Preview (10 of 33 pages)

This Document Contains Chapters 1 to 3 Network+ Guide to Networks, 6th Edition Chapter 1 Solutions Review Questions 1. Which of the following is an advantage of using a client/server network over using a peer-to-peer network? a. A client/server network is simpler to set up. b. A client/server network allows resources to be managed centrally. c. A client/server network does not require a network operating system. d. A client/server network is less expensive to set up. 2. What is the primary function of a file server on a client/server network? a. It monitors how many users are logged on to a WAN. b. It manages access and use of shared applications and data. c. It prevents unauthorized remote users from connecting to a LAN. d. It routes traffic between two or more LANs. 3. Suppose you wanted to share documents among several computers in your household in a peer-to-peer fashion. You could do that by properly configuring which of the following types of software? a. Word-processing software b. Remote authentication software c. Mail client software d. Operating system software 4. The first services widely used by networks were: a. Fax services b. Network management services c. Mail services d. File and print services 5. On a client/server network, clients and servers usually require what to communicate? a. A connectivity device b. A Web site c. A remote access server d. A mail server 6. Your colleague, in describing the benefits of a client/server network, mentions that it’s more scalable than a peer-to-peer network. What does she mean by this? a. The client/server network can be more easily expanded. b. The client/server network is simpler to set up. c. The client/server network can be run on free software. d. The client/server network allows more users to log on at one time. 7. In which of the following environments would a WAN be most appropriate? a. A large data center in which each employee’s access is centrally controlled b. A global hotel chain connecting its reservation desks to a central call center c. A home office connecting its personal computers between the den, living room, and bedroom d. A local newspaper connecting to a global news agency's Web site 8. Which of the following refers to the combination of voice (such as telephone), video, and data signals sent over the same network? a. Switching b. Remote access c. Convergence d. Network management 9. In networking, what does a packet refer to? a. An electrical signal b. A unit of data c. An alarm d. A way to connect a node with a network 10. How can a server distinguish between many clients on a network? a. Each client is identified by a unique network address. b. Each client regularly transmits a signal that indicates its network location and unique client characteristics. c. Each client has a different electromagnetic characteristic to its signal, similar to differences in human voices. d. Each client uses uniquely modified versions of the same network protocol. 11. What device connects a client computer to a network's medium, such as a wire? a. Network line extender b. Network terminator c. Network junction clip d. Network interface card 12. What elements of a network ensure that data arrive at their intended destination in the correct sequence? a. Rings b. Backbones c. Protocols d. File servers 13. The physical layout of nodes on a network is known as the network's: a. Topology b. Schematic c. Formation d. Grid 14. Which of the following is an example of a mail service? a. Preventing unauthorized users from gaining access to the network and, in particular, to its mail server b. Ensuring that users are not running more copies of an e-mail client than have been purchased c. Exchanging messages between mail servers on different networks d. Enabling users to print messages from their e-mail client software 15. Which of the following network topologies is most common on today's networks? a. Ring b. Fan c. Star d. Bus 16. Security is a concern when using remote access servers on a network because: a. Access servers enable computers to connect to a network and obtain access to its resources, thereby exposing the network to the outside world. b. Access servers have poor password enforcement capabilities and rely on users to choose good passwords. c. Access servers cannot accept encoded data transfers, requiring users to transmit plain text to and from the network. d. Access servers are difficult to understand and support, and so many networks are using them incorrectly and perhaps insecurely. 17. Which of the following is an example of asset management on a client/server network? a. Ensuring that sensitive data is secured from unauthorized access b. Assessing the peak activity times on a server and ensuring extra processing power is available at those times c. Backing up critical data files on a regular basis d. Determining how many handheld computers are in a company’s warehouse 18. Distributing data transfer activity equally over several devices or components belongs to which category of network management services? a. Traffic monitoring b. Load balancing c. Address management d. File and print services 19. Apache is a popular example of what type of networking software? a. License tracking b. Web server c. Backup d. Mail server 20. What organization sponsors the CCNA and CCIE certifications? a. Cisco b. CompTIA c. IEEE d. WITI Hands-On Projects Project 1-1 • Steps 1 – 2: After drawing a simple network diagram, students should demonstrate an understanding of the bus topology and peer-to-peer networking concepts. • Steps 3 – 4: Students should demonstrate an understanding of the star topology and the path data would follow in a peer-to-peer network using this topology. • Steps 5 – 6: Students should become familiar with how nodes are added to a star topology network, then demonstrate how a peer-to-peer network can be transformed into a client/server network. They should also begin to visualize how data travels on a client/server network. • Steps 7 – 9: Students should demonstrate how a star-bus topology network is created and begin to visualize how data travels over such a network. • Step 10: Based on students’ experience in sketching some different network types, they should conclude that a network based on a star or star-bus topology is simpler to expand than a bus topology network. • Step 11: Students should see that a simple bus topology network requires less cabling and connectivity hardware than the star or star-bus topology networks. Project 1-2 • Steps 1 – 7: Students should become familiar with the steps they’ll commonly use to access networking parameters when adding new network components, modifying network connection and component configurations, and troubleshooting client network problems on a client running the Windows 7 operating system. • Steps 8 – 12: Students will learn how to share a workstation’s public folders with a Homegroup, a task that might be necessary when setting up a peer-to-peer network in a simple home office or small office environment. Project 1-3 Results from the students’ job searches in this project will vary. However, students should get a sense of which networking skills and specialties are in demand. This project also further familiarizes students who are new to networking with the popular hardware and software products they’ll encounter. Case Projects Case Project 1-1 Since Thrift Towne wants an inexpensive solution, does not have many users, and does not care much about security, a peer-to-peer network is an adequate option (though a client/server network would necessarily not be incorrect). In order to make this solution work, the file sharing and access on each computer will need to be modified. If a client/server solution is suggested, one computer should be designated as the server. Whether a peer-to-peer or client/server architecture is selected, each computer ought to be supplied with a Network Interface Card (NIC). All necessary cabling will also need to be obtained. This is potentially all the extra software or hardware Thrift Towne would need to purchase in order to implement a peer-to-peer network. Case Project 1-2 The type of network services that can help Scoops determine what type of traffic is crossing their network belong to the network management category of functions. By using various network management tools, Scoops can find out the precise amount of traffic at any time, when the heaviest amount of traffic occurs, and each transmission’s source, destination, and protocol type. After analyzing this data, the IT staff at Scoops can decide if all the traffic is legitimate and necessary. If it is, they can use the traffic volume information to determine whether they need to upgrade their network’s capacity. Given Scoops’ network configuration, it probably also requires file and print services, security services (because of sales and employee data), and possibly mail and Internet services. Case Project 1-3 Answers will vary, but after researching the differences between Windows Server 2008 and Debian Linux, students should be able to identify the similarities and differences in how the two operating systems handle file sharing, remote access, and mail services. (For example, what software each supports for these services, the ease of configuration, and the type of customer support to expect.) The decision to recommend the use of Linux is also subjective and might depend on the students’ perception of the ease with which Linux can be managed, compared to Windows Server 2008. Network+ Guide to Networks, 6th Edition, Lab Manual Chapter 1 Solutions Lab 1.1 Review Questions 1. Which of the following best describes a network’s physical topology? a. the method by which multiple nodes transmit signals over a shared communications channel b. the physical layout of a network c. the distance spanned by a network’s cable and wireless infrastructure d. the software used to ensure reliable connections between nodes on a network 2. Which of the following is the most popular type of modern network architecture for businesses? a. client/server b. terminal/mainframe c. peer-to-peer d. mainframe/dial-up 3. Which of the following elements is not required for a client to connect to a server on a client/server LAN? a. protocols b. media c. e-mail account d. client software 4. Which of the following are capable of acting as a network server? (Choose all that apply.) a. Windows XP Professional b. Windows Server 2008 c. Windows 7 d. Linux/UNIX 5. Network protocols are used to do which of the following? (Choose all that apply.) a. ensure reliable delivery of data b. determine the nearest printer for a print job c. interpret keyboard commands d. indicate the source and destination addresses for data packets 6. On a client/server network, clients may have only one protocol installed at any time. True or False? 7. A significant difference between the peer-to-peer and client/server network types is that a peer-to-peer network: a. is more difficult to set up b. does not allow for resource sharing between workstations c. does not usually provide centralized management for shared resources d. is more secure 8. Why is it necessary for each client on a client/server network to have a unique address? Otherwise, the device on the network won’t know where to send packets. Lab 1.2 Review Questions 1. What physical topology would you use to create your peer-to-peer network where all the workstations are connected to a single hub or switch? a. bus b. tree c. star d. cube 2. Which of the following operating systems allow you to create a peer-to-peer network from a group of workstations? (Choose all that apply.) a. MS-DOS b. Windows XP Professional c. Linux d. Windows 7 3. Which of the following components are not necessary to create a peer-to-peer network from a group of workstations? (Choose all that apply.) a. client operating system b. NIC or motherboard with onboard NIC c. network media d. Web browser e. network operating system 4. What is the primary difference between peer-to-peer and client/server architectures? Client/server resources are centralized, whereas peer-to-peer resources are not. 5. On a peer-to-peer network consisting of four Windows XP workstations, each user can individually control which of her local data files she wants to share with other users. True or False? Lab 1.3 Review Questions 1. Which of the following are or could be shared as resources across a network? (Choose all that apply.) a. Microsoft Word and other Office software b. printers c. documents d. network interface cards 2. Even in a client/server network, it is possible to share documents between individual users’ computers as you can in a peer-to-peer network. True or False? 3. You are the network administrator for a small company. When users take vacations, they would like to allow other users to update the files stored on their computers. In addition, several users have complained that they accidentally deleted important files on their local computer and would like some way to recover them. How would you recommend that they store their files? a. Make multiple copies on their local hard drive. b. Store the files on the server, which is backed up nightly. c. Make copies of the file on a USB thumb drive. d. Burn the files onto a CD. 4. A very large organization might have thousands of servers. Do the benefits of client/server networks still apply to such an organization? a. No, because managing so many servers is difficult. b. No, because the organization can rely on a large peer-to-peer network to share files instead. c. Yes, because it is easier to manage thousands of servers than it is to manage the hundreds of thousands of workstations such an organization might have. d. Yes, because managing thousands of servers is no more difficult than managing a few servers. 5. In this lab, what kind of network service did you configure on your client/server network? a. management service b. mail service c. Internet service d. file service 6. Which two of the following issues make peer-to-peer networks less scalable than client/server networks? a. Each time a new user is added, the peer-to-peer network cabling must be reinstalled between nodes. b. Adding nodes to a peer-to-peer network results in diminished overall network performance. c. Adding nodes to a peer-to-peer network increases the risk that an intruder can compromise a shared data folder. d. Adding new resource-sharing locations and ensuring that all authorized users have access to new resources becomes less manageable as the peer-to-peer network grows. Lab 1.4 Review Questions 1. Many printers come with network cards so that they do not need to be attached to a computer. How would the process of sharing such a printer differ from sharing a printer attached to a computer? (Choose all that apply.) a. You would need to configure the printer with an address so that other computers can find it. b. The process would not differ. c. You would have to add the printer to the Windows Server 2008 domain, just as you did the Windows computer in Lab 1.3. d. You would not need to connect the printer to another computer via a cable. 2. Users may share printers in a peer-to-peer network. What are the potential disadvantages of this? (Choose all that apply.) a. A user could easily misconfigure or turn off his workstation, preventing all other users from accessing the attached printer. b. No one will be able to use the printer if the network is down. c. The printer will not be backed up. d. The printer will not be under centralized control. 3. In this lab, what kind of network service did you configure on your client/server network? a. management service d. mail service c. print service d. file service 4. Suppose that you configured software on a Windows Server 2008 computer that checked printers on the network to make sure that they were operating correctly. What sort of network service would this software provide? a. file service b. print service c. management service d. mail service 5. How can you tell whether a printer is shared or not? a. The word shared is written on the printer icon. b. There is no way to tell. c. There is a small icon at the bottom of the printer icon. d. Each shared printer appears in the Shared Printers folder. Network+ Guide to Networks, 6th Edition Chapter 2 Solutions Review Questions 1. Your supervisor has asked you to correct several cable management problems that might be slowing down the network. Which organization’s standards will guide you in assessing your firm’s current cabling situation? a. ISO b. ITU c. TIA/EIA d. IEEE 2. Which technology does the IEEE 802.11 specification describe? a. Network security b. Ethernet LANs c. Logical Link Control d. Wireless networks 3. You are configuring clients to communicate over an Ethernet LAN. Which of the following IEEE specifications will identify which frame type your client should use? a. 801.2 b. 802.3 c. 802.11 d. 801.16 4. Which layer of the OSI model is responsible for issuing acknowledgments (ACKs)? a. Application layer b. Data Link layer c. Network layer d. Transport layer 5. Suppose your network is connected to another network via a router. Which OSI model layer provides the information necessary to direct data between the two networks ? a. Data Link layer b. Physical layer c. Network layer d. Session layer 6. In which two layers of the OSI model do NICs belong? a. Presentation and Application layers b. Transport and Network layers c. Network and Data Link layers d. Physical and Data Link layers 7. Which OSI model layer is responsible for keeping open a communications path between your computer and the server when you dial in to a remote access server? a. Session layer b. Data Link layer c. Presentation layer d. Physical layer 8. Under what circumstances would the Transport layer use segmentation? a. When too many data frames are flooding into a receiving node’s NIC b. When more than 10 percent of transmitted frames are damaged c. When the destination node cannot accept the size of the data blocks transmitted by the source node d. When the source node requests that data blocks be segmented for faster processing 9. Which OSI model layer generates and detects voltage so as to transmit and receive signals carrying data? a. Physical layer b. Data Link layer c. Network layer d. Transport layer 10. An IP address is an example of what type of address? a. Physical layer b. Network layer c. MAC sublayer d. Data Link sublayer 11. If the TCP protocol did not receive an acknowledgment for data it transmitted, what would it do? a. Issue its own acknowledgment, indicating to the recipient that it did not receive the acknowledgment it expected b. Issue a warning frame to tell the recipient it would retransmit the data if it did not receive the acknowledgment within a certain time frame c. Reestablish the connection with the recipient d. Retransmit the data to the recipient 12. Which part of a MAC address is unique to each manufacturer? a. The destination ID b. The OUI c. The physical node ID d. The SYN 13. What is the purpose of the trailer field added to a frame in the Data Link layer? a. To indicate the sum of the error-checking algorithm b. To signal the rate at which a node can receive the data c. To mark the end of a frame d. To represent the frame’s sequence number 14. Which layer of the OSI model encapsulates Network layer packets? a. Physical layer b. Session layer c. Data Link layer d. Transport layer 15. At what OSI model layer do protocols manage data delivery priorities? a. Presentation layer b. Session layer c. Transport layer d. Network layer 16. What are the sublayers of the Data Link layer as defined in the IEEE 802 standards? a. Logical Link Control sublayer and Media Access Control sublayer b. Transport Control sublayer and Media Access Control sublayer c. Logical Link Control sublayer and Physical Addressing sublayer d. Transport Control sublayer and Data Link Control sublayer 17. Suppose that, at the receiving node, a frame’s FCS doesn’t match the FCS it was issued at the transmitting node. What happens as a result? a. The receiving node’s Transport layer assesses the error and corrects it. b. The transmitting node’s Data Link layer assesses the error and corrects it. c. The receiving node’s Data Link layer requests a retransmission. d. The transmitting node’s Transport layer immediately issues a replacement frame. 18. In which of the following situations would it be most desirable to use a connectionless Transport layer protocol? a. When retrieving a spreadsheet from a busy file server b. When viewing a movie on the Web c. When connecting to a graphics-intensive Web site d. When sending an e-mail message to a long list of recipients 19. Which of the following would be found in a Data Link layer header? a. The packet’s fragmentation offset b. The packet’s sequence number c. The source’s logical address d. The source’s physical address 20. By default, what is the largest data payload that packets on an Ethernet network can accept? a. 64 bytes b. 128 bytes c. 1500 bytes d. 2400 bytes Hands-On Projects Project 2-1 In this project, students become familiar with the role of IEEE in setting networking standards. They also learn how to find the IEEE standards that are available online. Finally, by viewing a popular IEEE standard, they become familiar with the content and scope of an IEEE standards document. Project 2-2 This project provides students with a way to make tangible the invisible and theoretical process of data transformation through the OSI Model layers. By drawing PDUs at each layer, students will strengthen their understanding of each layer’s function and establish a mental image they can later recall. Project 2-3 This project provides students with two methods of discerning the MAC address of a Windows or Linux workstation, a skill they might use when troubleshooting network problems. Sections 1 and 2, Steps 1 – 4: Students obtain the physical address of their Windows or Linux workstations electronically. Section 3, Steps 1 – 9: Students obtain the physical address of their workstations by viewing the NIC’s printed sticker. Note: If a network administrator has changed the NIC’s MAC address through a configuration utility, these two addresses will not match. Case Projects Case Project 2-1 Students should answer that because two different frame types cannot directly exchange information on a network, the NIC’s configuration must be returned to its original settings (using Ethernet frames) to communicate on the network. In addition, students should be able to explain why policies to restrict changes on shared lab computers are important. Case Project 2-2 The student’s drawing should illustrate that at the Application layer, HTTP initiates a request from the Web client to the Web server (and later, interprets the resulting response). Next, the request for the Web page data will follow the same process of requesting, translation, security, session negotiation, routing, error-checking, addressing, and framing down through the OSI model layers as described in the example of a mail message request in the chapter. Case Project 2-3 A network architect is typically most interested in Layers 1 through 4 of the OSI model. Students should understand that designing a network with routers requires a complete understanding of Network layer functions and network addressing. Higher layer problems, including encoding or session problems, require a closer look at how the software or operating system of a device is interacting with the network or with other nodes on the network. Network+ Guide to Networks, 6th Edition, Lab Manual Chapter 2 Solutions Lab 2.1 Review Questions 1. A host has been overwhelming your Web server. You look up the IP address on www.arin.net to determine its owner, but ARIN’s Web site tells you that LACNIC owns the IP address. What should you do? a. Complain to the owner of the www.lacnic.net Web site. b. Look up LACNIC in the Regional Internet Registry. c. Look up the owner of the IP address on the LACNIC Web site. d. Look up the owner of the IP address on the APNIC Web site. 2. What might happen if no organization were responsible for IP addressing on the Internet? (Choose all that apply.) a. Organizations might try to use the same ranges of IP addresses. b. Addressing on the Internet would be physically impossible. c. Nothing d. The Internet would use another protocol besides IP. 3. You look up an IP address on www.arin.net and two organizations are listed. What does this mean? a. The two organizations share the IP address assignment. b. One organization sold the IP address to the second. c. The RIR made a mistake. d. One organization delegated the IP address to the second. 4. What is a Regional Internet Registry responsible for? a. Maintaining Internet connectivity b. Registering Internets c. Assigning IP addresses d. Signing up users with ISP accounts 5. Which of the following are situations when contacting the owner of an IP address would be useful? (Choose all that apply.) a. A host outside your network has been attempting to log on to your servers without your permission. b. A host inside your network has been attempting to log on to your servers without your permission. c. A host outside your network has been attempting to send large amounts of unsolicited commercial e-mail, or spam. d. A host outside your network has been accessing your Web site once an hour. Lab 2.2 Review Questions 1. Which of the following information is included in the results of the ping command? (Choose all that apply.) a. The operating system used by the remote computer b. The IP address or name of the remote computer c. The number of packets that were lost d. The time it took for the reply to be received 2. Which of the following commands can you use to print information about a computer’s Network layer configuration? a. netstat b. ipconfig c. arp d. ping 3. How can you verify that two hosts are connected and communicating properly? a. From one host, run the ping command to the other host. b. From a third host, run the ping command to both hosts. c. Run the arp command on both hosts. d. Run the ipconfig command on both hosts. 4. What type of protocol does the ping command use? a. TCP/IP b. UDP c. ICMP d. ARP 5. A Dynamic Host Control Protocol (DHCP) server can be used to assign IP addresses automatically. Why might this be useful to a network administrator? The administrator doesn’t have to manually configure large numbers of IP addresses on workstations. 6. On many networks, DHCP is used to assign workstations their IP addresses. However, DHCP is rarely used to assign addresses for servers. Why? a. DHCP is too expensive. b. DHCP is not scalable enough. c. Servers are frequently moved around, whereas workstations are not. d. Workstations are frequently moved around, whereas servers are not. Lab 2.3 Review Questions 1. What do the first six characters of a MAC address indicate? a. The device ID assigned by the vendor b. The block ID assigned by IEEE c. The logical address assigned by DHCP d. The logical address assigned by DNS 2. Which of the following is a valid MAC address? a. 01-ba-cd-dh-83-21 b. 01-ba-cd-de-83-21-42 c. 01-ba-cd-de-83-21-42-a0 d. 01-ba-cd-de-83-21 3. Which of the following commands can you use to find a Windows XP computer’s MAC address from a command prompt window on that computer? a. ipconfig b. ipconfig /all c. arp -a d. netstat 4. Which of the following commands can you use to find the MAC address of another computer on the same network? a. ipconfig b. ipconfig /all c. arp -a d. netstat 5. Under what circumstances is it possible for a computer to have more than one MAC address? a. Never b. If a computer has more than one NIC c. If a computer has more than one NIC, but only if it is acting as a router d. If a computer is a router 6. You have just replaced the NIC on a server, making no other changes. It can communicate with all the computers on its network but one. What is the most likely explanation for this? a. The new NIC is not working properly. b. Both computers have the same MAC address. c. The remote computer has the old MAC address entry in its ARP cache. d. The remote computer has a bad NIC. 7. Which of the following is a function of the Data Link layer? a. Arranging data in proper sequence at the destination b. Encrypting data prior to transmission c. Dividing data into distinct frames d. Issuing electrical signals onto a wire 8. What part of a data frame checks to make sure that the data arrived exactly as it was sent? a. CRC b. Start delimiter c. Payload d. Padding Lab 2.4 Review Questions 1. What protocol does Remote Desktop Connection use? a. ICMP b. TCP c. UDP d. IP 2. About which protocols does the netstat -s command print information? (Choose all that apply.) a. ARP b. ICMP c. TCP d. UDP 3. At what layer of the OSI model does TCP work? a. Physical layer b. Data Link layer c. Network layer d. Transport layer 4. At what layer of the OSI model does IP work? a. Physical layer b. Data Link layer c. Network layer d. Transport layer 5. A user is having difficulty connecting to a remote Web site. After the user attempts to connect, the netstat command tells you that the connection state is established. Where in the OSI model is the problem probably located? a. The Data Link layer b. The Network layer c. The Transport layer d. Somewhere above the Transport layer 6. Why doesn’t the netstat command display any information about ICMP connections? a. ICMP does not function at the Transport layer. b. ICMP is not a true protocol. c. ICMP is a connectionless protocol. d. ICMP is considered unimportant. Lab 2.5 Review Questions 1. At what layer in the OSI model were the source and destination addresses for the packet in Step 11 located? The Data Link layer 2. In the frame you examined in Steps 9 through 14, which portions of the packet calculated a CRC checksum? What layers of the OSI model do they correspond to? Ethernet (Data Link) and ICMP (Transport) 3. A user is unable to reach your company’s Web site. From the user’s workstation, you can ping the remote Web server. How might you use Network Monitor or another network protocol analyzer to troubleshoot the problem? (Choose all that apply.) a. By checking to see if the workstation is sending packets to the Web server b. By checking to see if the server is sending packets to the workstation c. By checking the workstation’s IP configuration d. By checking the workstation’s ARP configuration 4. Which protocols can be seen using Network Monitor? (Choose all that apply.) a. ICMP b. ARP c. TCP d. UDP 5. About which OSI layer does Network Monitor not provide information? a. Physical layer b. Data Link layer c. Network layer d. Transport layer Network+ Guide to Networks, 6th Edition Chapter 3 Solutions Review Questions 1. What is different about the method used to boost a digital signal’s strength, compared with the method of boosting an analog signal’s strength? a. A digital signal requires an amplifier, which increases the strength of both the noise and the signal, and an analog signal requires a repeater, which retransmits the signal in its original form. b. A digital signal requires a repeater, which increases the strength of both the signal and the noise it has accumulated, and an analog signal requires an amplifier, which retransmits the signal in its original form. c. A digital signal requires a repeater, which retransmits the signal in its original form, and an analog signal requires an amplifier, which increases the strength of both the signal and the noise it has accumulated. d. A digital signal requires an amplifier, which introduces noise into the signal, and an analog signal requires a repeater, which retransmits the signal in its original form. 2. Which of the following decimal numbers corresponds to the binary number 00001001? a. 3 b. 5 c. 7 d. 9 3. A wave with which of the following frequencies would have the longest wavelength? a. 10 MHz b. 100 MHz c. 1 GHz d. 100 GHz 4. Ethernet relies on which of the following transmission types? a. simplex b. half-simplex c. half-duplex d. full-duplex 5. In wavelength division multiplexing, two modulated signals are guaranteed to differ in what characteristic? a. Throughput b. Color c. Amplitude d. Phase 6. Which of the following can increase latency on a network? a. An EMI source, such as fluorescent lighting b. The use of full-duplex transmission c. The use of multiple protocols d. Adding 50 meters to the length of the network 7. What part of a cable protects it against environmental damage? a. Sheath b. Braiding c. Plenum d. Cladding 8. You are helping to install a cable broadband system in your friend’s home. She wants to bring the signal from where the service provider’s cable enters the house to a room on another floor, which means you have to attach a new cable to the existing one. What type of cable should this be? a. RG-6 b. RG-8 c. RG-58 d. RG-59 9. With everything else being equal, a network using which of the following UTP types will suffer the most cross talk? a. Cat 3 b. Cat 5 c. Cat 6a d. Cat 7 10. Which of the following is not a source of EMI? a. Power line b. Megaphone c. Microwave oven d. Fluorescent lights 11. Which of the following network transmission media offers the highest potential throughput over the longest distances? a. MMF b. SMF c. UTP d. STP 12. In which of the following network links might you use MT-RJ connectors? a. A coaxial connection between a cable modem and a server b. A UTP connection between a workstation and a hub c. A wireless connection between a handheld computer and a desktop computer d. A fiber-optic connection between a server and router 13. Fiber-optic cable networks can span much longer distances than copper-based networks before requiring repeaters because: a. they use wavelength division multiplexing. b. their signals never require amplification. c. they are resistant to noise such as EMI. d. their signals do not suffer degradation no matter how small the cable’s bend radius. 14. What is the purpose of cladding in a fiber-optic cable? a. It reflects the signal back to the core. b. It protects the inner core from damage. c. It shields the signal from EMI. d. It concentrates the signal and helps keep it from fading. 15. Which of the following is a potential drawback to using fiber-optic cable for LANs? a. It is expensive. b. It cannot handle high-bandwidth transmissions. c. It can carry transmissions using only TCP/IP. d. It is not yet an accepted standard for high-speed networking. 16. In what part of a structured cabling system would you find users’ desktop computers? a. Telco room b. MDF c. IDF d. Work area 17. Every user at one location on your company’s WAN is unable to reach the Internet. Your colleague on the network management team suspects a critical router is unable to connect to the network. Because you’re in the building affected by the outage, she asks you to troubleshoot the router. You confirm that the router is not responding to any requests over the network. Which of the following do you use to connect directly from your laptop to the router to diagnose it? a. An RG-6 cable b. An RG-58 cable c. A serial cable d. An SMF cable 18. What is the maximum distance specified in the structured cabling standard for a horizontal wiring subsystem? a. 10 m b. 90 m c. 100 m d. 200 m 19. How many wire pairs can a single 110 block terminate? a. 55 b. 110 c. 200 d. It depends on the type of 110 block. 20. Your campuswide WAN is experiencing slow Internet response times. When you call your Internet service provider to ask if they can troubleshoot the problem from their end, they warn you that their responsibilities end at the demarc. What do they mean? a. They will not diagnose problems beyond your organization’s MDF. b. They will not diagnose problems beyond your organization’s entrance facilities. c. They will not diagnose problems beyond your organization’s IDF. d. They will not diagnose problems beyond your organization’s telco rooms. Hands-On Projects Project 3-1 This project allows students to practice converting numbers from binary to decimal and vice versa. It uses numbers that will become familiar to them in subsequent chapters as they learn about broadcast addresses, gateways, etc. Answers to binary-to-decimal conversions in Step 3: 254 1 127 128 192 255 Answer to decimal – to binary conversions in Step 4: 00000000 00001010 00111000 01000000 01100000 11100000 11111100 Project 3-2 This project acquaints students with the tools used to crimp cables. Students will attempt to create a straight-through patch cable, and then use that cable to log onto a network from a client. Remind students that this is a skill that comes with practice, and it is not uncommon for their first few attempts to fail. Project 3-3 In this project, students have the opportunity to witness how damaged cables can affect throughput and functionality. Encourage students to think of and try other ways of damaging cables (for example, pinching, bending, twisting, and so on) and testing the effects of such damage. Note: It isn’t essential that the two computers used in this project be a Windows client and a Windows server, as long as the two would be able to otherwise communicate directly. Case Projects Case Project 3-1 The medical instrument company’s campus layout and desire for videoconferencing suggests the need for a MAN with high bandwidth capabilities. Fiber-optic cable is the best choice for media to interconnect sites on this MAN. Specifically, students should indicate singlemode fiber as most appropriate for the backbone. The Sales Department would benefit from the high bandwidth capabilities of fiber-optic cable for its video training. Meanwhile, personnel in the Fulfillment Department would benefit from handheld wireless computers that communicate to an access point attached to the MAN. This will allow workers to be mobile while uploading data. Case Project 3-2 Answers will vary widely, but costs per mile for a rural project could range from $12,000-$40,000. (Laying new fiber in a densely populated area would cost much more. However, if the company were located in a city, it probably wouldn’t need to lay new fiber. Instead, it could lease private lines over existing fiber.) Students should also understand that the total cost will depend on the type of fiber cable installed and also, that labor constitutes a much greater portion of the cost than the actual cable. Additional costs that might not be obvious from the start include municipal permits and fees (right-of-way, environmental), surveys, added insurance, and potential productivity losses due to downtime during the switchover. Case Project 3-3 The student should be able to identify the hazards of a disorganized and poorly wired telco room: data errors resulting from improper termination, excessive segment lengths, or stretched cables; difficulty troubleshooting transmission problems when ports and cables are unlabeled and disorganized; and increased problems during and after network expansion. Case Project 3-4 The handhelds’ intermittent connectivity problems could be caused by any one or a combination of the following factors: excessive interference due to the high volume of handhelds trying to share a frequency band, the fully stocked shelves causing more reflection and diffraction than usual, or EMI emitted from nearby machinery. One way to rule out the possibility of faulty handheld devices is to bring the handhelds nearer to the access point and away from obstructions and interference and find out whether the connectivity problems go away. Network+ Guide to Networks, 6th Edition, Lab Manual Chapter 3 Solutions Lab 3.1 Review Questions 1. What type of connector does a 100Base-T network require? a. RJ-11 b. BNC c. AUI d. RJ-45 2. Which of the following is commonly used to protect UTP cable from EMI? a. Conduit b. STP c. Crossover cable d. Lead shielding 3. What is the maximum throughput of a 100Base-TX network? a. 5 Mbps b. 10 Mbps c. 50 Mbps d. 100 Mbps 4. On a 10Base-T network, attenuation is addressed through the use of which of the following? a. Amplifiers b. Multiplexers c. Repeaters d. RF generators 5. What is the maximum allowable segment length on a 1000Base-T network? a. 85 feet b. 85 meters c. 185 feet d. 100 meters 6. Which of the following contributes to latency? a. The twist ratio of the cable b. Cable length c. EMI d. Attenuation Lab 3.2 Review Questions 1. What is one use for a crossover cable? a. To connect a hub and a workstation b. To connect a workstation to a wall jack c. To connect two workstations directly d. To connect a workstation to a modem 2. Which of the following tools would be useful in creating a patch cable for a 100Base-T network? a. Screwdriver b. Crimper c. Soldering iron d. Pliers 3. In twisted-pair wire, how does the twist ratio affect transmission? (Choose all that apply.) a. The more twists per inch, the less cross talk transmission suffers. b. The more twists per inch, the slower the transmission. c. The more twists per inch, the more attenuation transmission suffers. d. The more twists per inch, the faster the transmission. 4. What is the maximum speed at which Category 3 UTP can transmit data? a. 1 Mbps b. 10 Mbps c. 100 Mbps d. 1 Gbps 5. What type of cable would connect a workstation to the wall jack in the work area of a 100Base-T network? a. Straight-through cable b. Crossover cable c. Coaxial cable d. Punch-down cable 6. What type of cable is required for 100Base-FX? a. Coaxial cable b. UTP c. STP d. Fiber-optic cable 7. Which of the following would be the best medium for an environment that is subject to heavy EMI? a. Fiber-optic cable b. RF c. Infrared d. UTP Lab 3.3 Review Questions 1. What might cause a 100Base-TX network to experience an average throughput of less than 100 Mbps? (Choose all that apply.) a. Heavy traffic on the network b. Excessive noise c. Too many protocols bound on the server d. A mix of different network operating systems on the servers 2. What is the maximum number of repeaters a data packet may traverse on a 100Base-T network? a. 2 b. 3 c. 4 d. 5 3. What does the “T” in 10Base-T and 100Base-T stand for? a. Transmission b. Transport layer c. Twisted-pair d. Transparent 4. Which of the following is not capable of full duplexing? a. 10Base-T b. 100Base-TX c. 100Base-T4 d. 100Base-FX 5. What type of media do wireless networks use? (Choose all that apply.) a. UTP b. Alpha wave c. Infrared d. Radio frequency 6. What type of cable is required for a 100Base-T network? a. CAT 3 or higher b. CAT 5 or higher c. CAT 6 or higher d. CAT 7 or higher 7. Where would you find a plenum cable? a. Above the ceiling tiles in an office b. In an outdoor cable trench that leads to a building c. Between a hub and a punch-down panel d. Between a workstation and a wall jack Lab 3.4 Review Questions 1. What pin number is used for transmitting a positive signal on an RJ-45 straight-through patch cable? a. 1 b. 2 c. 5 d. 6 2. Which of the following could be a symptom of a damaged patch cable between a workstation and the wall jack on a UTP network? (Choose all that apply.) a. The workstation cannot send or receive data to or from the network. b. The workstation and other workstations in the same office cannot send or receive data to or from the network. c. The workstation can send data to the network but cannot receive data from the network. d. All workstations on the same segment can send data to the network but cannot receive data from the network. 3. How does bend radius affect transmission? a. Transmission is not successful until the bend radius has been reached. b. Transmission cannot occur at the bend radius. c. Transmission is unreliable after the bend radius is exceeded. d. Transmission is less secure after the bend radius is exceeded. 4. How many wire pairs are in a typical Category 5 cable? a. 2 b. 3 c. 4 d. 6 5. What problem could be caused by laying cable in the ceiling tiles six inches above a bank of fluorescent lights? a. Increased latency b. EMI c. Fire hazard d. Decreased bend radius 6. What organization is responsible for establishing structured wiring standards? a. TIA/EIA b. ANSI c. ITU d. FCC Lab 3.5 Review Questions 1. Which of the following is not an advantage of fiber cables over UTP cables? a. Fiber is not susceptible to electric interference, whereas UTP cable is. b. Fiber is less fragile than UTP cable. c. Fiber is less expensive than UTP cable. d. Fiber can transmit data over longer distances than UTP cable. 2. In which of the following situations would it be possible to use a UTP cable standard such as 1000Base-CX over a fiber-optic cable standard such as 1000Base-LX or 1000Base-T? a. When connecting two data centers over distances of 2 km or less b. When connecting short distances of 25 meters or less between network devices and servers inside a single data center c. When connecting short distances of 200 meters or less between network devices and workstations inside a building d. When connecting buildings inside a campus over distances of 500 meters or less 3. Which of the following problems could cause optic loss in fiber-optic cable? a. Cross talk between strands of fiber in multimode fiber cables b. Cross talk between cables in single-mode fiber cables c. Electromagnetic interference caused by power lines near the cables d. Oil accidentally placed in a connection during splicing 4. 100Base-FX requires multimode fiber cable with two or more strands. How are these strands used to transmit and receive data? (Choose all that apply.) a. One strand is used for both transmission and reception in both full and half duplex. b. Both strands are used for transmission and reception in full duplex. c. One strand is used for transmission, and the other is used for reception in half duplex. d. Both strands are used for transmission and reception in full duplex, whereas there is no half duplex for 100Base-FX. 5. You work for a small ISP. Which fiber technology would be best for connecting to your telecommunications carrier over a distance of 2.8 miles? a. 1000Base-LX b. 1000Base-SX c. 10 GBase-SR d. 1000Base-T Solution Manual for Network+ Guide to Networks Tamara Dean 9781133608196, 9781133608257, 9781337569330

Document Details

Related Documents

person
Isabella Thomas View profile
Close

Send listing report

highlight_off

You already reported this listing

The report is private and won't be shared with the owner

rotate_right
Close
rotate_right
Close

Send Message

image
Close

My favorites

image
Close

Application Form

image
Notifications visibility rotate_right Clear all Close close
image
image
arrow_left
arrow_right