This Document Contains Chapters 14 to 15 Network+ Guide to Networks, 6th Edition Chapter 14 Solutions Review Questions 1. Which of the following percentages represents the highest availability? a. 99.99% b. 0.001% c. 99% d. 0.10% 2. Which of the following commands allows you to determine how long your Linux server has been running continuously? a. show runtime b. ifconfig up c. uptime d. ifconfig avail 3. What characteristic of the IRC protocol makes it an effective way to spread viruses and worms quickly? a. It does not require users to log on, thus allowing open entry to the server via users' connections. b. It broadcasts communication from one chat room participant to others. c. It maintains a registry of all potential users and issues keep-alive transmissions to those users periodically. d. It relies on multiple servers to provide the IRC service, thus enabling many hosts to become infected at once. 4. You have outsourced your VoIP services to a cloud computing provider that promises 99.99% uptime. However, one day your IP telephone service is unavailable for a ½ hour. If this turns out to be the service’s average downtime per month, what is its actual uptime? a. 99.96% b. 99.93% c. 99.90% d. 98.99% 5. If your anti-malware software uses signature scanning, what must you do to keep its malware-fighting capabilities current? a. Purchase new malware signature scanning software every three months. b. Reinstall the malware-scanning software each month. c. Manually edit the date in the signature scanning file. d. Regularly update the anti-malware software's signature database. 6. Which of the following power flaws has the ability to render your server's main circuit board unusable, even after power returns to normal? a. Surge b. Brownout c. Blackout d. Sag 7. Approximately how long will an online UPS take to switch its attached devices to battery power? a. 1 minute b. 30 seconds c. 5 seconds d. No time 8. When purchasing a UPS, you have to match the power needs of your system according to what unit of measure? a. Hertz b. Volt-amps c. Watts d. Mbps or Gbps 9. What makes SONET a highly fault-tolerant technology? a. It requires high-speed backup lines for every connectivity device. b. It connects customers with multiple network service providers. c. It uses single-mode, rather than multimode, fiber-optic cable. d. It uses dual fiber-optic rings to connect nodes. 10. Which of the following allows two interfaces on a switch to share the burden of receiving and transmitting traffic over a single logical connection? a. Round-robin DNS b. Link aggregation c. Clustering d. Mirroring 11. Suppose you want to use redundant firewalls on your WAN link. Which of the following protocols would allow you to make both firewalls respond to requests for the same IP address? a. SMTP b. CARP c. DHCP d. NTP 12. Which of the following can be considered an advantage of clustering servers over mirroring servers? a. Clustering does not affect network performance. b. Clustering keeps a more complete copy of a disk's data. c. Clustering failover takes place more rapidly. d. Clustering has no geographical distance limitations. 13. Which of the following offers the highest fault tolerance for shared data and programs? a. RAID b. Bonding c. SANs (storage area networks) d. NAS (network area storage) devices 14. Why do SANs save and retrieve files faster than NAS devices? a. They use a proprietary network transmission method, rather than Ethernet. b. They save files with similar characteristics in the same place on a drive. c. They rely on customized Network and Transport layer protocols. d. They save only the parts of files that were changed, rather than the file's entire contents. 15. Suppose you are the network manager for an ISP whose network contains five file servers that use software RAID, a NAS installation, and a SAN. You learn that the company is taking on a huge Web hosting client and you need to add 10 TB of storage space as soon as possible. To what part of the network should you add the storage so that it causes the least disruption to the existing network? a. To one of the server's RAID arrays b. To all of the servers' RAID arrays c. To the NAS d. To the SAN 16. Which factor must you consider when using cloud backups that you don't typically have to consider when backing up to an external storage device? a. Number of clients attached to the network b. Security c. Future accessibility of data d. Time to recover 17. In a Grandfather-Father-Son backup scheme, the October—week 1—Thursday backup tape would contain what type of files? a. Files changed since the previous Thursday b. Files changed since a month ago Thursday c. Files changed since Wednesday (a day before) d. Files changed since the previous Wednesday 18. In the Grandfather-Father-Son backup scheme, how frequently is a full backup performed? (Choose all that apply.) a. Daily b. Twice a week c. Weekly d. Every other week e. Monthly 19. What is the difference between an incremental backup and a differential backup? a. An incremental backup saves all the files on a disk, whereas a differential backup saves only the files that have changed since the previous backup. b. An incremental backup requires the network administrator to choose which files should be backed up, whereas a differential backup automatically saves files that have changed since the previous backup. c. An incremental backup saves all files that haven't been backed up since a defined date, whereas a differential backup saves all files whose archive bit is set. d. An incremental backup resets the archive bit after backing up files, whereas a differential backup does not. 20. You have been charged with creating a disaster recovery contingency plan for the federal benefits agency where you work. Your supervisor has said that the network must have the highest availability possible, no matter what the cost. Which type of disaster recovery site do you recommend? a. Cold site b. Cool site c. Warm site d. Hot site Hands-On Projects Project 14-1 In this project students assess a WAN, shown in Figure 14-14, that has little fault tolerance and recommend ways of addressing the most severe single points of failure. Finally, they re-design and draw the network, incorporating some of their recommendations. Single points of failure may include devices (such as routers, firewalls, switches, and access points), links, services (such as DNS and DHCP) and the servers they operate on, and components (such as NICs and processors) within devices and servers. Steps 2-4: Students identify 20 single points of failure with the potential to affect the most users most severely, users on both LANs, users on only one LAN, and the fewest users. Step 5: Students rank the single points of failure by how severely they could affect the network, should they fail, from most severe to least severe. Step 6: Students identify ways of mitigating each of the single points of failure they found in Figure 14-14. Step 7: Students re-draw the network in Figure 14-14 to include the solutions for addressing the top 10 single points of failure in the list they created in Step 5. Project 14-2 In this project students research malware threats to Linux systems and the vulnerability levels of DNS and ICMP via the McAfee malware threat library online. As they research risks, they’re asked to identify paths by which the malware could reach the (Linux-based) access points and ways in which the network that they re-designed in Hands-On Project 14-1might be susceptible to the risks that DNS and ICMP allow. Project 14-3 In this project, students use an online UPS capacity tool to determine the UPS needed for an imaginary network server. This project requires workstations with access to the Internet and a modern browser; this project can be accomplished from a workstation running any modern operating system. Note: At the time of this writing, steps for sizing a UPS at the APC Web site (www.apcc.com) were correct. This site has proven relatively stable over the last several years. However, due to site updates and changes, steps might differ slightly. Case Projects Case Project 14-1 Critical points of failure on this network include switches and hubs to the surgery rooms, the T3 link to the ISP, the serial interface on the CSU/DSU for the T3 link, each server that contains patient records or other critical data, and the NICs, hard disks, cabling, memory and CPU in those servers. Less critical would be the administrative and classroom machines. All possible redundancy should be employed to protect the availability of the operating room systems, including redundant cabling, redundant NICs in the server that those workstations use, fail-over capabilities in the switches or hubs these machines attach to, UPS backup for the servers that contain patient records, and centralized data backup for all servers. With five servers, it might also be desirable to use a server clustering solution. In addition, the link to the ISP should have a backup mechanism, either an ISDN or DSL line or an arrangement with the ISP to have a second dedicated line (for example, a fractional T1) available for emergencies. Case Project 14-2 To cut costs, the IT director must be questioned about the priorities for the system. Together, the consultant and the director can examine each potential point of failure and ask, “What’s the worst that could happen if this piece of the system failed?” Going through this exercise will help prioritize the availability measures suggested in Case Project 14-1. It might be sufficient to have redundant NICs and RAID drives in the servers, rather than implementing a clustered solution. It might be sufficient to leave some physicians’ offices on hubs or switches that do not have fail-over capability, assuming that they could walk to another part of the building and use someone else’s computer in a pinch. It might be sufficient to use an ISDN or DSL line to provide WAN redundancy, rather than a second T1. However, the servers and their links to the operating rooms must have redundancy. Case Project 14-3 The disaster recovery outline should address the disaster recovery team with an emergency coordinator, where offsite backups will be stored and how data will be recovered, how communications between disaster recovery team members and other hospital staff will take place after a disaster, which vendors will provide new software and hardware, and which elements of the network should be reestablished first. If a cold, warm, or hot site is prepared, the disaster recovery plan should indicate procedures for making that site go live (that is, take the place of the downed network). Network+ Guide to Networks, 6th Edition, Lab Manual Chapter 14 Solutions Lab 14.1 Review Questions 1. If you receive an infected file as an executable program attached to an e-mail message, which of the following is this program likely to be? a. A macro virus b. A Trojan c. A worm d. A boot sector virus 2. What is the difference between a Trojan and a true virus? a. A Trojan does not automatically replicate itself, whereas a true virus does. b. A Trojan causes harm by simply being on the computer’s hard disk, whereas a true virus file must be executed by the user. c. A Trojan often can’t be detected by a virus-scanning program, whereas a true virus can almost always be detected by such a program. d. A Trojan changes its binary characteristics to avoid detection, whereas a true virus’s binary characteristics remain static. 3. Which of the following types of virus checking requires frequent database updates to remain effective? a. Signature scanning b. Heuristic scanning c. Rotation checking d. Integrity checking 4. If a virus is polymorphic, what is it able to do? a. Replicate itself over a network connection b. Change its binary characteristics each time it’s transferred to a new system c. Modify the network properties of a client or server d. Remain inactive until a particular date 5. What is unique about a time-dependent virus? a. It changes its binary characteristics at regularly scheduled intervals. b. It can be eradicated only by applying a virus fix at certain times of the day. c. It is alternately detectable, and then undetectable, by virus-scanning software, depending on the date. d. It remains dormant until a particular date or time. 6. A macro virus is most apt to affect which of the following programs? a. Microsoft Client for Networks b. Microsoft Outlook c. Microsoft Excel d. Microsoft SQL Server Lab 14.2 Review Questions 1. What is line conditioning? a. The regular testing of the integrity of electrical systems b. The periodic application of a large amount of voltage to electrical systems to clean the lines c. The continuous filtering of an electrical circuit to protect against noise d. The intermittent fluctuation of voltage on a circuit, which over time causes power flaws for connected devices 2. Which of the following devices, when used in conjunction with one or more UPSs, allows other devices to continue running indefinitely after a power outage? a. Surge protector b. Circuit breaker c. Generator d. Circuit mirror 3. Which of the following power conditions equates to a power failure? a. Sag b. Line noise c. Surge d. Blackout 4. Which of the following power conditions would not necessarily cause a power failure but might adversely affect computer equipment? (Choose all that apply.) a. Sag b. Line noise c. Brownout d. Blackout 5. What specification is necessary for you to determine the amount of electrical power that your computer devices require? a. Capacitance b. Impedance c. Resistance d. Wattage 6. What is the difference between a standby UPS and an online UPS? a. A standby UPS engages when it detects a power failure, whereas an online UPS continuously provides power to its connected devices. b. A standby UPS requires that the network administrator connect it to key devices when a power failure is detected, whereas an online UPS can remain connected to devices indefinitely, even when not in use. c. A standby UPS continuously provides power to its connected devices, whereas an online UPS engages when it detects a power failure. d. A standby UPS can remain connected to devices indefinitely, even when not in use, whereas an online UPS requires that the network administrator connect it to the devices when a power failure is detected. 7. Suppose you are working on several documents in Microsoft Word when your Windows XP Professional workstation loses power. Suppose also that you are not relying on a UPS or other alternate power source. Which of the following is a significant risk? a. The installation of the Word program on your hard disk might become corrupt and require replacement. b. Your computer’s operating system might fail to recognize the Word program in the future. c. The Word documents you were working on when the power failed might become corrupt. d. Your computer’s power source might become damaged. Lab 14.3 Review Questions 1. Which of the following levels of RAID offers disk mirroring? a. 0 b. 1 c. 3 d. 5 2. Why is RAID level 0 not considered fully fault tolerant? a. If a hard disk fails, its data will be inaccessible. b. It cannot stripe files whose size exceeds 64 MB. c. It is incompatible with modern NOSs. d. It cannot verify whether its fault-tolerance activities are successful. 3. RAID level 0 achieves performance benefits by simultaneously writing to multiple ________ a. NICs b. Hard disks c. Processors d. Instances of RAID software 4. Which of the following RAID levels provides fault tolerance while also making a large amount of disk space available? a. 0 b. 1 c. 3 d. 5 5. What is the minimum number of physical hard disks required for disk mirroring? a. 1 b. 2 c. 4 d. 5 6. What is one disadvantage of using RAID level 1 compared with using RAID level 5? a. RAID level 1 is not fault tolerant, whereas RAID level 5 offers at least some fault tolerance. b. RAID level 5 requires a third-party software program, whereas RAID level 1 is provided with every NOS. c. RAID level 1 requires more physical hard disks than RAID level 5. d. RAID level 1 makes a higher percentage of disk space unavailable when compared with RAID level 5. Lab 14.4 Review Questions 1. Assume that a company has 50 users (at a single location), a limited budget, and significant security concerns. What method would it most likely use to back up its server data? a. Online backup b. DASD c. RAID level 5 d. DVD 2. Which of the following types of backup requires the most attention to the security of data while the backup is taking place? a. Online backup b. DASD c. RAID level 5 d. DVD 3. Why do network administrators prefer not to back up every file on their servers every day? (Choose all that apply.) a. It would take too much time. b. It would be less accurate than periodic backups. c. It would be more costly. d. It’s hard to configure backup software to perform daily backups. 4. Which of the following methods will back up only data that has been changed since the last backup? a. Full b. Incremental c. Differential d. Interval 5. Which backup method backs up data regardless of whether the data has been changed? a. Full b. Incremental c. Differential d. Interval Lab 14.5 Review Questions 1. Which of the following commands could not be used in the process of creating backups on a Linux computer? a. tar b. rsync c. bzip2 d. cat 2. Which of the following commands would create an archive file named march13.tar.gz containing the directory /usr and all of the files and directories within it and compressed by the gzip command? a. tar -jzvf march13.tar.gz /usr b. tar -zxvf march13.tar.gz /usr c. tar -jcvf march13.tar.gz /usr d. tar -zcf march13.tar.gz /usr 3. Which programs are likely to have made a file named foo.tar.bz2? a. Rsync and bz2 b. Ssh and bz2 c. Tar and gzip d. Tar and bzip2 4. Which of the following programs would be used to back up data to a tape drive on a Linux computer? a. Tar b. Gzip c. Rsync d. Cat 5. You are a network administrator working for Red Rectangle Manufacturing. Red Rectangle has 12 servers, which it would like to back up to a single server attached to a tape library capable of backing up many computers. How would you use the tools in this lab to accomplish this task? a. Use the tar command every night to back up each server individually, and then transfer the tar files to the backup server with floppies. b. Use the tar command every night to back up each server individually, and then transfer the files using the ssh command. c. Use the rsync command each night to back up each server to the backup server, and then use the tar command to create an archive file for each server. d. Use the rsync command each night to back up each server to the backup server, and then use the tar command to write each backup to a separate tape. Network+ Guide to Networks, 6th Edition Chapter 15 Solutions Review Questions 1. Which of the following practices creates a starting point for ongoing evaluation of your network's health? a. Configuration management b. Asset management c. Fault management d. Baselining 2. Suppose you learned that half of the patch cables that connect a workgroup of computers in the Accounting Department to a patch panel needed to be replaced due to concerns about faulty manufacturing. Which of the following types of documentation would help you identify these patch cables? a. Event log b. Baseline c. Wiring schematic d. Syslog 3. You work for a medical transcription company that contracts with hundreds of home-based transcriptionists across the country. The transcriptionists connect to your network over a VPN that provides remote access services. Employees work at all times of the day or night, and not all of the transcriptionists are connected at the same time. Further, the number of transcriptionists the company hires at any time depends on a variable workload. You need to determine whether to increase the number of licenses on your remote access server. Which of the following variables would you configure your network monitoring application to track over time to help you find your answer? a. % utilization on the VPN router's CPU b. Maximum traffic handled by the VPN router's NIC c. Number of users connected to the remote access server d. % utilization on the remote access server's CPU 4. You have researched a new type of switch and proved that upgrading your switches to this model is feasible. What is the next step you take before replacing your old switches? a. Evaluate the new switch on a pilot network that mimics your network environment. b. Inform users that a major network change is pending. c. Back up the configurations of your existing switches. d. Schedule a time for the switch upgrade that's least disruptive to users. 5. You suspect that one of your network's two redundant core switches has a NIC or cable that's experiencing transmission problems. Supposing you never obtained a baseline for traffic on this switch, which of the following measurements would help you verify your suspicion? a. % processor utilization on the affected switch over a week b. Total bits per second traveling through the affected switch, compared to total bits per second traveling through the redundant switch c. % RAM utilization on the affected switch over a week d. Average daily traffic on the affected switch 6. Which of the following protocols is commonly used for communication between network management agents and applications? a. IMAP b. SMTP c. NTP d. SNMP 7. Which of the following applications would allow you to determine how many times in the past seven days your Windows 7 workstation has been unable to renew its DHCP-assigned IP address? a. Event Viewer b. DHCP logger c. Syslog d. TCP/IP Properties 8. On your Linux server, what file tells you where your system log file is kept? a. /var/log/logs.conf b. /etc/syslog.conf c. /etc/usr/logs.conf d. /var/syslog.conf 9. Which of the following techniques could be used to prevent clients from downloading more than 50 GB of data per day through a given network interface? a. Caching b. Load balancing c. Traffic policing d. Clustering 10. You have decided to use an application that will send a text message to your smartphone every time one of your network’s core routers or switches experiences an event that the system considers an emergency. All switches and routers run Cisco IOS. The application will alert you about events identified with which of the following severity levels? a. 0 b. 1 c. 5 d. 7 11. Suppose you work for a financial institution that wants to make sure its clients can log on and review their accounts no matter how much traffic your WAN is experiencing. On your edge router which of the following criteria will you use to prioritize traffic for all HTTPS requests? a. Protocol b. Source IP address c. Source MAC address d. Time of day 12. An asset management database should include which of the following? (Choose all that apply.) a. Serial number for every server on the network b. User names for every employee who uses the network c. Model number for every router, switch, and access point on the network d. Baseline of average daily traffic for each router, switch, and access point on the network e. Milestones for the network's implementation 13. The routine that collects management information on a device is also known as: a. An agent b. A poll c. A managed device d. A MIB 14. How does an application patch differ from an upgrade? a. A patch is more comprehensive than an upgrade. b. A patch is designed to make minor corrections or enhancements, whereas an upgrade replaces most, if not all, of the software code. c. A patch is offered by a third-party software vendor, whereas an upgrade is supplied by the software manufacturer itself. d. A patch can be automatically distributed to clients over the network, whereas an upgrade requires a manual installation. 15. Under what circumstances should a network administrator inform users of a software change? a. Always b. When the change might affect applications or utilities on which the users rely c. When the change might result in additional network traffic d. When the change might affect how users are added to the system 16. Which of the following systems would store information about the VTP settings for a switch’s interface? a. Change management b. Event log c. Configuration management d. Asset management 17. Which of the following is the best way to reverse a network operating system upgrade? a. Reinstall the previous version of the operating system. b. Uninstall the upgrade. c. Remove the upgrade software folder from the server. d. Restore the server's software and configuration from a backup. 18. Which of the following require(s) authentication between an agent and network management console? a. SNMPv1 b. SNMPv2 c. SNMPv3 d. All of the above 19. Which of the following pieces of information must you collect when establishing a baseline for the performance of a WAN link? a. Last time the link failed b. Average daily traffic traveling over the link c. Users' perceptions of the link's speed d. Distribution of traffic types by Network layer protocol 20. Maintaining records of each time a switch interface fails is part of which of the following practices? a. Asset management b. Change management c. Fault management d. Configuration management Hands-On Projects Project 15-1 In this project students use the Event Viewer application to explore the event log on a computer running the Windows 7 operating system. Each student must have a computer running the Windows 7 operating system, and ideally, its event log should contain several entries. (Note: The same steps can be followed to complete this project on a workstation running the Windows Vista operating system.) Steps 1 – 4: Students launch Windows Event Viewer. Steps 5 – 8: Students view errors logged by Event Viewer. Steps 9 – 13: Students familiarize themselves with the types of logs kept by Event Viewer and set the maximum log file size to 16 MB. Project 15-2 In this project students learn how to filter information collected by Event Viewer. This project picks up where Project 15-1 left off, and requires a computer running Windows 7 which also has some quantity of data in its event log. (Note: The same steps can be followed to complete this project on a workstation running the Windows Vista operating system.) Steps 1 – 7: Students filter errors to find which ones pertain to DHCP. Steps 8 – 16: Students configure Event Viewer to notify them via e-mail whenever a certain DHCP-related event occurs. Project 15-3 In this project students explore a system log, or syslog, on a workstation running Linux. Because different versions of Linux use different graphical interfaces, this exercise uses shell commands. Steps 1 – 5: Students access the etc/syslog.conf file to determine where their system’s log file is located. Steps 6 – 7: Students view the last 10 messages in their computer’s syslog file. Steps 8 – 9: Students view the types of log files kept on their computer. Step 10: Students search for all DHCP-related messages in their syslog file. Step 11: Students search for archived log files on their system. Case Projects Case Project 15-1 The answers to this project will differ; it’s highly subjective, and in reality, the first thing the student should say is that she doesn’t have enough information to make informed decisions. Thus, the student should suggest that baselining and asset management data, plus call tracking records will need to be compiled and analyzed before making a decision. These will identify where the company’s technology is lagging behind and where the potential points of failure could be fixed. For example, in this instance, it looks as if the company will want to spend more money on WAN infrastructure (either lines or a better solution, such as terminal servers) and beefing up the servers. In addition, they will want to spend money on security practices, including perhaps a proxy server and firewall, with the correct development to make them secure. Whatever the recommendations, the important thing is that the student define her process of coming to those recommendations. Case Project 15-2 Answers will vary, but the student should write a proposal that is very specific, addresses why she asks for certain features, and suggests a format (perhaps Web-based, integrated with a current call tracking system) that will be easily used and expandable for future needs. Case Project 15-3 Students should identify two specific SNMP-reliant and Web-enabled network management programs. Additional features might include remote network monitoring, update and patch management, configuration management, etc. Network+ Guide to Networks, 6th Edition, Lab Manual Chapter 15 Solutions Lab 15.1 Review Questions 1. What is the name of the task that must be completed before another task is begun? a. Successor b. Predecessor c. Antecedent d. Dependent 2. In a significant network upgrade project, which of the following tasks takes place first? a. Identify which tasks are dependent on other tasks. b. Complete a needs assessment survey. c. Test the proposed solution on a pilot network. d. Assign tasks to the most qualified or appropriate people on the project team. 3. Which of the following best describes contingency planning? a. Obtain support from high-level project sponsors before committing resources to the project. b. Install identical software and hardware—on a smaller scale—to that required by the project’s proposed solution to test the feasibility of the solution. c. Identify a team and assign roles to that team in case of disaster. d. Identify steps that will minimize the impact of unforeseen obstacles. 4. You are a network administrator managing a network backbone upgrade. Your supervisor has scheduled a meeting to discuss the project’s status with you. What is the advantage of taking a Gantt chart to the meeting? a. A Gantt chart helps the supervisor better understand the project’s costs. b. A Gantt chart determines the maximum possible amount of time each employee can spend on each task. c. A Gantt chart allows the supervisor to see timelines of each task in addition to the project as a whole. d. A Gantt chart demonstrates why some tasks have taken longer to complete than first anticipated. 5. One way of predicting how long a task might take is by examining the time taken to complete previous similar tasks? True or False Lab 15.2 Review Questions 1. What is the purpose of identifying milestones in a project plan? a. They indicate when project staff changes must occur. b. They mark significant events of the project’s progress. c. They offer a quick assessment of how successfully the project is staying within budget. d. They help predict the result of a project. 2. Which of the following are examples of resources related to a project plan that proposes to upgrade the network cards inside each workstation on a network from 100 Mbps to 1000 Mbps? (Choose all that apply.) a. NIC device drivers b. A team member’s time c. IP addresses d. NICs e. Switches 3. Which of the following are examples of project stakeholders whose purpose is to upgrade an entire network from 100 Mbps to 1000 Mbps? (Choose all that apply.) a. Network users b. Software vendors of applications running on the client machines c. High-level managers who approved the project d. IT staff who helped implement the change e. Network cabling vendors 4. Which of the following tools might you use to assess the success of a project whose purpose is to upgrade an entire network from 100 Mbps to 1000 Mbps? a. Network Monitor b. Sniffer or packet analyzer c. Microsoft SQL Server d. System Monitor 5. Which of the following obstacles could halt or seriously impair your progress in upgrading the NICs in all workstations on a network from 100 Mbps to 1000 Mbps? a. The use of two different NIC models b. The use of different installation personnel on different shifts c. Management’s requirement that the cost of each NIC remain under $75 d. A large group of defective NICs Lab 15.3 Review Questions 1. Which of the following best describes project management? a. Recording and analyzing the time and resources required for each task in a project b. Assessing network statistics before and after a project is completed c. Monitoring the needs of users prior to the beginning of a project, and then later assessing how the project’s completion met those needs d. Planning for and handling the steps required to accomplish a goal in a systematic way 2. Which of the following projects is most likely to be driven by a company’s security needs? a. Doubling the RAM in a key file server b. Installing a firewall on a connection to the Internet c. Upgrading the version of client software on each workstation d. Changing from the use of static IP addressing to DHCP on an entire network 3. What is one good technique for assessing the feasibility of a suggested project deadline before the project begins? a. Begin calculating task timelines from the deadline, working back to the start of a project. b. Issue a survey to key staff asking their opinion of the suggested deadline. c. Use the Web to research similar projects completed by other companies. d. Calculate the ratio of the number of project milestones to the proposed project duration, in months, to check that it does not exceed 2:1. 4. In a very large company (for example, one with over 10,000 employees), which of the following staff is most likely to decide whether a project such as an entire network upgrade will be funded? a. Network administrator b. Personnel director c. Chief information officer d. Accountant 5. Which of the following situations might necessitate changing all the IP addresses on a company’s networked workstations? a. The company has divided its network into several smaller subnets. b. The company has hired 50 new employees. c. The company has decided to use Network Address Translation (NAT) for all connections to public networks. d. The company has decided to establish a Web server with e-commerce capability. Lab 15.4 Review Questions 1. In which of the following situations would it be wise to back level? a. You have just performed a complete backup of your server’s data directories, and you cannot confirm that the backup was successful. b. You have just applied a fix to your network operating system (NOS) and have discovered that the fix resulted in a lack of network access for half of your users. c. You have just installed a database program on one of your servers and have discovered that you neglected to install an optional component that your users need. d. You have just installed Windows Server 2008 on a new computer, and you cannot get the operating system to recognize the NIC. 2. Which two of the following can typically be accomplished by applying a patch to an NOS? a. Replace all the NOS’s program files. b. Modify an existing feature. c. Remove an old feature. d. Fix a known bug. 3. What should you do before installing a major NOS patch? a. Remove all protocols installed on the server. b. Prevent users from logging on. c. Disable Internet services. d. Disable network connectivity. 4. In Microsoft terminology, what is a hot fix? a. A patch that replaces all or a portion of the NOS b. A patch that requires that the server be connected to the Microsoft Web site as it is installed c. A patch that updates a specific type of software, often the operating system d. A patch that can be installed while users are logged on without causing adverse effects 5. What is the primary difference between a software upgrade and a patch? a. The software manufacturer issues a patch, whereas an upgrade may be issued by any organization that has the software’s source code. b. A patch fixes a specific part of a software program, whereas an upgrade typically replaces much or all of a software program. c. A patch typically does not require that the network administrator test its changes before applying it to a server; an upgrade does. d. A patch typically is not supported by the software manufacturer; an upgrade is. Lab 15.5 Review Questions 1. You are trying to decide whether to purchase a software package from a vendor. Who among the following is most likely to provide objective information about the software package? a. The vendor’s sales staff b. A business partner of the vendor c. A current customer of the vendor d. A vendor who makes a competing product 2. You are researching a new Internet access router for your company’s network. You have also noticed a trend toward greater use of your company’s network resources from home. Given this, which of the following features would you expect to be most valuable in a new Internet access router? a. Support for additional routing protocols b. Support for virtual private networks c. Support for additional security features d. Support for multiple protocols 3. When implementing a network solution, why is it important to anticipate future trends as much as possible? a. So that the solutions you implement meet the future needs of your users b. So that the solutions you implement meet the current needs of your users c. So that the solutions you implement are more scalable d. So that you can justify the purchase of the solution to management 4. You work for the Best Roast Coffee Company, which has one hundred employees in nine retail stores. You are looking at case studies for a product you are researching. Which of the following case studies is most likely to be helpful? a. An automobile manufacturer with hundreds of thousands of employees b. A candymaker with 200 employees that sells candy in 13 malls across the country c. An insurance company with thousands of employees in three locations, plus hundreds of agents all over the country d. A small school district with 300 employees and 10,000 students 5. When investigating a network solution, which two of the following should you do? a. Get information about possible solutions from only one source. b. Get information about possible solutions from multiple sources. c. Look at the product lines from only one vendor. d. Talk to someone who has implemented a similar solution. Solution Manual for Network+ Guide to Networks Tamara Dean 9781133608196, 9781133608257, 9781337569330
Close