Preview (10 of 33 pages)

This Document Contains Chapters 9 to 13 Chapter 9 Review Questions 1. Which of the following is a function of a user account? (Choose all that apply.) a. Provides administrative rights b. Provides a method for user authentication c. Provides information about a user d. Manages system resources Answer: b. Provides a method for user authentication c. Provides information about a user 2. Which of the following is true of group accounts? (Choose all that apply.) a. They organize users for easier assignment of resource permissions. b. They cannot contain other groups. c. They are used to manage user passwords. d. You can select a group scope in Active Directory but not in Windows 7. Answer: a. They organize users for easier assignment of resource permissions. d. You can select a group scope in Active Directory but not in Windows 7. 3. Which of the following is true of a user logon name in Windows? a. It is case sensitive. b. It’s not case sensitive. c. It must be unique across all domains. d. It can include special characters only. Answer: b. It’s not case sensitive. 4. Which of the following is a group scope in Active Directory? (Choose all that apply.) a. Domain local b. Global c. Local d. Universal Answer: a. Domain local b. Global d. Universal 5. Which of the following is a default group in Active Directory? (Choose all that apply.) a. Domain Users b. Backup Operators c. Server Operators d. Administrators Answer: b. Backup Operators c. Server Operators 6. Which of the following is a special identity group? (Choose all that apply.) a. Everyone b. Guests c. Authenticated Users d. Creator Owner Answer: a. Everyone c. Authenticated Users d. Creator Owner 7. Which of the following is a collection of a user’s personal data folders and application settings that’s available at any computer where the user logs on? a. Local profile b. Roaming profile c. Mandatory profile d. Temporary profile Answer: b. Roaming profile 8. Which command in Linux might be needed to perform user account management if you aren’t logged on as the root user? a. su b. chmod c. chown d. sudo Answer: d. sudo 9. Which command in Linux gives you extensive help on how to use a command? a. help b. info c. man d. guide Answer: c. man 10. Which is true about Linux user accounts? (Choose all that apply.) a. They must belong to at least one group. b. The account names are case sensitive. c. They can have multiple home directories. d. They require a password. Answer: a. They must belong to at least one group. b. The account names are case sensitive. 11. Which is true about partitions? (Choose all that apply.) a. You can have up to four primary partitions. b. You can have up to four primary partitions. c. You can create extended partitions to overcome the four-partition limit. d. Only a primary partition can be active. Answer: b. You can have up to four primary partitions. d. Only a primary partition can be active. 12. Which file system supports a maximum file size of 2 GB? a. FAT12 b. FAT16 c. NTFS d. exFAT Answer: b. FAT16 13. Which NTFS feature should you configure if you want users to be able to revert to an older version of a file? a. File encryption b. Compression c. Quotas d. Shadow copies Answer: d. Shadow copies 14. Which is true about file compression? (Choose all that apply.) a. A compressed file can’t be encrypted with EFS. b. Compressed files require additional storage space. c. Decompression occurs automatically when a file is accessed. d. Compression can be applied to individual files or entire directories. Answer: a. A compressed file can’t be encrypted with EFS. c. Decompression occurs automatically when a file is accessed. 15. Which of the following is true about permissions in NTFS? a. Permissions are set manually by users. b. Permissions can be configured only by administrators. c. By default, permissions are inherited automatically from the parent folder. d. Permissions can only be set on files, not folders. Answer: c. By default, permissions are inherited automatically from the parent folder. 16. Which of the following is a permission in the Linux OS? (Choose all that apply.) a. Read b. Write c. Execute d. Delete Answer: a. Read b. Write c. Execute 17. Which of the following correctly describes how sharing and NTFS permissions work? a. When a file is accessed over the network, sharing permissions are checked first. b. NTFS permissions are checked first, then sharing permissions. c. Sharing permissions are ignored if NTFS permissions are set. d. Both sharing and NTFS permissions are checked simultaneously. Answer: a. When a file is accessed over the network, sharing permissions are checked first. 18. Which of the following is true of Windows printing terminology? (Choose all that apply.) a. A print spooler is a software that controls print jobs. b. A print server is a computer sharing a printer. c. A print queue stores jobs waiting to be printed. d. A print driver manages the printer's hardware. Answer: b. A print server is a computer sharing a printer. c. A print queue stores jobs waiting to be printed. 19. Which of the following tools is used to view information categorized as Information, Warning, or Error? a. Event Viewer b. Task Manager c. Performance Monitor d. Resource Monitor Answer: a. Event Viewer 20. Which is best described as a record of performance data gathered when a system is performing well under normal conditions? a. Benchmark b. Snapshot c. Baseline d. Log Answer: c. Baseline 21. Why would you choose to monitor a system’s performance remotely? a. To gain more accurate data b. To reduce system load c. To avoid interfering with users d. You want to lessen the impact of the monitoring session on the computer. Answer: d. You want to lessen the impact of the monitoring session on the computer. 22. Which is true about Windows Backup in Windows Server 2008 R2? (Choose all that apply.) a. Backups can be stored on network drives. b. The Volume Shadow Copy Service backs up open files. c. You can back up another computer remotely. d. Backups must be stored on local drives only. Answer: a. Backups can be stored on network drives. b. The Volume Shadow Copy Service backs up open files. c. You can back up another computer remotely. 23. Which UPS type is best for computer power backup? a. Offline b. Online c. Line-interactive d. Standby Answer: b. Online 24. Which RAID level uses a minimum of three disks and provides fault tolerance? a. RAID 1 b. RAID 0 c. RAID 5 d. RAID 6 Answer: c. RAID 5 Challenge Labs Challenge Lab 9-1 The file students create should have this format: username:password:5001:group name:Full Name:/home/username:/bin/bash For example: user1:Password01:5001:user1:User One:/home/user1:/bin/bash user2:Password01:5002:user2:User Two:/home/user2:/bin/bash user3:Password01:5001:user3:User Three:/home/user3:/bin/bash Challenge Lab 9-2 Some extent, but students/groups should develop something similar to the following: Group memberships Marketing Operations Support MktUser1 OpsUser1 SuppUser1 MktUser2 OpsUser2 SuppUser2 MktUser3 OpsUser3 SuppUser3 Shares Permissions MktShare OpsShare SuppShare Public Sharing Marketing: Change Administrators: Full Control Operations: Change Administrators: Full Control Support: Change Administrators: Full Control Everyone: Read OpsUser1: Change Administrators: Full Control NTFS Marketing: Modify Administrators: Full Control Operations: Modify Administrators: Full Control Support: Modify Administrators: Full Control Everyone: Read OpsUser1: Modify Administrators: Full Control Note: There are other ways to accomplish the intent of the permissions. For example, students can give Full Control sharing permissions to Everyone in each share and limit permissions by using NTFS permissions. This lab is mostly intended to make students think about what permissions do and realize they should be assigned to give users only the permissions they require to do their job. Case Projects Case Project 9-1 Set quotas on the volume on which shares are located. Create a hard limit or configure quotas to generate a log entry when a user exceeds his or her limit so that the administrator can determine who’s using most of the disk space. Chapter 10 Review Questions 1. Your friend creates a shared folder on her computer for several coworkers to use. She assigns the password “0OxqH}ml2-wO” to the folder. Is it an example of a good password or a bad password? Explain. Answer: It’s a bad password because it’s probably too difficult to remember and might prompt the user to write it down somewhere. While it is complex and secure, usability is an important aspect of good password practices. 2. List at least three techniques you can use to help secure a wireless network. a. Use WEP, WPA, or WPA2 encryption b. Don’t broadcast the SSID c. Use MAC address filtering d. Enable firewalls Answer: a. Use WEP, WPA, or WPA2 encryption b. Don’t broadcast the SSID c. Use MAC address filtering 3. Which of these protocols is used for VPNs? (Choose all that apply.) a. PPTP b. L2TP c. SSTP d. IPSec Answer: a. PPTP b. L2TP c. SSTP 4. How do VPNs accomplish the private part of a virtual private network? a. By using tunneling protocols, such as L2TP or PPTP, a secure and encrypted tunnel is created through the public network. b. By using dedicated physical lines only for VPN connections. c. By encrypting only the header information of data packets. Answer: a. By using tunneling protocols, such as L2TP or PPTP, a secure and encrypted tunnel is created through the public network. 5. Which of the following terms refers to attacking a Web server by forcing it to respond to a flood of ping packets so that the server can’t respond to normal traffic? a. DDoS b. Phishing c. DoS d. Spoofing Answer: c. DoS 6. Which of the following is a guideline for creating a security policy? a. It should be flexible and open to interpretation. b. It should be as complex as possible. c. A security policy should be enforceable. d. It should be developed only by IT staff. Answer: c. A security policy should be enforceable. 7. Which of the following is a component of a security policy? (Choose all that apply.) a. Authentication policy b. Privacy policy c. Disaster recovery policy d. Security update policy Answer: a. Authentication policy b. Privacy policy 8. List two questions that must be answered before determining what level of security a network requires. a. What is being protected? b. From whom should data be protected? c. What costs are associated with a security breach? d. How likely is it that a threat will occur? e. Do costs outweigh the risks? Answer: a. What is being protected? b. From whom should data be protected? 9. Which of the following should be a common element in any level of security policy? (Choose all that apply.) a. User training programs b. Backup procedures c. Data encryption d. Employee health benefits Answer: b. Backup procedures c. Data encryption 10. Choose two words from the following list that best complete this sentence: If there’s access to the equipment, there’s no __________. a. Physical b. Network c. Security d. Application Answer: a. Physical c. Security 11. Which of the following is a requirement for rooms housing network servers? a. Large windows for ventilation b. Adequate cooling c. Multiple entry points d. Bright lighting Answer: b. Adequate cooling 12. The procedure that specifies what resources users can access and the tasks they can perform on a network are referred to as which of the following? a. Authentication b. Authorization c. Accounting d. Auditing Answer: b. Authorization 13. If you want to allow a blank password in a Windows XP system, which of the following do you set the password minimum length to? a. 1 b. 0 c. 5 d. 8 Answer: b. 0 14. If you want to prevent password guessing to foil intruders, you should enable which of the following? a. Account lockout b. Password expiration c. Password complexity requirements d. Encryption Answer: a. Account lockout 15. Which of the following is a secure method of storing passwords on a Linux system? a. Plain text b. Encrypted files c. Shadow passwords d. MD5 hashes Answer: c. Shadow passwords 16. Which of the following is a good password? a. password123 b. 123456 c. L0sT!n@Z d. qwerty Answer: c. L0sT!n@Z 17. Which of the following is a method IPSec uses to authenticate the identity of communicating devices? (Choose all that apply.) a. Passwords b. Kerberos c. Challenge-response d. Digital certificates Answer: b. Kerberos d. Digital certificates 18. To encrypt data stored on a hard drive on a Windows Server 2003 computer, you should use which of the following? a. EFS b. BitLocker c. NTFS permissions d. AES Answer: a. EFS 19. Firewalls can filter packets based on which of the following? (Choose all that apply.) a. Source address b. Destination port c. Payload content d. Context Answer: a. Source address b. Destination port 20. If network administrators want to be informed when an attempt has been made to compromise the network, what should they use? a. Intrusion detection systems (IDSs) b. Antivirus software c. Firewall logs d. Network performance monitors Answer: a. Intrusion detection systems (IDSs) Challenge Labs Challenge Lab 10-1 • Which rule did you edit to allow Remote Desktop connections to your computer? Remote Desktop (TCP-In) • What did you do to limit Remote Desktop access to your network only? Enable the rule; in the Scope tab, select These IP addresses under Remote IP addresses. Enter the IP address subnet manually in CIDR notation, such as 192.168.100.0/24, or use the “Predefined set of computers” option and select Local subnet. • Which rule did you edit to change the ICMP Echo Request settings? File and Printer Sharing (Echo Request - ICMPv4-In) • What did you do to allow pings from outside your network? In the Scope tab, select Any IP address under Remote IP addresses. Challenge Lab 10-2 Different distributions might require different settings, but in Ubuntu Linux, edit the /etc/pam.d/common-password file and add the following line: password requisite pam_cracklib.so retry=4 minlen=8 difok=4 dcredit=1 ucredit=1 lcredit=1 ocredit=2 Case Projects Case Project 10-3 The policy should take into account the major categories of security concerns discussed in this chapter. Chapter 11 Review Questions 1. Which of the following is one of the most important aspects of supporting a small business? a. Installing the latest software updates b. Minimizing hardware costs c. Listening to the company’s requirements and designing a solution d. Offering unlimited tech support Answer: c. Listening to the company’s requirements and designing a solution 2. Which of the following is a possible problem with a peer-to-peer network solution? (Choose all that apply.) a. Users can unknowingly sever access to shared files or printers. b. Limited ability to control network resources centrally. c. Sensitive data could be made available to unauthorized users. d. Expensive hardware requirements. Answer: a. Users can unknowingly sever access to shared files or printers. c. Sensitive data could be made available to unauthorized users. 3. Which of the following is true of the HomeGroup feature? a. Homegroups are password-protected. b. Homegroups require a domain controller. c. Homegroups can only be used in business environments. d. Homegroups are available in all versions of Windows. Answer: a. Homegroups are password-protected. 4. Which is true about sharing files in a Windows domain? a. The sharing settings are configured on individual workstations. b. Domain controllers handle file sharing directly. c. The user database is centralized. d. File sharing is limited to read-only access. Answer: c. The user database is centralized. 5. Which of the following is true about an NAS? (Choose all that apply.) a. It usually has its own user interface. b. It requires a dedicated file server. c. Users and groups can be created on an NAS. d. It cannot be accessed remotely. Answer: a. It usually has its own user interface. c. Users and groups can be created on an NAS. 6. Which is true about Windows SBS? (Choose all that apply.) a. It includes an e-mail server. b. It supports unlimited users. c. It is only available as a virtual appliance. d. It provides intranet functionality. Answer: a. It includes an e-mail server. d. It provides intranet functionality. 7. Which of the following is true about using Linux as a desktop OS? (Choose all that apply.) a. Office applications are available that are compatible with Microsoft Office. b. Virtualization can be used to run Windows applications. c. It requires Windows-compatible hardware. d. Linux is not suitable for desktop use. Answer: a. Office applications are available that are compatible with Microsoft Office. b. Virtualization can be used to run Windows applications. 8. A domain controller simplifies resource management by doing what? a. Storing all application data b. Managing network traffic c. Providing wireless connectivity d. Centralizing accounts Answer: d. Centralizing accounts 9. What are the most common options for sharing files in a Linux environment? (Choose all that apply.) a. FTP b. NFS c. SMB d. Samba Answer: b. NFS d. Samba 10. Which of the following is a common fault-tolerant disk configuration for servers? a. RAID 0 for performance b. RAID 2 for redundancy c. RAID 1 for the OS and RAID 5 for the data d. RAID 6 for high speed Answer: c. RAID 1 for the OS and RAID 5 for the data 11. Which of the following is a consideration when purchasing a switch? (Choose all that apply.) a. Switch speed b. Support for multiple media types c. Number of fans d. Whether it’s managed or unmanaged Answer: a. Switch speed b. Support for multiple media types d. Whether it’s managed or unmanaged 12. Which of the following is a consideration when selecting wireless network equipment? (Choose all that apply.) a. Brand name b. Aesthetics c. Security standards supported d. Interference from other wireless devices Answer: c. Security standards supported d. Interference from other wireless devices 13. To run a Web server on a network protected by a SOHO router, you must enable what feature? a. DHCP b. Port forwarding c. UPnP d. DMZ Answer: b. Port forwarding 14. Which of the following is a VPN mode? (Choose all that apply.) a. Peer-to-peer b. Site-to-site c. Gateway-to-gateway d. Client-to-gateway Answer: c. Gateway-to-gateway d. Client-to-gateway 15. What legal document should be read carefully before purchasing software for multiple users to run? a. Privacy Policy b. EULA c. Service Agreement d. Terms of Service Answer: b. EULA 16. Which of the following describes the cost of a product when intangibles are factored in? a. Direct Cost b. Acquisition Cost c. TCO d. Hidden Cost Answer: c. TCO 17. Which network remote access method provides a secure connection over the Internet? a. Telnet b. RDP c. FTP d. VPN Answer: d. VPN 18. Which of the following is a feature a firewall router provides? (Choose all that apply.) a. Protection against DoS attacks b. Web site filtering c. Cookie blocking d. Protection against IP spoofing Answer: a. Protection against DoS attacks b. Web site filtering d. Protection against IP spoofing Challenge Labs Challenge Lab 11-1 Some details of the network should include the following: • IP addresses should be private addresses, using the router’s address as the default gateway. • Computers should be configured in a workgroup arrangement with a suitable workgroup name. • All four user accounts plus an administrator account should be configured on each computer, with the same username and password on each computer. • Shared folders on each computer should give the user and the administrator account Full Control permission and the other users only Read permission. Verify that NTFS as well as sharing permissions are set correctly. • The router/AP should be set with WPA or WPA2 security. The SSID could be SmallBiz, for example, but for better security, SSID broadcasts should be disabled. • The router should be configured to forward port 80 to the Marketing computer’s IP address. • The documentation report should include computer names and IP addresses, shared folder names and who has access, and printer type and where it’s installed. The administrator account information, including the password, should be documented. The wireless security key and SSID should be included in the report. A drawing of the network with IP addresses and computer names might also be a good idea. The report should include the reasons for setting up a domain-based or similar server-based network rather than a standard peer-to-peer network. Chapter 12 Review Questions 1. In which of the following areas does a WAN differ from an internetwork? (Choose all that apply.) a. WANs use service providers for the network connection. b. WANs use private, company-owned networks. c. WANs use serial communication technologies that can span miles. d. WANs use local communication technologies. Answer: a. WANs use service providers for the network connection. c. WANs use serial communication technologies that can span miles. 2. Which of the following is a device used to make WAN connections? (Choose all that apply.) a. Hub b. CSU/DSU c. Router d. Switch Answer: b. CSU/DSU c. Router 3. Which of the following best describes a digital signal? a. A series of analog waves b. A series of modulated frequencies c. A series of discrete voltage levels d. A series of binary values Answer: d. A series of binary values 4. For what purpose is a CSU/DSU used? a. Connects LANs directly over long distances b. Creates a digital connection between a LAN device and the WAN link c. Encrypts data transmitted over the WAN d. Manages bandwidth allocation on the LAN Answer: b. Creates a digital connection between a LAN device and the WAN link 5. Which of the following is a common WAN connection method? (Choose all that apply.) a. Circuit switched b. Frame relay c. Token ring d. Packet switched Answer: a. Circuit switched d. Packet switched 6. Which of the following is true about ISDN? a. It is a wireless WAN technology. b. It provides high-speed data transfer rates over traditional phone lines. c. It uses analog signaling for data transmission. d. It uses a terminal adapter to connect to the network. Answer: d. It uses a terminal adapter to connect to the network. 7. Which of the following is a typical situation in which leased lines should be considered? (Choose all that apply.) a. For occasional, low-speed data transfers. b. 24/7 access is required. c. Fast upstream and downstream communications are needed. d. For simple email communications. Answer: b. 24/7 access is required. c. Fast upstream and downstream communications are needed. 8. Which of the following combines several communication streams into a single faster communication stream? a. Multiplexing b. Demultiplexing c. Routing d. Bridging Answer: a. Multiplexing 9. Which physical topology does SONET readily support? (Choose all that apply.) a. Point-to-point b. Star c. Ring d. Mesh Answer: a. Point-to-point b. Star c. Ring 10. Which of the following technologies uses packet-switching? (Choose all that apply.) a. Frame relay b. X.25 c. T1 d. ATM Answer: a. Frame relay b. X.25 d. ATM 11. Which of the following technologies provides permanent virtual circuits? (Choose all that apply.) a. MPLS b. Frame relay c. X.25 d. ISDN Answer: b. Frame relay c. X.25 12. Which technology uses 53-byte cells? a. Frame relay b. ATM c. ISDN d. X.25 Answer: b. ATM 13. To maintain security, WAN connections over the Internet should use which of the following? a. SSL/TLS b. HTTPS c. IPsec d. VPN Answer: d. VPN 14. What type of device is required to connect to a dedicated digital communication line? a. Router b. Modem c. CSU/DSU d. Switch Answer: c. CSU/DSU 15. Which term best describes the place in a WAN connection where the customer’s responsibility ends and the provider’s responsibility begins? a. Interface point b. Demarcation point c. Connection node d. Termination point Answer: b. Demarcation point 16. Which of the following places data on the local loop? a. DCE b. DTE c. CSU/DSU d. Router Answer: a. DCE 17. Which of the following is the equipment at the customer site that’s the responsibility of the customer? a. Demarcation point b. Network interface device c. Provider equipment d. CPE Answer: d. CPE 18. Which of the following is a VPN protocol supported by RRAS? (Choose all that apply.) a. PPTP b. L2TP c. IPsec d. SSTP Answer: a. PPTP b. L2TP d. SSTP 19. Which of the following is a component of the PPP protocol? (Choose all that apply.) a. Link Control Protocol b. NCP c. Point-to-Point Protocol d. Frame Relay Answer: a. Link Control Protocol b. NCP 20. Which of the following can best be described as developing applications by using a service provider’s development tools and infrastructure? a. Cloud storage b. Hosted applications c. Hosted platforms d. On-premises software Answer: c. Hosted platforms Case Projects Case Project 12-1 Answers will vary. The solution is configuring RRAS as a VPN server on at least one server running Windows Server 2008 that has a connection to the Internet. Then configure remote clients to connect to the VPN. This way, all users, whether local or traveling, can access the network through their standard Internet connections, saving the company long-distance charges when remote users need to connect. Case Project 12-2 Each proposal will vary. Salespeople travel to different locations and should use a VPN client to connect to the main office through the Internet. Because most businesses the salespeople visit have high-speed Internet connections, salespeople can use their laptops’ LAN interface or wireless connection to establish the VPN connection. In rare instances, dial-up connections to the Internet can be used for the VPN connection. The branch offices are fixed and can, therefore, use some kind of digital always-on technology—it could be DSL or cable modem for smaller locations, or it could be dedicated leased lines that run at T1 rates or higher, depending on the number of simultaneous users who need to be active online, how much data they routinely transfer, and so forth. Chapter 13 Review Questions 1. A(n) __________ can determine whether a cable break or short exists and approximately how far down the cable it’s located. a. Protocol analyzer b. Multimeter c. Time-domain reflectometer d. Network sniffer Answer: c. Time-domain reflectometer 2. At what layer of the OSI model is a CRC error detected? a. Data Link b. Network c. Transport d. Application Answer: a. Data Link 3. Which type of plan facilitates returning a network to its state before an upgrade? a. Backup plan b. Rollback plan c. Recovery plan d. Contingency plan Answer: b. Rollback plan 4. Based on the eight-step problem-solving process discussed in this chapter, what is the first step in network troubleshooting? a. Identify possible solutions. b. Implement the solution. c. Document the problem. d. Determine the problem definition and scope. Answer: d. Determine the problem definition and scope. 5. Which problem-solving approach requires a solid understanding of how networks work? a. Trial and error b. Step by step with the OSI model c. Blind guessing d. Using predefined solutions Answer: b. Step by step with the OSI model 6. Under which condition is using the trial-and-error approach not advisable? (Choose all that apply.) a. The problem is minor and easy to fix. b. A server or network device is live on the network. c. You can’t undo changes easily. d. You have plenty of time to test solutions. Answer: b. A server or network device is live on the network. c. You can’t undo changes easily. 7. Which layer is where problems restricted to one workstation are likely to occur? a. Network b. Data Link c. Physical d. Transport Answer: c. Physical 8. After implementing a solution, what’s the next step? a. Document the solution. b. Test the solution. c. Move to the next problem. d. Inform users of the fix. Answer: b. Test the solution. 9. Which of the following can be used to prevent data loss during a power fluctuation or failure? a. Surge protector b. UPS c. Power strip d. Circuit breaker Answer: b. UPS 10. Which of the following is an element of the information-gathering step in the problem-solving process? (Choose all that apply.) a. Find out whether the function ever worked. b. Determine whether something has changed. c. Implement possible solutions. d. Test the changes made. Answer: a. Find out whether the function ever worked. b. Determine whether something has changed. 11. When measuring network performance, what do you need as a point of reference? a. Test results b. Baseline c. User feedback d. Current speed Answer: b. Baseline 12. Which of the following is the TCP/IP protocol used to configure and monitor network resources? a. SMTP b. SNMP c. FTP d. HTTP Answer: b. SNMP 13. A logical topology includes jack locations and room numbers. True or False? Answer: False 14. What tool does its job by measuring the amount of time it takes for a signal to travel the length of the cable and back? a. Cable tester b. Time-domain reflectometer (TDR) c. Multimeter d. Protocol analyzer Answer: b. Time-domain reflectometer (TDR) 15. What is an advanced network-monitoring protocol with more capabilities than SNMP? a. RADIUS b. RMON c. TACACS+ d. HTTP Answer: b. RMON 16. For which of the following network conditions must you use a protocol analyzer or network monitor for further diagnosis? (Choose all that apply.) a. Network congestion b. Packet loss c. Slow network performance d. High rate of transmission errors Answer: c. Slow network performance d. High rate of transmission errors 17. At what layers of the OSI model does a software protocol analyzer operate? a. Layers 1 and 2 b. Layers 1 to 3 c. Layers 2 to 4 d. Layers 2 to 7 Answer: d. Layers 2 to 7 18. Which of the following is not found in the output of a successful Ping reply? a. Round-trip time b. TTL (Time to Live) c. The sequence number d. IP address of the destination Answer: c. The sequence number 19. Which documentation section describes the physical layout of network media? a. Network topology b. Cable plant c. Physical layout d. Network diagram Answer: b. Cable plant 20. When using the Ping program to solve a network connection problem, which of these steps can you skip if the target host is on the same LAN? a. Ping the DNS server. b. Ping the local loopback address. c. Ping the default gateway. d. Ping an external IP address. Answer: c. Ping the default gateway. Challenge Labs Challenge Lab 13-2 • What packet-capture filter did you use? The filter should be “udp port 53.” For each lookup, answer these questions: • Did your computer generate more than one DNS query for each lookup? If so, why? Answer will vary, but in most cases, more than one query occurs because of the primary DNS suffix added to the initial query. • What was the response from the DNS server for each query? Answers will vary. Students should use the summary information Wireshark supplies to determine the response. • Was more than one IP address returned? If so, why? More than one address should be returned because www.yahoo.com maps to multiple physical servers with different IP addresses. Challenge Lab 13-3 • What tools did you use in NetInfo to gather information? Answers will vary, but students should use at least Scanner and Services. • What type of information can you gather with NetInfo tools? Answers will vary, but some information might include IP addresses that are active and ports that are open on computers. • How can the information you gathered be useful in documenting and supporting your network? Answers will vary. Some ideas include the ability to see which IP addresses are active; which ports are open on servers, internetwork devices, and workstations; and whether there are addresses that shouldn’t be assigned. Challenge Lab 13-4 • What are three major features of WhatsUp Gold? • How can these features help you maintain and support a network? Answers will vary, but students should mention WhatsUp Gold’s capability to build a list of discovered devices, which provides a network diagram and allows managing many aspects of each device. Case Projects Case Project 13-1 Answers will vary. Students should put together a reasonable group of questions enabling them to determine the problem’s scope and nature and outline a feasible approach to solving the problem based on scopes that affect a single user and multiple users. Case Project 13-3 The most likely answer is that the upgrade to 100 Mbps switches will solve performance issues and errors caused by collisions. Students must verify that the network medium supports 100 Mbps Ethernet (Cat 5 cable or better). Solution Manual for Guide to Networking Essentials Gregory Tomsho 9781111312527, 9781305105430, 9788131502136

Document Details

Related Documents

Close

Send listing report

highlight_off

You already reported this listing

The report is private and won't be shared with the owner

rotate_right
Close
rotate_right
Close

Send Message

image
Close

My favorites

image
Close

Application Form

image
Notifications visibility rotate_right Clear all Close close
image
image
arrow_left
arrow_right