Preview (15 of 50 pages)

This Document Contains Chapters 7 to 10 Network+ Guide to Networks, 6th Edition Chapter 7 Solutions Review Questions 1. Which of the following elements of the PSTN is most likely capable of transmitting only analog signals? a. Central office b. Local loop c. CSU/DSU d. Remote switching facility 2. Which of the following WAN topologies comes with the highest availability and the greatest cost? a. Bus b. Tiered c. Partial mesh d. Full mesh 3. A customer calls your ISP's technical support line, complaining that his connection to the Internet usually goes as fast as 128 Kbps, but today it is only reaching 64 Kbps. He adds that he has tried dialing up three different times with the same result. What type of connection does this customer have? a. PSTN dial-up b. DSL c. ISDN d. T1 4. What is the purpose of ISDN's D channel? a. To carry call session information b. To carry error checking information c. To enable time division multiplexing d. To carry data 5. Suppose you work for a bank and are leasing a frame relay connection to link an automatic teller machine located in a rural grocery store with your bank's headquarters. Which of the following circuits would be the best option, given the type of use this automatic teller machine will experience? a. DLC b. PVC c. SVC d. HLC 6. On an ISDN connection, what device separates the voice signal from the data signals at the customer premises? a. Network termination b. Terminal equipment c. Multiplexer d. Terminal adapter 7. Which of the following WAN technologies operates at Layer 3 of the OSI model? a. ATM b. DSL c. SONET d. None of the above 8. You work for a regional common carrier and have been asked to design a passive optical network that will bring high speed Internet access to a new neighborhood in a nearby suburb. The area served by the network will bring fiber-optic cable to as many as 45 households. At least how many ports on the carrier’s OLT should you expect to configure? a. 1 b. 2 c. 3 d. 4 9. You offer your networking expertise to a small nonprofit organization. The three employees each have a desktop computer and want to share the single broadband cable Internet connection that comes to their office. You donate a router you have sitting around to make this sharing possible. Where on your network should you install the router? a. Attached to one of the end workstations b. Between the cable modem and the cable drop c. Attached to a server that's connected to the cable drop d. Between the cable modem and the workstations 10. How does ATM differ from every other WAN technology described in this chapter? a. It does not use packet switching. b. It requires fiber-optic media. c. It does not provide error detection or correction. d. It uses fixed-sized cells to carry data. 11. You work for an Internet service provider that wants to lease a T3 over a SONET ring. What is the minimum Optical Carrier level that the SONET ring must have to support the bandwidth of a T3? a. OC1 b. OC3 c. OC12 d. OC24 12. Which two of the following are asymmetrical versions of DSL? a. SDSL b. ADSL c. HDSL d. VDSL e. FDSL 13. What technique does T1 technology use to transmit multiple signals over a single telephone line? a. Amplitude modulation b. Wave division multiplexing c. Time division multiplexing d. Frequency modulation 14. Where on the PSTN would you most likely find a DSLAM? a. In a remote switching facility b. At the demarc c. In a border router d. In a CSU/DSU 15. The science museum where you work determines that it needs an Internet connection capable of transmitting and receiving data at 12 Mbps at any time. Which of the following T-carrier solutions would you advise? a. A T1 b. A T3 c. Ten T1s d. Ten T3s 16. You're troubleshooting a problem with a T1 connection between your business and the service provider’s facility. The T1 connection intermittently goes down. When you call the service provider for assistance, they say that they will only engage one of their service technicians after you have verified that all of your customer premises equipment is in working order. Given that requirement, which of the following do you not examine for faults? a. The CSU/DSU interface card where the T1 terminates. b. The router that contains the CSU/DSU interface card. c. The RJ-48 connectors in your smart jack. d. The cable that enters the smart jack from outside your building. 17. Your company has decided to order ADSL from its local telecommunications carrier. You call the carrier and find out that your office is located 17,000 feet from the nearest CO. Given ADSL's potential throughput and your distance from the CO, what is the maximum downstream throughput you can realistically expect to achieve through this connection? a. 16 Mbps b. 8 Mbps c. 2 Mbps (Note: This applies to “Full Rate” ADSL, whose maximum potential downstream throughput is 8 Mbps.) d. 200 Kbps 18. What part of a SONET network allows it to be self-healing? a. Its double-ring topology b. Its use of error correction protocols c. Its use of fiber-optic cable d. Its independence from local carriers' switching facilities 19. Which of the following may limit a DSL connection's capacity? a. The number of nodes connected to the incoming DSL line b. The distance from the carrier's switching facility to the ISP c. The existence of more than one copper wire phone line at the customer's location d. The distance from the customer to the carrier's switching facility 20. You have just started working for a regional network service provider. The company provides several T1s to businesses around your city. In addition, your company supplies Internet service to three ISPs, using multiple T1s. Two T3s connect your employer’s data center with two even larger service providers. You notice a router in the data center that handles the multiple T1s and T3s. Which of the following routing protocols is this router almost certainly running to exchange route information with routers on the other service providers’ networks? a. OSPF b. RIP c. BGP d. EIGRP Hands-On Projects Project 7-1 In this project, students design a star-topology WAN connecting three regional offices to a central headquarters. Next they identify the equipment that must or can be purchased by the company establishing the WAN. Then students research and list installation and monthly costs for the WAN, both in a star topology and in a full-mesh topology. Finally, students are asked to list questions they would ask an IT manager to determine whether a location should keep its redundant connections or give up one for cost savings. Questions might have to do with the number of employees, the types of functions (business-critical or not) that each office performs, or even the history of service the carrier in that area has provided – for instance, how frequently the office has experienced outages. They re-draw the WAN in a partial-mesh topology to represent the changes. Project 7-2 In this project, students establish and test a dial-up networking connection on a workstation running Windows 7. Project 7-3 In this project, students confirm that the dial-up networking connection they created in Project 7-2 functions properly, and then they modify some of its parameters to see how their changes affected the connection process. Case Projects Case Project 7-1 Several WAN options allow Wilke’s offices, staff, and clients to exchange data over long distances. For office-to-office connectivity, students might suggest T-carrier, SONET, or ATM, or even Gigabit Ethernet over fiber connections to create WAN links. For home-to-office connectivity, students might suggest home T-carrier, DSL, or broadband cable solutions. (Wireless WAN connections, such as WiMAX, are also a possibility, though these aren’t discussed until Ch. 8.) Case Project 7-2 Students should draw a WAN diagram that includes home-to-office and office-to-office links. The diagram should indicate the locations of users and how the Internet plays a role in this WAN. As necessary equipment, students should point out the DSL modems required for home users’ DSL connections, VPN-capable routers, SONET interfaces, and the media in each office necessary to connect devices and end users. Case Project 7-3 Students should be able to summarize DSL transmission technology and present, in simple statements with an accompanying diagram, how a DSL connection is completed between a carrier and user. They should be able to identify lower cost and existing infrastructure as reasons for not bringing fiber to each home. They should reference the need for a splitter to ensure that phone and data services are separated at the customer’s premises. Finally, they should be able to find three references on the Internet that explain DSL in layman’s terms, but in more detail. Network+ Guide to Networks, 6th Edition, Lab Manual Chapter 7 Solutions Lab 7.1 Review Questions 1. Which of the following best describes the function of a CSU? a. It transmits several signals over a single channel. b. It separates a single channel into multiple channels. c. It terminates a digital signal and ensures connection integrity. d. It converts the digital signal used by connectivity devices into the digital signal sent through the cabling. 2. Which of the following WAN topologies is the least expensive to build? a. Star-wired ring b. Full-mesh c. Partial-mesh d. Star 3. Which of the following WAN topologies gives the most redundancy? a. Bus b. Partial-mesh c. Full-mesh d. Star 4. What is the maximum number of channels that a single T1 can contain? a. 12 b. 24 c. 48 d. 64 5. What is the maximum throughput of a T3 line? a. 1.544 Mbps b. 45 Mbps c. 672 Mbps d. 275 Mbps 6. What does DSL use to achieve higher throughput than PSTN over the same lines? a. Full duplexing b. Data modulation c. Message switching d. Framing 7. Which of the following WAN links is most reliable? a. DSL b. PSTN c. ISDN d. SONET 8. Which of the following is the most expensive type of connection to install and lease? a. DSL b. ISDN c. T1 d. T3 Lab 7.2 Review Questions 1. What are two differences between PPP and SLIP? a. SLIP can handle only asynchronous transmission, whereas PPP can handle both asynchronous and synchronous transmission. b. SLIP encapsulates traffic according to its original Network layer protocol, whereas PPP masks SLIP traffic as IP-based data. c. SLIP cannot carry Network layer protocols other than TCP/IP, whereas PPP can carry any Network layer protocol. d. SLIP is compatible only with NetWare servers, whereas PPP is compatible with both NetWare and Windows computers. 2. Which of the following is one primary difference between PPP and PPTP? a. PPP can handle only asynchronous transmission, whereas PPTP can handle both asynchronous and synchronous transmission. b. PPP encapsulates traffic according to its original Network layer protocol, whereas PPTP masks PPP traffic as IP-based data. c. PPP cannot carry Network layer protocols other than TCP/IP, whereas PPTP can carry any Network layer protocol. d. PPP is compatible only with NetWare servers, whereas PPTP is compatible with both NetWare and Windows computers. 3. Which of the following is the most secure remote access protocol? a. SLIP b. PPP c. RAS d. PPTP 4. Which of the following best describes the asynchronous communications method? a. Data that is transmitted and received by nodes must conform to a timing scheme. b. Data that is transmitted and received by nodes does not have to conform to any timing scheme. c. Data that is transmitted and received by nodes is subject to resequencing by each connectivity device through which it passes. d. Data that is transmitted and received by nodes requires an additional sequencing bit to ensure that data is reassembled in the proper order. 5. If your ISP uses DHCP to assign TCP/IP information to a dial-up connection, which of the following must you still specify in your connection parameters? a. The type of server into which you are dialing b. Your workstation’s IP address c. The network’s DHCP server address d. The network’s subnet mask Lab 7.3 Review Questions 1. What CLI command would you use to test a connection between a router and another device on the network? a. enable b. ping c. show interfaces d. show version 2. What direct serial connection can be used to access routers that are not already part of a network? a. Console port b. Telnet c. SSH d. Ethernet port 3. A router determines logical addressing information by interpreting the contents of an incoming ______. a. Datagram b. Segment c. Packet d. Frame 4. Routers operate at which layer of the OSI model? a. 2 b. 3 c. 4 d. 5 5. Of the following tasks, which one are Routers incapable of performing? a. Connecting dissimilar networks b. Determining the best path to send data c. Rerouting traffic if the primary path is not available d. Interpreting MAC address information Lab 7.4 Review Questions 1. What symbol does the CLI use to show privileged mode? a. > b. b. >> c. : d. # 5. What is the alias of the computer whose host name is “C2” in the following hosts file? 160.12.122.13 C1C2.gameco.com canasta 156.11.21.145 Comp2.gameco.com chess 123.14.11.214 C2.gameco.com checkers 44.112.133.15 CIC2.gameco.com backgammon a. canasta b. chess c. checkers d. backgammon Lab 9.4 Review Questions 1. What is the default FTP directory in Windows Server 2008? a. C:ftproot b. C:rootdirftp c. C:ftprootftproot d. C:Inetpubftproot 2. The FTP protocol functions at which layer? a. Application b. Transport c. Internetwork d. Network Interface 3. Using FTP to upload or download data requires both server and software. a. Session b. Client c. IIS d. Remote host 4. General access to an FTP server is referred to as what kind of access? a. Root b. Anonymous c. Limited d. Privileged Lab 9.5 Review Questions 1. Which of the following protocols is used to send e-mail? a. POP3 b. SMTP c. IMAP d. SNMP 2. You are sending e-mail to your friend Bob, whose e-mail address is [email protected]. What information does your SMTP server need to deliver this e-mail to Bob? a. It needs to look up the IP address of otherdomain.com. b. It needs to look up the IP address of the otherdomain.com POP3 server. c. It needs to use the MX record for the otherdomain.com domain to find the IP address of the appropriate IMAP server. d. It needs to use the MX record for the otherdomain.com domain to find the IP address of the appropriate SMTP server. 3. The DNS server on your network is not functioning properly. Which of the following is not a possible consequence of this? a. User e-mail programs inside your network are unable to find the IP address of your SMTP server. b. SMTP servers outside your network are unable to make TCP connections to your mail server. c. Your SMTP server is unable to find the IP addresses of remote mail servers. d. User e-mail programs inside your network are unable to find the IP address of your IMAP server. 4. Why is it important to secure and configure a mail server properly? a. A misconfigured or improperly secured mail server might not be able to deliver e-mail. b. A misconfigured or improperly secured mail server might be hijacked to send large amounts of unsolicited commercial e-mail. c. A misconfigured or improperly secured mail server might not be able to run SMTP. d. A misconfigured or improperly secured mail server might not allow clients to down load their e-mail. 5. A user has been given an e-mail address of [email protected]. How is this user most likely to determine the settings she needs to receive e-mail? a. From the MX record for the otherorg.net domain b. By finding the IP address of the otherorg.net domain c. From the network administrator d. From other SMTP servers on the Internet Network+ Guide to Networks, 6th Edition Chapter 10 Solutions Review Questions 1. Which of the following is an advantage to virtualizing many servers in your data center, compared to running each server on a separate physical machine? a. Virtualization will improve the servers’ performance. b. Virtualization will conserve resources. c. Virtualization will make administration easier. d. Virtualization will save software costs. 2. Which of the following applies to virtual machines, no matter what type of virtualization software they are created with? a. They can only belong to one VLAN. b. They cannot be addressed by clients on a physical LAN. c. They cannot be assigned Internet-routable IP addresses. d. They exist as files on the hard drive of their host. 3. You have created a virtual machine on your workstation so that you can test some new applications. You configured the VM’s hard disk space to be dynamically allocated. Which of the following will allocate more space for the VM when it needs it? a. Virtual switch b. Virtual adapter c. Hypervisor d. Virtual network manager 4. You are running KVM on a Fedora Linux computer and have configured a virtual server to use the bridged networking type. The IP address of your host machine’s NIC is 192.168.25.71. Assuming your physical LAN uses DHCP, which of the following addresses is most likely the one assigned to your virtual server? a. 192.168.25.1 b. 192.168.25.83 c. 192.168.0.0 d. Not enough information to draw a conclusion 5. Which of the following is the default networking type assigned to vNICs in most virtualization programs? a. Host-only b. Grouped c. NAT d. Bridged 6. You have decided to create four virtual Web servers on a Windows 2008 R2 server using Hyper-V R2. Which of the following configuration options would you use to make sure the Web servers are accessible to users across the Internet? a. Private virtual network b. Host virtual network c. External virtual network d. Internal virtual network 7. You work second shift and share a desktop workstation with your colleagues who work on the first and third shifts. Each of you has a separate virtual machine on the workstation. When your third-shift coworker installs a new program on his VM, it causes the machine’s operating system to stop working. What happens as a consequence? a. Your VM’s operating system stops working. b. The host machine’s operating system stops working. c. Your VM and the host machine work as usual, but performance of all the VMs is compromised. d. Nothing changes for your VM. 8. Each of the VMs on your host computer is configured to use the NAT networking type. They can still pick up e-mail and surf the Web. How are they getting their IP addresses? a. From the host machine’s virtualization software b. From the DHCP server on the physical network c. From the router on the physical network d. From another VM on the host machine that’s configured to act as a DHCP server 9. Which of the following network configuration types is best used for a company’s e-mail server? a. Host-only b. Bridged c. NAT d. Grouped 10. Which of the following network configuration types prevents VMs from exchanging traffic with nodes other than the workstation they are installed on? a. Host-only b. Bridged c. NAT d. Grouped 11. You manage a data center for a large ISP that hosts virtual Web and mail servers for many customers. One of your physical servers has four NICs and hosts four mail servers. How many vNICs can you assign to each of the mail servers? a. 1 b. 2 c. 4 d. It depends on the virtualization software. 12. Because of the functions it performs, each port on a virtual switch can also be considered a: a. Virtual machine b. Virtual bridge c. Virtual router d. Virtual firewall 13. You have created multiple virtual machines on your workstation to test different unified communications programs. You want these machines to be available to your IT colleagues for testing, but you do not want the traffic generated by their use to interfere with routine business LAN traffic. Meanwhile, on another workstation a coworker has installed additional communications programs for review. You decide to create a new VLAN devoted to software evaluation. Where do you add your coworker’s virtual machines to the new VLAN? a. On your host workstation, where you established the new VLAN b. On the LAN switch, which manages the VLAN c. On your friend’s host workstation, where the virtual machines reside d. On the LAN router, which directs traffic between VLANs 14. How must a physical NIC be configured so that it can connect its host’s VMs to multiple VLANs? a. As a trunk b. As a port group c. As a channel d. As a team 15. To complete its VPN connection, your computer is using RDP. Which of the following VPN types are you participating in? a. Site-to-link b. Site-to-site c. Link-to-client d. Client-to-site 16. In which of the following situations would you use RDP? a. To enable someone else to control your workstation, which is running a Windows operating system b. To establish a VPN between your home workstation and your office LAN c. To remotely control a distant workstation that's running a UNIX or Linux operating system d. To manage a pool of modems available for multiple users to log onto your network from a distance 17. You have decided to set up a VPN between your home and your friend's home so that you can run a private digital telephone line over your DSL connections. Each of you has purchased a small Cisco router for terminating the VPN endpoints. Which of the following protocols could you use to create a tunnel between these two routers? a. L2TP b. PPTP c. PP2T d. SLIP 18. A VPN is designed to connect 15 film animators and programmers from around the state of California. At the core of the VPN is a router connected to a high-performance server used for storing the animation files. The server and router are housed in an ISP's data center. The ISP provides two different T3 connections to the Internet backbone. What type of connection must each of the animators and programmers have to access the VPN? a. At least a fractional T1 connection to the Internet b. At least a T1 connection to the Internet c. At least a T3 connection to the Internet d. Any type of Internet connection 19. Which of the following functions makes VPN protocols unique? a. The ability to precisely time packet delivery b. The ability to interpret both frames and datagrams c. The ability to create tunnels d. The ability to detect eavesdropping 20. As a business owner, you have decided to outsource all of your company’s IT services to a cloud computing service provider. How can your clients and employees access these services? a. From a smartphone using cellular signals b. From a desktop workstation attached to a DSL Internet connection c. From a server at an office overseas, using a T1 d. All of the above Hands-On Projects Project 10-1 In this project students download and install the popular and free virtualization program VirtualBox to a Windows 7 computer, then establish a virtual machine through the VirtualBox VM Manager. Note: the project will work equally well with workstations running other operating systems, including Linux or earlier versions of Windows, though the steps for downloading VirtualBox from the Web may differ. Steps 1 – 4: Students download the VirtualBox installation executable. Steps 5 – 18: Students run the installation program and complete VirtualBox installation. Steps 19 – 32: Students establish an Ubuntu server VM using the VirtualBox Manager. Project 10-2 This project picks up where Project 10-1 left off. In this project, students download an Ubuntu server image (also free) and use it to complete creation of the virtual machine they defined in Project 10-1. Note: As with Project 10-1, this project will work equally well with workstations running other operating systems, including Linux or earlier versions of Windows, though the steps for downloading Ubuntu server from the Web may differ. Steps 1 – 4: Students download the Ubuntu server ISO image from the Ubuntu Web site. Steps 5 – 33: Students install and configure the Ubuntu server software as a virtual server. Steps 34 – 36: Students log on to the new Ubuntu server. Step 37: Students view the IP address information for the server. Project 10-3 This project picks up where Project 10-2 left off. In this project, students stop the server, then modify its vNIC properties, run it, stop it again to add a new vNIC, then start the server again. Note: As with previous projects, this project will work equally well with workstations running other operating systems, including Linux or earlier versions of Windows. Step 1: Students ensure that the VirtualBox program is running. Steps 2 – 6: Students shut down the Ubuntu virtual server, first by halting the operating system at the command prompt, then by powering down the machine through the VirtualBox dialog box. Steps 7 – 11: Students access the network adapter settings in the VirtualBox Manager and change the networking mode for Adapter 1 to bridged. Step 12: Students assign Adapter 1 a new MAC address. Steps 13 – 15: Students re-start the server and log in. Step 16: Students view the IP address information on the virtual server. Step 17: Students are asked to repeat steps 3 – 6 to power down the virtual server. Steps 18 – 26: Students create a second vNIC on the virtual server and modify its properties. Steps 27 – 30: Students re-start the server and view its IP properties. Steps 31 – 32: Students shut down the virtual server and close the VirtualBox program. Case Projects Case Project 10-1 In this project students draw a private and public cloud solution for a university’s biomedical sciences department. They also assess their current job responsibilities and list ways in which their tasks would change by switching to a public cloud network. Students should have researched the solutions enough to learn that as network administrators, they would still be responsible for software upgrades and user management (for example, setting up new user logon ids and ensuring users have appropriate privileges). However, some tasks, such as backups, are typically accomplished automatically by the cloud service provider. User access would also change, with the department’s network administrators likely playing a smaller role in helping users gain access to resources. Case Project 10-2 In this project students research and list the security assurances provided by the two leading cloud network solutions, Amazon’s EC2 and Rackspace. Students should be able to identify the security measures that the provider is responsible for and ways in which the network administrator remains responsible for security (for example, management of privileges and data encryption). Case Project 10-3 In this project students research the energy usage of the type of server that could reliably handle multiple virtual servers in a private cloud environment and compare that to the power usage of the existing network infrastructure. The larger servers used for a private cloud will draw more power on a per-server basis, but because a private cloud might use only one or two of them, the reduction in energy usage is significant. Network+ Guide to Networks, 6th Edition, Lab Manual Chapter 10 Solutions Lab 10.1 Review Questions 1. Which of the following best describes a modem’s function? a. To encapsulate Data Link layer protocols as Network layer protocols before transmitting data over the PSTN b. To separate data into frames as it is transmitted from the computer to the PSTN, and then strip data from frames as it is received from the PSTN c. To encrypt data as it is transmitted from the computer to the PSTN, and then decrypt data as it is received from the PSTN d. To convert a source computer’s digital pulses into analog signals for the PSTN, and then convert analog signals back into digital pulses for the destination computer 2. What is another common term for Public Switched Telephone Network? a. Plain old telephone service b. Basic rate telephone service c. Limited access telephone service d. Transcontinental public telephone service 3. Which of the following types of dial-up connections would result in the best performance from the client’s perspective? a. A PPP dial-up connection to an RRAS server that allowed the client to launch an application from the RRAS server b. A PPTP dial-up connection to an RRAS server that allowed the client to launch an application from another server on the LAN c. A SLIP dial-up connection to an RRAS server that allowed the client to log on to an application server on the LAN and run an application from that application server d. A PPTP dial-up connection to an RRAS server that allowed the client to log on to a Citrix terminal server and use ICA to run an application 4. What does RAS stand for? a. Remote authentication service b. Remote access server c. Remote accounting service d. Remote addressing server 5. Why do most remote clients (for example, those that dial in to an RRAS server) use DHCP and not static IP addressing? a. Using DHCP allows more efficient use of a limited number of IP addresses. b. Using DHCP ensures that the client is authorized to access the network. c. Using DHCP ensures that the client is assigned a valid IP address. d. Using DHCP allows the client to use the same IP address each time he or she dials in to the LAN. Lab 10.2 Review Questions 1. What is one reason an organization might employ a VPN rather than simply allow users to dial directly in to their remote access server? a. VPNs always provide better performance than direct-dial connections. b. VPNs allow more users to connect to the LAN simultaneously. c. VPNs are less expensive for connecting a large number of remote users. d. VPNs prevent the need for firewalls between access servers and the Internet. 2. In this lab, you connected a workstation to a server using a VPN. Which of the following is true about the VPN connection you created in this lab? a. It uses physical IP addresses. b. It uses virtual IP addresses on the workstation end. c. It uses virtual IP addresses on both ends. d. It requires a modem for connection. 3. Which of the following transmission methods are VPN clients most apt to use? a. PSTN b. T-1 c. Frame relay d. SONET 4. What does the “T” in PPTP stand for? a. Tunneling b. Transmission c. Transport d. Telecommunications 5. Which of the following protocol suites could be used to transmit data over a VPN that relies on PPTP? (Choose all that apply.) a. IPX/SPX b. TCP/IP c. NetBEUI d. AppleTalk Lab 10.3 Review Questions 1. Which of the following are reasons you might implement Terminal Services instead of a remote access server? (Choose all that apply.) a. No modems required with Terminal Services b. Central configuration and control of applications on the Terminal Server c. No modems required on clients d. No need to configure security on the Terminal Server 2. What is the difference between configuring a Windows Server 2008 computer to accept Remote Desktop Connection and configuring it to run Terminal Services? a. Remote Desktop Connection requires additional licensing. b. Terminal Services requires each client to have a modem. c. Terminal Services allows no more than two simultaneous connections. d. Terminal Services allows more than two simultaneous connections. 3. What is one way a network administrator can effectively troubleshoot a user’s problem in a Terminal Services session that can’t be done with a remote access server? a. By speaking with the user over the phone b. By examining the Terminal Server’s error logs c. By taking over the user’s session temporarily d. By rebooting the server 4. Which of the following is a potential disadvantage of Terminal Services? a. It requires additional licensing. b. It requires the client to be running Windows XP (SP3). c. It requires the client to have a high-speed connection such as a T-1. d. It requires the server to have a minimum of 1 GB of RAM. 5. You cannot log on to a Windows XP computer using a Remote Desktop connection. True or False Lab 10.4 Review Questions 1. Which of the following is a potential advantage of being able to manage computers remotely? a. You don’t need to log on to each individual computer. b. It eliminates the need for authentications. c. It uses less CPU time. d. It prevents security problems. 2. Which Windows Server 2008 utility would you use to find events that have happened on a particular server? a. Device Manager b. Disk Defragmenter c. Command Prompt d. Event Viewer 3. Why are you able to log on to the remote computer without supplying a username and password? a. No username or password is necessary. b. Active Directory handles authentication on the remote computer for you. a. Active Directory does not require authentication for remote computers. d. Your computer automatically supplies the username and password without the help of Active Directory. 4. Only the domain administrator can manage remote computers. True or False 5. When you select Services from the Administrative Tools menu on a Windows Server 2008 computer, what do you see? a. All services currently available on the Windows Server 2008 computer b. All services currently running on the Windows Server 2008 computer c. All services currently running on the Windows Server 2008 computer and its clients d. All services currently running on the Windows Server 2008 computer and other servers in the same domain Lab 10.5 Review Questions 1. What is the difference between the SSH protocol and the Telnet protocol? a. The Telnet protocol is encrypted. b. The Telnet protocol is faster than the SSH protocol. c. SSH is encrypted. d. SSH can be used only between Linux or UNIX servers. 2. Which of the following commands could you use to display a Linux computer’s IP address? a. ipconfig b. ssh c. ipdisplay d. ifconfig 3. Why might a virtual NIC be configured on a Linux computer? a. Because an additional IP address is needed for a Web server b. For the computer to act as a router between two networks c. For redundancy d. For load balancing 4. The ssh command allows you to open a remote terminal window on another computer. What is the major difference between working in an SSH session on a remote computer in another city and working directly at the console of the remote computer? a. You cannot power cycle the remote computer. b. You cannot run GUI programs in the SSH session. c. You cannot run terminal programs such as top or ps while working in an SSH session. d. You cannot log on to other remote computers while working in an SSH session. 5. In this lab, how could you tell whether a terminal window was for the local computer or for an SSH session on a remote computer? a. The prompt indicated the name of the remote computer. b. There was no way to tell. c. The prompt indicated the name of the program being run. d. The computer beeped when you logged on to a remote computer. Solution Manual for Network+ Guide to Networks Tamara Dean 9781133608196, 9781133608257, 9781337569330

Document Details

Related Documents

person
Isabella Thomas View profile
Close

Send listing report

highlight_off

You already reported this listing

The report is private and won't be shared with the owner

rotate_right
Close
rotate_right
Close

Send Message

image
Close

My favorites

image
Close

Application Form

image
Notifications visibility rotate_right Clear all Close close
image
image
arrow_left
arrow_right