at several points in the transmission from the loan officer’s computer to the Web site. For example, the loan officer’s TCP/IP properties could be configured incorrectly or not bound to his network interface, his computer could be disconnected from the bank’s LAN, the bank’s LAN could be having internal problems or problems connecting to the Internet, a failure at the bank’s ISP could be causing the connection to fail, or indeed, the problem might be that the loan provider’s Web site (or network) is down. To rule out the first possibility, that the loan officer’s TCP/IP properties are configured incorrectly or not bound to his network interface, the student should suggest pinging the loopback address. If this test is successful, the next steps are pinging the bank’s main router to rule out a problem on the bank’s LAN and pinging the loan provider’s Web site to determine whether it responds. Network+ Guide to Networks, 6th Edition, Lab Manual Chapter 4 Solutions Lab 4.1 Review Questions 1. What class of network did you configure in this activity? a. Class A b. Class B c. Class C d. Class D 2. What is the purpose of a subnet mask? a. To indicate which protocols a particular network uses b. To further subdivide a network c. To mask, or prevent access to, portions of a network d. To limit the protocols used in a particular network 3. A network has a subnet mask of 255.255.255.0. How many usable IP addresses are available for network hosts? a. 65,535 b. 65,534 c. 256 d. 254 4. Assuming that it has the default subnet mask, why can’t you assign the IP address 192.168.54.255 to a host? a. This address is reserved for multicast. b. This address is reserved for experimental uses. c. This address describes the network. d. This address is the broadcast address. 5. Which of the following commands can you use in Windows to display information about the subnet mask configured for a particular NIC? a. ipconfig b. ping c. cmd d. netstat Lab 4.2 Review Questions 1. What was the IP address the Windows computer obtained in Step 23? Answers may vary but should be between 192.168.54.10 and 192.168.54.200. 2. When does the DHCP lease you obtained in this lab expire? 10 days after the lab 3. Which of the following are valid methods of assigning IP addresses to workstations, servers, and network devices? (Choose all that apply.) a. Manual configuration b. DHCP c. BOOTP d. POST 4. You would like to assign a WINS server to each workstation. Can you accomplish this via DHCP? Yes 5. Your colleague placed a second DHCP server on the network by mistake. What might happen as a result? (Choose all that apply.) a. The second DHCP server might lease duplicate addresses to some hosts. b. The second DHCP server might give its clients incorrect settings. c. DHCP might stop working on the first DHCP server. d. You might need to configure IP addresses on some hosts manually. 6. Which of the following information could not be given out by a DHCP server? a. WINS server address b. DNS server address c. Default gateway d. Additional network protocols to be used 7. All of the following configuration information can be supplied by a DHCP server. Which of the following cannot be supplied by APIPA? (Choose all that apply.) a. IP address b. Subnet mask c. DNS servers d. Default gateway Lab 4.3 Review Questions 1. What is the purpose of a name server? a. To maintain the DNS database for an entire zone b. To supply clients with IP address resolution for requested hosts c. To track and record all TCP/IP host name information for a network d. To track and record all NetBIOS naming information for a network 2. What is the term for the group of devices that a name server manages? a. Hierarchy b. Tree c. Zone d. Directory 3. Which of the following are examples of top-level domains? (Choose all that apply.) a. .net b. .com c. .uk d. .aut 4. When a DNS server retrieves the host name associated with an IP address, what type of lookup is it accomplishing? a. Forward b. Adjacent c. Backward d. Reverse 5. What is one advantage of using DNS instead of hosts files? a. DNS does not require manual updating of files on multiple networked nodes. b. DNS is more compatible with Linux systems. c. DNS maps both NetBIOS and TCP/IP host names to IP addresses, whereas hosts files map only TCP/IP host names to IP addresses. d. Using DNS is more secure than using hosts files. Lab 4.4 Review Questions 1. Which of the following commands would you type at the ftp> prompt to copy a file named “textfile.doc” from your C:\ directory to an FTP server? a. copy “textfile.doc” b. put C:\textfile.doc c. get C:\textfile.doc d. move C:\textfile.doc 2. On what Transport layer protocol does FTP rely? a. TCP b. UDP c. ICMP d. NTP 3. What is the term for an FTP site that allows any user to access its directories? a. Anonymous b. Restricted c. Private d. Unlimited 4. What command allows you to list the contents of a directory on an FTP server? a. list b. lf c. ls d. la 5. What would you type at the ftp> prompt to view a list of available FTP commands? (Choose all that apply.) a. list b. ? c. help d. commands 6. What two file types can you specify when transferring files via FTP? a. ASCII and binary b. Alphabetical and numeric c. Program and data d. Dynamic and static Lab 4.5 Review Questions 1. What symbol is used to separate the computer name from the port number in a URL (assuming that IP version 4 is in use)? a. ; b. : c. # d. . 2. What is the default port number for the FTP service? a. 20 b. 21 c. 22 d. 23 3. What is the default port number for the HTTP service? a. 40 b. 44 c. 60 d. 80 4. What range of port numbers comprises the well-known port numbers? a. 0 to 64 b. 0 to 128 c. 0 to 1023 d. 0 to 8880 5. What is a socket? a. A virtual connector that associates a URL with its IP address b. A method of identifying the IP addresses belonging to clients as they connect to servers c. A logical address assigned to a specific process running on a computer d. A discrete unit of data 6. Which of the following addresses could represent the SMTP service using its default port on a mail server? a. 188.65.79.80:25 b. 188.65.79.80...24 c. 188.65.79.80$24 d. 188.65.79.80;25 Lab 4.6 Review Questions 1. It is prudent to install and bind all four major protocol suites on your server, regardless of whether they are going to be used. True or False 2. Why would a network administrator choose to disable one of two network interface cards on a server? a. It is infrequently used. b. It is faulty. c. It is not as fast as the other one. d. It is incapable of handling certain protocols. 3. A computer uses both the IPX/SPX and TCP/IP protocols. Which of the following would be true if IPX/SPX were disabled? a. Clients would not be able to access the server’s resources via IPX/SPX. b. Clients would not be able to access the server at all. c. Only those clients running TCP/IP would be able to access the server’s resources. d. Clients would be able to access the server’s resources via both TCP/IP and IPX/SPX, but TCP/IP-based services would be slower. 4. Why would a network administrator choose to unbind a protocol on a server? a. It is only occasionally used, and as long as it remains bound, it uses server resources. b. It is no longer used, and as long as it remains bound, it uses server resources. c. It is interfering with traffic using other protocols. d. It has proven to be unstable with certain applications. 5. Besides TCP/IP, what must be bound to a client’s NIC before the client can log on to a Windows Server 2008 server? a. Client for Microsoft Networks b. Gateway Services for NetWare c. IPX/SPX d. NWLink 6. Why is NetBEUI not routable? a. It does not contain a subprotocol at the Application layer of the OSI model. b. It does not contain Network layer addressing information. c. It is incompatible with modern routing techniques. d. Its data frames are too large and slow to be practically routed. Network+ Guide to Networks, 6th Edition Chapter 5 Solutions Review Questions 1. Which of the following topologies is susceptible to signal bounce? a. Partial-mesh b. Bus c. Ring d. Full-mesh 2. What type of topology is required for use with a 100Base-TX network? a. Bus b. Star c. Mesh d. Ring 3. Your school’s network has outgrown its designated telco rooms, so you decide to house a few routers in an old janitor’s closet temporarily. However, since the closet has no power outlets, you will have to supply the routers power over the network. If you’re lucky, your LAN already uses which of the following Ethernet standards that will allow you to do that? a. 100Base-FX b. 1000Base-T c. 1000Base-LX d. 10GBase-LR 4. What is the minimum cabling standard required for 10GBase-T Ethernet? a. MMF b. Cat 3 c. Cat 5 d. Cat 6 5. Why is packet switching more efficient than circuit switching? a. In packet switching, packets are synchronized according to a timing mechanism in the switch. b. In packet switching, two communicating nodes establish a channel first, then begin transmitting, thus ensuring a reliable connection and eliminating the need to retransmit. c. In packet switching, small pieces of data are sent to an intermediate node and reassembled before being transmitted, en masse, to the destination node. d. In packet switching, packets can take the quickest route between nodes and arrive independently of when other packets in their data stream arrive. 6. You are part of a team of engineers who work for an ISP that connects large data centers, telephone companies, and their customers throughout California and Oregon. Management has decided that the company can make large profits by promising the utmost QoS to certain high-profile customers. Which of the following switching methods will best guarantee the promised QoS? a. Circuit switching b. MPLS c. Packet switching d. Message switching 7. What happens in CSMA/CD when a node detects that its data has suffered a collision? a. It immediately retransmits the data. b. It signals to the other nodes that it is about to retransmit the data, and then does so. c. It waits for a random period of time before checking the network for activity, and then retransmits the data. d. It signals to the network that its data was damaged in a collision, waits a brief period of time before checking the network for activity, and then retransmits the data. 8. Which of the following backbone types is the most fault-tolerant? a. Parallel backbone b. Collapsed backbone c. Distributed backbone d. Serial backbone 9. What is the purpose of padding in an Ethernet frame? a. Ensuring that the frame and data arrive without error b. Ensuring that the frame arrives in sequence c. Ensuring that the data portion of the frame totals at least 46 bytes d. Indicating the length of the frame 10. You are designing a 100Base-T network to connect groups of workstations in two different offices in your building. The offices are approximately 250 meters apart. If you only use repeating devices to connect the workstation groups, how many hubs will you need? a. One b. Two c. Three d. Four 11. On a 10Base-T network, which of the following best describes how the wires of a UTP cable are used to transmit and receive information? a. One wire pair handles data transmission, while another wire pair handles data reception. b. One wire in one pair handles data transmission, while the other wire in the same pair handles data reception. c. Three wires of two wire pairs handle both data transmission and reception, while the fourth wire acts as a ground. d. All four wires of two wire pairs handle both data transmission and reception. 12. What technique is used to achieve 1-Gbps throughput over a Cat 5 cable? a. All four wire pairs are used for both transmission and reception. b. The cable is encased in a special conduit to prevent signal degradation due to noise. c. Signals are issued as pulses of light, rather than pulses of electric current. d. Data is encapsulated by a unique type of frame that allows rapid data compression. 13. Which of the following Ethernet standards is specially encoded for transmission over WANs using SONET technology? a. 100Base-T b. 10GBase-ER c. 100Base-FX d. 10GBase-SW 14. Which two of the following might cause excessive data collisions on an Ethernet network? a. A server on the network contains a faulty NIC. b. A router on the network is mistakenly forwarding packets to the wrong segment. c. The overall network length exceeds IEEE 802.3 standards for that network type. d. A switch on the network has established multiple circuits for a single path between two nodes. e. The network attempts to use two incompatible frame types. 15. In which of the following examples do the workstations necessarily share a collision domain? a. Two computers connected to the same hub b. Two computers connected to the same switch c. Two computers connected to the same router d. Two computers connected to the same access server 16. What are the minimum and maximum sizes for an Ethernet frame? a. 46 and 64 bytes b. 46 and 128 bytes c. 64 and 1518 bytes d. 64 and 1600 bytes 17. Which of the following network technologies does not use circuit switching? a. ATM b. Ethernet c. T-l d. ISDN 18. Which of the following is the type of 10-Gigabit Ethernet that can carry signals the farthest, nearly 25 miles? a. 10GBase-T b. 10GBase-ER c. 10GBase-LR d. 10GBase-SR 19. The maximum segment length for a 1000Base-FX network depends on which two of the following? a. Voltage b. Wavelength c. Frame type d. Priority labeling e. Fiber core diameter 20. The data services company you work for has decided to become an ISP and supply high-capacity Internet connections from its data center. Currently, the data center relies on a 100-BaseFX backbone, but your boss demands that the backbone be upgraded to 10GBase-LR. What kind of infrastructure changes would this require? a. None, since fiber-optic cabling and connectivity devices, including multiplexers, are already in place. b. The fiber-optic cabling will need to be upgraded, but the same connectivity devices and multiplexers can be used. c. The fiber-optic cabling can be reused, but the connectivity devices and multiplexers must be replaced. d. The fiber-optic cabling, connectivity devices, and multiplexers must be replaced. Hands-On Projects Project 5-1 This project offers students the opportunity to view traffic passing through an interface on an Ethernet network via the protocol analyzer program, Wireshark. Wireshark, which is a useful tool for troubleshooting and evaluating network performance, is available at no cost from www.wireshark.org. Steps 1 – 17: Students download Wireshark from the www.wireshark.org Web site and install it on their Windows 7 workstation. (However, steps for downloading Wireshark and using it on another Windows operating system, or on a Linux system, are very similar). Note: Steps for downloading and installing Wireshark were current as of the text’s writing; however, the Wireshark software is regularly updated. Therefore, links and downloading instructions might differ. Although installation and use of Wireshark software has been consistent over the years, due to software updates, it is possible that steps for viewing captured data within Wireshark could also differ from those written in this project. Steps 18 – 26: Students launch Wireshark and capture a small stream of data. Note: If classroom workstations have multiple interfaces, make certain students select the correct interface for capturing data in Step 20. Steps 27 – 38: Students view the data that they captured in previous steps. Answers to questions in these steps will vary according to the network and the Web pages students choose to access. Project 5-2 In this project, students continue to use Wireshark, with an emphasis on analyzing the traffic that they’ve captured and generating statistics for that traffic. As with Project 5-2, this project is written for use with a Windows 7 workstation, but steps are very similar for other Windows and Linux systems. Step 1: Students generate traffic. Steps 2 – 10: Students generate statistics for the traffic they captured according to different variables. Steps 11 – 15: Students analyze traffic in a single stream. Project 5-3 In this project students take a stab at drawing a simple network and identifying different types of Ethernet connections. They also Steps 1-9: Students draw a LAN with two routers, two switches, two hubs, and multiple clients. Step 10: Students identify and count each collision domain. They should find 20 total. Step 11: Students identify and count each broadcast domain. They should find 2 total. Step 12: Students identify which portions of the network are the busiest and least busy. For the former, they should indicate the collision domains that include the hub and its workstations. For the latter, they should identify the collision domains that include each printer. Step 13: Students should indicate that this is a serial backbone. Step 14-15: Students should suggest eliminating the hubs and replacing them with switches, increasing the speed of connections between nodes and switches to at least Fast Ethernet. They might also suggest increasing the speed of the connection between the routers to 1GB, recognizing that each speed increase will require at least new modules, if not new connectivity devices. Case Projects Case Project 5-1 The children’s museum should upgrade to 1GB Ethernet—for example, 1000Base-T—so that the multimedia displays will perform quickly on demand and without fail. Using copper cabling is probably sufficient for this small LAN, and that way the added costs of fiber-optic cabling can be avoided. If the wiring is still Cat 3, it should be upgraded to at least Cat 5 and preferably Cat 6a. Workstation NICs—and in some cases the workstations themselves—will also need to be upgraded. Students should recognize that providing more throughput than might be absolutely necessary in the short term will ensure that the network will not need upgrading again for several years, thus saving cost and downtime in the long run. On the network’s backbone, switches could be used to separate the public (exhibit workstations) and private (employee) sides of the network. Case Project 5-2 Students should perform research to determine the cost of 1GB switches and NICs (and sufficient Cat 6a cabling, if necessary). They should also price out the cost of new workstations. Chances are, students will find that for such a small network, it is possible to purchase everything within the $10,000 limit (at the time of this text’s writing). However, when asked to prioritize, they should choose first the upgraded connectivity devices and NICs/workstations for the exhibits, then upgraded infrastructure for staff. It is also possible to purchase reconditioned devices and NICs at much lower cost. Case Project 5-3 Students should research lead-times on equipment purchases. In many cases, standard devices and NICs can be ordered overnight, which might tempt the student to promise s/he can upgrade the network in two weeks. However, an experienced networking professional knows that equipment is often delayed, no matter what the vendor promises, or it might arrive damaged. Upgrades often experience unanticipated problems. In other words, projects take longer than predicted by the best-case scenario. The student should prepare to tell the museum director that it’s unwise to try upgrading the network in such a short time. S/he can justify the caution by pointing out that having a patron visit when the network is in the process of a failed upgrade would be worse than a visit when the network is only somewhat likely to perform slowly. In addition, during the holiday break, the network won’t be as busy as it would be during business hours, and the chances of network congestion are minimized. Network+ Guide to Networks, 6th Edition, Lab Manual Chapter 5 Solutions Lab 5.1 Review Questions 1. What is an advantage of using a parallel backbone over a collapsed backbone? a. A collapsed backbone requires too many connecting devices. b. A parallel backbone uses redundant connections and is more reliable. c. A collapsed backbone uses redundant connections, which costs more money. d. A parallel backbone uses fewer redundant connections, which costs less money. 2. What is the purpose of using the routing protocol in this lab? a. Each server can choose a different path when the current path fails. b. The network administrator does not have to configure static routes. c. It has no purpose. d. Each server saves the appropriate IP addresses in its ARP cache. 3. Which of the following is true about the use of parallel backbones in real-life networks? a. Parallel backbones are used when redundant connections are not possible. b. Parallel backbones are used whenever possible because they are so inexpensive. c. Parallel backbones only work in Ethernet networks. d. Parallel backbones are used for important servers and networks because they are more expensive to build. 4. In this lab, you configured the hubs and the two servers in a ring. How does the topology in this lab differ from a ring topology such as token ring? (Choose all that apply.) a. Each host transmits when necessary. b. A single workstation or server in a simple ring topology could take down the entire ring. c. Each host passes a token to the next host. d. The topology in this lab is an example of an active topology. 5. Which of the following network technologies has built-in redundancies? a. Token ring b. Gigabit Ethernet c. FDDI d. 10Base-2 Ethernet Lab 5.2 Review Questions 1. Does the network you built in this lab meet the requirements for the hubs that you used? Why or why not? No, if 100-Mbps hubs are used. Yes, if 10-Mbps hubs are used. The network must meet the standard for the form of Ethernet being used. 2. What type of port connects one hub to another in a daisy-chain fashion? a. Output port b. Patch panel port c. Uplink port d. External port 3. When connecting hubs in a daisy-chain fashion on a 100Base-T network, what is the maximum number of hubs you may connect? a. 2 b. 3 c. 4 d. 5 4. When connectivity devices are connected in a daisy-chain fashion, what type of backbone do they create? a. Parallel b. Serial c. Collapsed d. Distributed 5. What type of network access method is used on a ring network? a. CSMA/CA b. CSMA/CD c. Demand priority d. Token passing 6. Which of the following is the most popular hybrid topology used on modern Ethernet networks? a. Star-wired bus b. Star-wired ring c. Ring-wired star d. Bus-wired star 7. What is risky about daisy-chaining hubs on a 100Base-T network? (Choose all that apply.) a. Too many hubs cause errors in addressing data for its proper destination. b. Too many hubs cause the network to exceed its maximum length. c. Too many hubs increase the attenuation of a data signal. d. Too many hubs increase the possibility for errors in data encryption and decryption. Lab 5.3 Review Questions 1. What is the purpose of the checksum? a. To ensure that data arrives in the proper sequence b. To ensure that data is properly encrypted and decrypted c. To ensure that data arrives at its intended destination d. To ensure that data arrives intact 2. How many times is a checksum calculated when a frame of data is sent from a source computer to a destination computer that resides on the same segment? a. 1 b. 2 c. 3 d. 4 3. What type of address identifies the source of data in a frame? a. MAC b. Logical c. Network d. Host 4. What is the purpose of padding in an Ethernet frame? a. To ensure that the data in the frame is exactly 1500 bytes long b. To ensure that the data in the frame is no more than 46 bytes long c. To signal that the frame has ended d. To ensure that the data in the frame is at least 46 bytes long 5. What is the minimum size of an Ethernet frame? a. 56 bytes b. 64 bytes c. 128 bytes d. 256 bytes 6. Which parts of an Ethernet frame are Wireshark and other protocol analyzers unlikely to capture? (Choose all that apply.) a. The header b. The Frame Check Sequence c. The padding d. The preamble Lab 5.4 Review Questions 1. Which of the following is true about the major types of Ethernet frames? a. Each frame operates at the Network layer. b. Each frame contains the destination and source MAC addresses. c. Each frame has a different maximum size. d. Each frame uses a preamble at the end of the frame to signal the end of the frame. 2. This access method is used by all Ethernet networks. a. MPLS b. SDF c. PoE d. CSMA/CD 3. Which information is not included in an Ethernet Frame’s 14-byte header? a. Frame check sequence b. Source address c. Destination address d. Ethernet type 4. The largest possible data field in an Ethernet frame is: a. 500 bytes b. 1000 bytes c. 1500 bytes d. 2000 bytes 5. This is the most common Ethernet Frame type used on modern networks. a. Ethernet II b. Ethernet 802.3 c. Ethernet 802.2 d. Ethernet SNAP Network+ Guide to Networks, 6th Edition Chapter 6 Solutions Review Questions 1. Which of the following utilities could you use to force the NIC on your Linux server to use full-duplex transmission? a. ipconfig b. ifconfig c. iftool d. ethtool 2. Which of the following is a significant advantage to using an SFP interface on a router rather than an on-board NIC? a. The SFP will be capable of higher throughputs. b. The SFP can be added or removed without affecting operations, thus allowing for customization and future upgrades. c. The SFP can accept multiple types of connectors, allowing the router to connect two disparate network types. d. The SFP promises greater security, as it can encrypt and decrypt data. 3. You and a friend decide to set up Fast Ethernet networks in your respective houses to connect a half-dozen computers at each location. Both of you will connect your networks to high-speed Internet connections. As the connectivity device for end nodes, you purchase a router, whereas your friend uses an old, but functional, 12-port hub he found at a garage sale. Which of the following will your network do that your friend’s network won’t do? a. Filter traffic based on IP address. b. Transmit data from any one of the connected computers to any other. c. Create a VLAN out of some of the computers to isolate their transmissions and prevent them from affecting other connections. d. Allow other connectivity devices to be added to the network in the future. 4. You are a network technician working on a 100Base-T network. A coworker has been having trouble logging on to the server and asks whether you can quickly tell her if her workstation’s NIC is operating properly. You do not have the NIC’s utility disk on hand, but you look at the back of her workstation and learn that although the NIC is properly installed and connected to the network, something’s wrong with it. What might you have seen that causes you to come to this conclusion? a. Its activity LED is blinking green. b. Its loopback plug is improperly terminated. c. It has two types of receptacles—SC and RJ-45—and the wrong one is in use. d. None of its LEDs are lit. 5. How do bridges keep track of whether they should forward or filter frames? a. From each frame they receive, they extract source addresses; those frames whose source addresses don’t belong to the bridge’s broadcast domain are filtered. b. They hold each frame until it is requested by the destination node, at which time the bridge forwards the data to the correct segment based on its MAC address. c. They maintain a filtering database that identifies which frames can be filtered and which should be forwarded, based on their destination MAC address. d. They compare the incoming frame’s network address to known addresses on both segments and filter those that don’t belong to either. 6. Which of the following distinguishes switches from repeating devices, such as hubs? a. Switches separate collision domains. b. Switches separate broadcast domains. c. Switches can alert the network administrator to high data collision rates. d. Switches do not examine Network layer protocol information, which makes them faster than repeating devices. 7. In cut-through switching, which frame field does the switch never read? a. Start frame delimiter b. Source address c. Frame check sequence d. Protocol type 8. What potential problem does STP (Spanning Tree Protocol) address? a. An excess of erroneously short packets b. A broadcast storm c. Network congestion due to a router failure d. Slow convergence time 9. You are asked to configure a backbone switch that connects servers supplying oceanic and atmospheric data to mariners and pilots around the world. Your network’s traffic load is very high at all times, day and night. What type of switching do you configure the switch to use? a. Bypass switching b. Store-and-forward switching c. Cut-through switching d. Message switching 10. Suppose your company’s network contains two separate VLANs. Computer A is on the Customer Service VLAN and Computer B is on the Warehouse VLAN. Besides a Layer 2 switch, what device is required for Computer A and Computer B to exchange data? a. Repeater b. Bridge c. Multiplexer d. Router 11. In STP, what device acts as a guide to setting the best paths between switches? a. Root bridge b. Workgroup bridge c. Parent bridge d. Link bridge 12. What switching technique allows you to funnel traffic belonging to more than one VLAN through a single switch interface? a. Jamming b. Route capturing c. Trunking d. Multiplexing 13. Which of the following identifies the VLAN to which each piece of data belongs? a. A shim added to each packet’s header b. An envelope that encapsulates each packet c. A tag added to each frame’s header d. A FCS added to each packet’s header 14. Which of the following routing protocols is used on the Internet’s backbone? a. EIGRP b. OSPF c. BGP d. RIP 15. Which of the following types of routing protocols allows routers to exchange information about best paths with their neighboring routers only? a. Link-state b. Hybrid c. Distance-vector d. All of the above 16. Why is a large, busy network more likely to use dynamic routing? a. Because dynamic routing is the default option on most routers, and it is difficult to configure routers to use static routing b. Because dynamic routing is the only routing method compatible with the BGP routing protocol, which is necessary for routing between WANs c. Because dynamic routing allows for stricter IP filtering and, therefore, offers greater data security than static routing d. Because dynamic routing automatically selects the most efficient route between nodes, reducing the possibility for human error 17. A packet on a network using the RIP routing method has been passed from one connectivity device to another 15 times. What happens when it gets passed to one more device? a. It is returned to the node that originally transmitted it. b. It is encapsulated by the routing protocol and retransmitted. c. It is forwarded to its destination by the last device. d. It is discarded. 18. Which of the following factors is not considered when OSPF determines the best path for a packet? a. Link failure b. Number of hops c. Throughput d. Latency 19. What is a router’s convergence time? a. The time a router takes to interpret Layer 2 addressing information for any given frame b. The maximum amount of time a router is allowed for choosing the best path c. The time it takes for a router to recognize a best path in the event of a change or network outage d. The time it takes for border routers to exchange routing table information 20. At which layers of the OSI model are gateways capable of functioning? a. Layers 1 and 2 b. Layers 2 and 3 c. Layers 1, 2, and 3 d. At all layers Hands-On Projects Project 6-1 In this project, students learn how to install a NIC on a Windows 7 workstation. Steps 1 – 7: Students remove existing NIC drivers via the System and Security window. Steps 8 – 9: Students physically install a new NIC in the computer and observe what happens when the computer boots up. Step 10: If the NIC is installed properly, its LEDs (typically, green and orange) will blink to indicate that it’s receiving power and exchanging traffic on the network (if it is connected to the network properly). Conversely, if no LEDs are lit, the NIC is not installed or connected properly. Project 6-2 In this project students install drivers for the NIC they physically installed in Project 6-1. Although the Windows OS will automatically install a driver for most NICs, it’s also useful for students to learn how to install a new driver. Students should refer to the chapter text for steps on installing NIC software. At the end of the project, students should verify that their NIC is operating properly. Project 6-3 In this project, students create a simple VLAN on a Cisco switch using the IOS’s command prompts. (Alternately, students could try using a Cisco IOS simulator such as GNS3.) At the end of the project, in Steps 21-28, students connect a Windows 7 computer to the VLAN port and assign it a static IP address to test whether their VLAN works. Case Projects Case Project 6-1 Students should be aware that as long as they can log on to routers and switches, they don’t need physical access to these devices to learn a lot about a network. For instance, viewing routers’ access lists and routing tables will show how the routers interconnect with other routers, what routing protocols are in use, and what types of clients and devices they accept connections from. The switches’ configurations will show VLAN configuration (including ports that belong to each VLAN), switching methods, STP settings, etc. Configurations on both types of devices will show what connection speeds and access methods are in use. Case Project 6-2 Students should create a simple network diagram that includes all the listed hardware. Each piece of equipment should be labeled. Each location should be identified. Connections between devices and connections between clients and connectivity devices should also be clearly identified. Case Project 6-3 Students should explain how VLANs can separate traffic and therefore, contribute to security for an isolated group of clients. Students should also understand that routers will be necessary for the Accounting group’s VLAN to exchange data with other clients on the ConnectSpree network. In this project, students add to the simple network diagram they began in Case Project 6-2 to show the VLAN and how it connects to the network backbone. Case Project 6-4 Because it’s an ISP, ConnectSpree will rely on Internet connections with higher bandwidth and, probably, redundant connections. This means edge routers will also need the capacity to handle redundant connections and fast throughput (at least, and probably greater than, 1Gbps). The ISP might also rely on multiple edge routers. The routers will run BGP, rather than interior routing protocols, for Internet connections. In addition to Internet gateways, the ISP might operate mail gateways and gateways devoted to managing converged services, such as VoIP. Network+ Guide to Networks, 6th Edition, Lab Manual Chapter 6 Solutions Lab 6.1 Review Questions 1. What effect might an incorrect duplex setting have on a NIC? (Choose all that apply.) a. Errors b. Collisions c. Retransmitted frames d. incorrect theoretical transmission speed 2. In the same dialog box in which you configured transmission speed and duplex settings, it is also possible to change the physical address of a NIC. What might happen if you were to do so? a. No devices could connect to that NIC because of its new physical address. b. TCP/IP communication would be normal immediately after the change. c. IPX/SPX communication would be normal after the ARP cache entries on other hosts timed out. d. TCP/IP communication would be normal after the ARP cache entries on other hosts timed out. 3. Changing the duplex setting on a NIC is the same as changing its physical address. True or False 4. You have just attached a server to a new network. However, the server’s throughput is lower than expected. Why might this be? (Choose all that apply.) a. The server is running the wrong routing protocol. b. The server’s duplex setting is incorrect, and many frames are retransmitted. c. The server’s transmission speed setting is incorrect. d. The server NIC’s physical address is incorrectly configured. 5. What effect do duplex settings have on a server’s routing protocols? a. None, the routing protocols operate at the Transport layer. b. None, the routing protocols operate at the Network layer. c. Mismatched duplex settings cause collisions and retransmissions. d. Mismatched duplex settings cause TCP/IP to fail altogether. Lab 6.2 Review Questions 1. Which of the following devices operates only at the Physical layer of the OSI model? a. NIC b. Hub c. Bridge d. Router 2. What type of address does a router interpret? a. Physical address b. MAC address c. Block ID d. Network address 3. Which of the following connectivity devices takes the most time to interpret the data frames it receives? a. Hub b. Bridge c. MAU d. Router 4. On a typical 100Base-T network, where would you find transceivers? a. In the NICs b. In the operating systems c. In the UPSs d. In the cabling 5. Which of the following is a difference between a router and a hub? a. A router is less sophisticated than a hub. b. A router operates at the Transport layer of the OSI model, whereas a hub operates at the Data Link layer of the OSI model. c. A router operates at the Network layer of the OSI model, whereas a hub operates at the Physical layer of the OSI model. d. A router regenerates signals, whereas a hub interprets addressing information to ensure that data is directed to the proper destination. 6. In which of the following networking scenarios would a router be the optimal connectivity device? a. A home network with five users who want to share documents that are stored on one of the five workstations b. A WAN that connects a college physics department with a classroom in a high school on the other side of town c. A LAN that connects 10 users, a server, and a printer at a small business d. A peer-to-peer LAN that connects eight users to provide a shared database 7. What is the most likely purpose of the hubs in this lab? a. To connect the computer to different networks b. To determine by checking the link lights whether the NIC was installed correctly c. To determine by checking the link lights whether you configured the IP addresses on the NICs correctly d. To allow the NICs to operate at the Network layer Lab 6.3 Review Questions 1. What is the purpose of a routing table on a TCP/IP-based network? a. To associate the NetBIOS names of nodes with their IP addresses b. To associate the IP addresses of nodes with their host names c. To associate the IP addresses of nodes with their locations on the network d. To associate the host names of nodes with their MAC addresses 2. Which of the following most fully describes what a successful response from the ping command indicates? a. A node is powered on. b. A node is physically connected to the network. c. A node is running the Windows Server 2008 operating system. d. A node is connected to the network and is running TCP/IP successfully. 3. What does the tracert command show? a. The path taken by packets to the destination address b. The MAC address of the destination address c. Whether the remote host supports TCP/IP d. The operating system run by the host at the destination address 4. What command would you use to add a node’s IP address, subnet mask, and network location interface to a routing table? a. Route add b. Add host c. Add node d. Route open 5. In the default ping command on a computer running Windows, how many replies do you receive if the test is successful? a. 1 b. 2 c. 3 d. 4 6. What menu option sequence would you choose to set up Routing and Remote Access Services on a Windows Server 2008 computer? a. Start, Control Panel, Network Connections, Routing and Remote Access b. Start, Administrative Tools, Routing and Remote Access c. Start, All Programs, Accessories, Routing and Remote Access d. Start, Control Panel, Routing and Remote Access Lab 6.4 Review Questions 1. What does RIP stand for? a. Regulated Interaction Protocol b. Routing Information Protocol c. Response Interpretation Protocol d. Registered Installation Protocol 2. To determine the best path to transfer data, routers communicate using routing protocols such as TCP/IP. True or False 3. What additional routes did you find in Step 29? 172.16.1.0 with a subnet mask of 255.255.255.0 and 172.16.1.1 with a subnet mask of 255.255.255.255 4. Which routing protocol is commonly used for Internet backbones? a. OSPF b. RIP for IP c. EIGRP d. BGP 5. When might the best path not equal the shortest distance between two nodes? (Choose all that apply.) a. A communications link has been recently added to the network. b. A communications link is suffering congestion. c. A router experiences routing protocol errors. d. The media on the shortest path is slower than the media on the best path. 6. Which protocol was developed by Cisco Systems and has a fast convergence time but is supported only on Cisco routers? a. OSPF b. RIP for IP c. EIGRP d. BGP 7. What does OSPF stand for? a. Open shortest path first b. Overhead system path forwarding c. Overlook system packet forwarding d. Open session peer first Lab 6.5 Review Questions 1. Which of the following could serve as firewalls? (Choose all that apply.) a. A modem b. A Windows Server 2008 computer c. A hub d. A Linux server 2. A firewall can run a routing protocol like a router. True or False 3. What is the highest level of the OSI model in which a firewall can operate? a. Data Link b. Network c. Transport d. Application 4. A gateway connects two different types of networks, two different types of communications protocols, or two different computer architectures. Which of the following is not considered a gateway? a. A router connecting a token ring b. A computer translating application data from TCP/IP to IPX/SPX c. A computer translating voice signals into data and transmitting it over a TCP/IP network d. A file and print server communicating with clients using both TCP/IP and IPX/SPX 5. You have configured a device that runs the OSPF routing protocol but whose primary purpose is to prevent unwanted Internet traffic from reaching your company’s LAN. Which of the following is true about this device? a. It is a router because it runs a routing protocol. b. It is a router because its primary purpose is to control traffic. c. It is a firewall because it runs a routing protocol. d. It is a firewall because its primary purpose is to control traffic. 6. Which of the following statements about a bridge is false? a. Without IP addressing information, a bridge cannot be seen with the tracert command. b. Bridges require no Layer 3 addressing. c. Bridges decide which packets to forward based on their Layer 3 headers. d. Bridges operate at the Data Link layer. Solution Manual for Network+ Guide to Networks Tamara Dean 9781133608196, 9781133608257, 9781337569330
Close