Network+ Lab Manual For Guide To Networks Review Question Answers
This document provides summaries of the answers to review questions and labs for each chapter in the Network+ Lab Manual for Guide to Networks. The summaries cover topics like network nodes, servers, security, internet uses, certification benefits, job searching methods, teamwork skills, presentations skills, internet service providers, protocols, clients, servers, LANs, WANs, standards bodies, MAC addresses, ARP, protocols, topologies, hubs, switches, checksums, and Ethernet protocols.
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
132 views
Network+ Lab Manual For Guide To Networks Review Question Answers
This document provides summaries of the answers to review questions and labs for each chapter in the Network+ Lab Manual for Guide to Networks. The summaries cover topics like network nodes, servers, security, internet uses, certification benefits, job searching methods, teamwork skills, presentations skills, internet service providers, protocols, clients, servers, LANs, WANs, standards bodies, MAC addresses, ARP, protocols, topologies, hubs, switches, checksums, and Ethernet protocols.
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 39
Network+ Lab Manual for Guide to Networks
Review Question Answers
Chapter 1
Lab 1.1 1. T 2. F 3. F 4. F 5. F 6. A node is a device with a NIC. 7. An address is a number used to uniquely identify a node. 8. a, b, c and d
Lab 1.2 1. T 2. F 3. T 4. F 5. T 6. The server would run slowly due to the large amount of work. 7. Server security is important in preventing unauthorized access to the server. 8. a, b, and c
Lab 1.3 1. T 2. T 3. T 4. T 5. T 6. Displaying your e-mail ID allows potential employers to contact you.
Lab 1.4 1. The uses for the Internet are myriad. Some potential uses are performing research, contacting other Internet users with similar interests, pursuing hobbies, engaging in electronic commerce, etc. 2. The benefit of becoming certified is to demonstrate to potential employers that you possess an appropriate level of technical skill. Some networking professionals are able to command higher compensation after certification. 3. Some other methods of searching for a job include networking with professional and personal contacts, reading help wanted advertisements in newspapers, industry magazines, and trade journals, attending job fairs, or engaging the help of a professional placement service.
Lab 1.5 1. The important thing to remember here is to never provide an answer to a technical problem if you are unsure of the correct solution. If necessary, say that you are unsure of the answer and that you will find the information. It is better to research the problem and provide a correct answer, rather than providing an incorrect answer, which may have negative repercussions on the network. Your coworkers will appreciate your candor! 2. Teamwork skills are vital to your success as a networking professional, as they help you to get along with others in the work environment and work together to find solutions to problems. 3. Oral presentations are often required to impart important information to users and other internal and external customers. The ability to present your information in a clear and readily understandable manner can help to avoid confusion and prevent potential crises in the future.
Lab 1.6. 1. An Internet Service Provider is an organization that provides access to the Internet. 2. A host is a server that manages shared resources. 3. The World Wide Web (WWW) is a collection of internetworked servers that share resources and exchange information according to specific protocols and formats. 4. A protocol is a set of rules that the network uses to transfer data. Protocols ensure that data are transferred whole, in sequence, and without error from one node on the network to another. 5. A client is a computer on the network that requests resources or services from another computer on the network. In some cases, the client could also act as the server this would be true in a peer network. 6. A server is a computer on the network that manages shared resources. Servers usually have more processing power, memory, and hard disk space than clients. They run network operating software that can manage not only data but also users, groups, security, and applications on the network. 7. A Wide Area Network (WAN) is a network that connects two or more geographically distinct LANs 8. A Local Area Network (LAN) is a network of computers and other devices that is confined to a relatively small space such as a building or one office.
Chapter 2
Lab 2.1 1. a 2. c 3. F 4. The ITU (International Telecommunications Union) is a specialized United Nations agency that regulates international telecommunication, including radio and TV frequencies, satellite and telephony specifications, networking infrastructure, and tariffs applied to global communications. 5. The EIA is a trade organization composed of representatives from electronics manufacturing firms across the US. EIA began as the Radio Manufacturers Association (RMA) in 1924. Over time, it evolved to include manufacturers of TVs, semiconductors, computers and networking devices. It sets standards for its members and also sets ANSI standards. 6. The OSI model is an example of the importance of setting standards among computer and network manufacturers. Without the OSI model, networks could not communicate with one another.
Lab 2.2 1. T 2. T 3. T 4. c 5. b 6. c 7. a 8. The parts of a data frame include the source address, destination address, data and CRC.
Lab 2.3 1. c 2. T 3. T 4. T 5. T 6. F 7. T
Lab 2.4 1. The MAC address uniquely identifies the NIC, and hence the computer in which it resides. 2. F 3. F 4. The two main parts of the MAC address are the Block ID and Device ID. 5. The purpose of the Block ID is to identify the equipment vendor. 6. The Device ID is based on the NICs model and manufacture to collectively form the Device ID. 7. F
Lab 2.5 1. The purpose of selecting a frame type on a Novell server is to let the NetWare server know how to send the packets. 2. F 3. The default frame type for a Novell 4.1 server running IPX is 802.2. 4. The default frame type for a Novell 5.x server running IPX is 802.2.
Chapter 3
Lab 3.1 1. F 2. T 3. F 4. F 5. The purpose of ARP is to associate IP to MAC mappings. ARP uses the IP address to determine the MAC. 6. F
Lab 3.2 1. F 2. F 3. T 4. F 5. Right click Network Neighborhood, then click Properties. Click the Protocols tab and then click Add. 6. F 7. T
Lab 3.3 1. F 2. T 3. T 4. c 5. b 6. b
Lab 3.4 1. T 2. TCP/IP and then NetBEUI. 3. F 4. T 5. T 6. The purpose of binding is to associate or link a protocol to a service or a NIC driver.
Lab 3.5 1. Jack should go into Network Neighborhood and follow add the TCP/IP protocol to the first NIC. He should then add NetBEUI to the second NIC. 2. T 3. You would disable a protocol if you no longer needed it. For example, if you are running NetBEUI and TCP/IP and you were only connected to the Internet, you could simply disable NetBEUI. By disabling a protocol, you reduce the number of broadcasts sent over the network cabling. 4. F 5. F 6. You would disable an adapter if it was no longer in use or used only occasionally. For example, a computer that has two NICs acts as a router. If the computer no longer acts as a router, then disabling one of the adapters would meet this need.
Chapter 4
Lab 4.1 1. F 2. F 3. F 4. Attenuation is the amount of signal loss over a given distance. Each addition of a device to a network segment adds slightly to the signals attenuation. A repeater can be used to regenerate the signal and to minimize the affect of attenuation. 5. The purpose of cable shielding is to prevent crosstalk on the network. 6. Throughput is the amount of work done in a given time period. 7. a, c, e 8. The maximum throughput of a Category 3 cable is 10 Mbps.
Lab 4.2 1. The purpose of a crossover cable is to connect two computers together or two switches/hubs together. 2. F 3. Pin 1 - 3 Pin 2 - 6 Pin 3 - 1 Pin 4 - 4 Pin 5 - 5 Pin 6 - 2 Pin 7 - 7 Pin 8 - 8 4. F 5. The wires are twisted on an STP cable to prevent crosstalk. 6. STP cable consists of twisted wire pairs that are not only individually insulated but are also surrounded by a shielding made of metallic substance such as foil. The shielding acts as an antenna converting the noise into current. UTP cabling consists of one or more insulated wire pairs encased in a plastic sheath. UTP does not contain any additional shielding for the twisted pairs. Thus, UTP is both less expensive and less resistant to noise than STP. 7. The twist ratio is the amount of twists a cable can handle over a certain distance before the data becomes distorted.
Lab 4.3 1. b and d 2. F 3. F 4. a, b 5. T 6. T 7. d 8. T
Lab 4.4 1. a 2. The bend radius measures the amount of bend a cable can take before loss of signal. 3. d 4. The purpose of a crimper is to affix the RJ-45 or RJ-11 connector to the cable. 5. The organizations that set twisted-pair wiring standards are: IEEE and EIA/TIA 6. T
Lab 4.5 1. The major difference between the two types of cable is that the maximum throughput of the Category 3 cable is 10 Mbps and the maximum throughout of the Category 5 cable is 100 Mbps. 2. F 3. F 4. T 5. T 6. c 7. F
Chapter 5
Lab 5.1 1. T 2. T 3. c 4. a 5. A hybrid topology is a network design that mixes two or more of the true network topologies, such as star, ring, and bus. 6. A star-wired ring topology has all the devices on the network connected in a ring fashion. An electronic signal moves around to each node and the devices are connected using a MSAU or hub, with a cable going from each computer to the MSAU. A star-wired bus topology, on the other hand, has all the devices on the network interconnected by one single wire. A drawback to this arrangement is that the failure of one node brings down the entire LAN.
Lab 5.2 1. A terminator is used to absorb the signal and prevent the network from hanging. 2. F 3. F 4. c
Lab 5.3 1. F 2. a 3. b 4. T 5. T 6. F 7. T 8. c
Lab 5.4 1. The purpose of the checksum is to determine if the packet is valid. 2. b 3. The purpose of a sequence number is to provide an order for the packets so they can be reassembled in the correct order at the destination. 4. Ethernet follows a set of communication rules called Carrier Sense Multiple Access/Collision Detect (CSMA/CD). All Ethernet networks, independent of their frame type or speed, use CSMA/CD. On Ethernet networks, two nodes can start to transmit at the same time; this is called a collision. Once a collision occurs, the two nodes send a jamming signal, which ensures that no other node transmits. After a random period of time, called the backoff period the two nodes initiate transmission once again. 5. The purpose of the source and destination addresses is to know where the packet came from and where it is to be sent. 6. The purpose of the LLC in an Ethernet 802.2 frame is to distinguish among multiple clients on the LAN. 7. T
Lab 5.5 1. F 2. F 3. The lights on the hub let you know the hub is working and active. 4. b 5. b, c and d 6. T
Chapter 6
Lab 6.1 1. T 2. The data bus sends data to and from the CPU and NIC. 3. T 4. F 5. F 6. Only laptops use PCMCIA NICs. 7. T 8. SMC, 3COM and Intel are three popular NIC vendors. 9. The purpose of the IRQ is to allow a device and the CPU a method of communicating.
Lab 6.2 1. A NIC driver is a software program that allows the NIC to work with the network operating system. 2. d 3. T 4. b, c and d 5. T 6. T 7. The three settings you may need to set on a NIC are IRQ, Base Memory and I/O port address. 8. A router can make a path determination for a packet. A hub cannot make a path determination; it simply connects nodes together.
Lab 6.3 1. Management Information Base - The database used by SNMP for queries. 2. F 3. F 4. T 5. c 6. F - Token Ring has no collisions. 7. a, b, e 8. The purpose of a port on a hub is to connect the PC's cable to the hub. 9. T
Lab 6.4 1. b 2. F - TCP/IP is a routable protocol not a routing protocol. An example of a routing protocol would be RIP or OSPF. 3. Convergence Time is the amount of time needed for all the routers in the LAN to have their routing tables equal. 4. e 5. T 6. c 7. RIP uses only hop count as its metric. OSPF uses other things such as network load, speed of the LAN and hop count as metrics. Lab 6.5 1. T 2. T 3. F 4. T 5. b 6. c 7. T 8. T 9. c
Chapter 7
Lab 7.1 1. F 2. T 3. Point to Point refers to the connection of one site to another site. 4. F 5. You would use a WAN connection. 6. A WAN is used to connect geographical sites. 7. A dedicated line provides a continuous telecommunications link between two sites. Some companies have a dedicated line running between their site and their ISP. Companies also run dedicated lines between buildings for continuous service or for fault tolerance purposes. 8. Joe would use a WAN connection. 9. A WAN is used to connect geographical sites. 10. Sally would use a LAN connection. 11. A LAN is used to connect nodes in close proximity.
Lab 7.2 1. T 2. T 3. F 4. T 5. EMI and RFI have no effect on fiber transmissions. 6. b
Lab 7.3 1. A modem stands for modulator/demodulator. It is a device that modulates, or converts, digital signals into analog signals. Your computer understands digital signals (binary zeros and ones) while the telephone line system understands analog (waves). A modem allows the computer to sent data over the telephone line. Once received on the other end, another modem demodulates the analog signal to a digital one that the computer on the destination end can understand. 2. a, b, c and d 3. T 4. T 5. T 6. F 7. T 8. T
Lab 7.4 1. F 2. T 3. F 4. c 5. T 6. A multiplexer is a device that takes several low speed lines and combines those into one single high-speed line. Typically multiplexers (or muxes) have terminals connected to them (the many low speed lines). The terminals communicate with the mux and the mux transmits all the data via one higher speed line to a host computer. 7. d 8. d
Lab 7.5 1. Dial-Up Networking is a method of connecting a computer to an ISP. 2. F 3. SLIP can only carry IP packets and only supports synchronous communication. PPP carries IP, IPX or AppleTalk packets and supports synchronous and asynchronous communication. 4. Synchronous refers to a communications method in which data being transmitted and received by nodes must conform to a timing scheme. A clock synchronizes the time for all nodes on the network. 5. Asynchronous refers to a communications method in which all data being transmitted and received by nodes do not have to conform to any timing scheme. Instead of a clock to provide synchronization or timing, a start and stop bit is transmitted with the data. These start and stop bits provide communication between the sender and receiver. 6. T 7. T
Lab 7.6 1. T 2. T 3. Remote Access Service is a service that runs on a MS Windows NT Server or Workstation. RAS must be installed in order for client to access the server remotely via a modem. The client must have DUN installed in order to communicate with a RAS server.
Chapter 8
Lab 8.1 1. T 2. T 3. A file system is a hierarchical arrangement of folders and files. 4. Windows NT Server supports the following file systems: NTFS, FAT, and CDFS. 5. F 6. e 7. F 8. A FAT file or partition cannot exceed 4 GB, whereas FAT32 can handle 2 TB (terabytes) partitions. FAT uses a 16-bit address to store file size information while FAT32 uses a 32-bit address for this. FAT is less efficient than FAT32. 9. NFTS if more secure than FAT. MS Windows NT supports NTFS and not FAT. FAT is limited to 8.3 names. NTFS can handle 256 characters in a name. FAT uses 16-bit addressing while NTFS uses 64-bit addressing. A FAT file or partition cannot exceed 4 GB while NTFS can support 16 EB (exabytes)
Lab 8.2 1. F 2. T 3. A trust relationship is a security mechanism that allows two NT domains to share resources. 4. A complete trust domain model is a security model where all domains trust one another. 5. F A single Windows NT domain can support a maximum of 26,000 users 6. F A master domain model can support a maximum of 40,000 users. 7. The formula for determining the number of trusts is N(N-1). Thus, 4(4-1) = 4(3) = 12.
Lab 8.3 1. F 2. A domain is simply a group of users, servers, and other resources that share account and security information. For example, there might be an Accounting domain for all domain users and their resources such as files and printers. 3. The purpose of the BDC (Backup Domain Controller) is simply to receive updates from the PDC (Primary Domain Controller) in the event the PDC goes down. At regular time intervals, the PDC will propagate the accounts database of users and groups to the BDC. 4. The difference between a domain controller and a member server is that a domain controller participates in domain logon validation while a member server does not. 5. F 6. F 7. T
Lab 8.4
1. The purpose of a group is to make the management of individual users easier. For instance, one may put many users into a group and then apply security to the group. 2. F 3. T 4. F 5. a, b, e 6. T 7. F
Lab 8.5 1. The purpose of permissions is to restrict access to shared folders and printers. 2. The Read permission allows a user to view the contents of a file. 3. T 4. The Full Control permission gives complete access to a folder, while the No Access permission gives no access to the folder - not even viewing. 5. T 6. T 7. The default permissions for a shared folder give everyone Full Control. 8. The hand graphic below a folder indicates that the folder is shared. 9. F
Chapter 9
Lab 9.1 1. The kernel is the core part of the operating system that is transferred from disk to memory at boot time. All operating systems have a kernel that stays in memory and handles disk I/O, terminal or video I/O and memory management. The kernel can be augmented by loading and unloading additional programs as needed. 2. c 3. d 4. T 5. c 6. T 7. T 8. NetWare Loadable Module - a program that only runs on a Novell NetWare Server. The function of an NLM is to provide other services to a Novell Server. For example, the NetWare server kernel does not have HTTP or FTP capabilities built in. By loading the HTTP or FTP NLMs, this functionality is provided. 9. F
Lab 9.2 1. A volume is an aggregation of free disk space on multiple disk drives. For example, say you have 10 MB free space on disk 1 and 15 MB of free disk space on disk 2. You could create a single volume to access the entire 25 MB (10 + 15). The volume would have a drive letter and would be transparent to the user. 2. c 3. T 4. T 5. The purpose of block suballocation is to minimize disk waste. 6. F 7. T 8. T
Lab 9.3 1. The purpose of the map command is to associate a logical, or virtual drive, with a physical drive on another computer. 2. T 3. T 4. F 5. T 6. F
Lab 9.4 1. NDS stands for Novell Directory Services, a database of users, groups, printers, volumes and other objects. 2. An organization unit is a logical grouping of users, printers and groups and other objects in Novell. For example, you could have a PAYROLL organization unit that has all the users, groups and printers belonging to that department. In Novell, an organization unit is much like a Windows folder; it contains objects such as users, printers and groups. 3. b 4. F 5. F 6. F 7. T
Lab 9.5 1. A context provides the location of an NDS object. It is analogous to a folder in Windows. 2. a 3. d 4. b 5. b and c 6. F 7. T
Chapter 10
Lab 10.1 1. c 2. F 3. T 4. a 5. d 6. The purpose of typing a password twice when changing it is to confirm that the password was typed correctly the first time. 7. F
Lab 10.2 1. F 2. T 3. c 4. a 5. F 6. F 7. T
Lab 10.3
In questions 1 10, the answers will vary.
Lab 10.4 1. The purpose of wildcard characters is to match many characters. For example, in most operating systems such as UNIX, Linux, MS-DOS and Windows, you can select a subset of the files in a given directory. To accomplish this, there are two wildcard symbols: the "?" and the "*" symbols. For example, you can execute an MS-DOS dir command by entering dir t* and it will return only those files that begin with the letter "t"; the equivalent in UNIX and Linux is ls t*. So, to match many characters, you would use the asterisk (*) and to match a single character use the question mark (?). 2. F 3. e 4. F 5. F 6. The purpose of the pipe symbol is to send the output of one command to another to be used as input. This function is typically used to modify a command in some way.
Lab 10.5 1. A file system is a hierarchical arrangement of folders and files. 2. F 3. T 4. F 5. F 6. c
Chapter 11
Lab 11.1 1. a 2. F 3. F 4. F 5. F 6. d 7. F
Lab 11.2 1. The default gateway's job is to take the packet and forward it to another network to which it is connected. 2. T 3. The dotted decimal notation is the addressing scheme used by TCP/IP. 4. T 5. T 6. T 7. T
Lab 11.3 1. The purpose of the hosts file is to associate an IP address to a user-friendly name. 2. e 3. An alias provides a nickname for the host. An alias allows a user within an organization to address a host by a shorter name than the full host name. 4. c 5. c 6. c 7. T
Lab 11.4 1. The purpose of DHCP is to automatically assign a node an IP address, default gateway, and subnet mask. 2. T 3. T 4. T 5. The purpose of the DHCP lease is to allow the client to use the IP address for a certain time period. 6. T 7. T
Lab 11.5 1. The purpose to having a secondary name server is to resolve names in case the primary name server goes down. 2. T 3. T 4. a, b and d 5. T 6. T 7. The difference between the hosts file and DNS is that the hosts file is flat and DNS is hierarchical.
Lab 11.6 1. WINS provides a means of resolving NetBIOS names with IP addresses. 2. F 3. F 4. F 5. F 6. T
Lab 11.7 1. The purpose of FTP is to send and receive files between TCP/IP computers. 2. T 3. T 4. T 5. a
Lab 11.8 1. b 2. F: The default port number for Telnet is 23. 3. A socket is a logical address assigned to a specific process on a host computer. 4. F 5. T 6. T
Chapter 12 Lab 12.1 1. T 2. The steps are as follows: Ping the local address, Ping the near side of the router, Ping the far side of the router, and Ping a remote computer on the far side of the router's segment. 3. T 4. T
Lab 12.2 1. During the course of troubleshooting, you will find it necessary to test as many possible scenarios before replacing any one component. For example, if a user calls and tells you the computer is not working, you should not simply replace the entire chassis and monitor without asking the user some basic questions. Typically, you should politely ask if any changes have occurred. Many times a user changed something and either forgot or is too embarrassed to admit it. You may find in this sample scenario, that the cable is unplugged; so, replacing the entire chassis would be wasteful and costly. Take another scenario for example, where a user says that they cannot connect to the web. Before replacing the NIC or cable, go to the computer and determine if other users on the same network segment can connect. If so, then you've isolated the problem to the computer. Upon further investigation, you may find the user cannot get to any other server on the network. Next, you would test the cable with a good known cable to ensure the cable is sound. If the cable checks out ok, you would then consider the NIC as the culprit. Remove the chassis top and replace the NIC with a good known NIC. However, if you simply replaced the NIC upon initial investigation, you would not have tested the network segment or the cable, which might have been the problem(s). 2. T 3. b 4. T 5. A red circle with a line through it indicates a device is either in error or is disabled. Typically, you will see this symbol adjacent to a network adapter or protocol that has been disabled (in Network Neighborhood Properties) manually. However, you can also see this symbol in the event of an IRQ conflict when two devices are using the same IRQ.
Lab 12.3 1. T 2. T 3. One would see messages related to problems. Specifically, one would see System, Security and Application problems in Event Viewer. There are 3 levels of messages: Stop errors, Informational, and Warning. 4. You need to follow a logical methodology to troubleshoot a problem more effectively and efficiently. For example, when troubleshooting a problem, you should write down the symptoms, identify the scope of the problem, recreate the problem, consider any changes, and implement and test a solution. You should make notes of the tests that pass or fail so you don't duplicate tests unnecessarily. Don't overlook the simple and obvious solution. At times, a power cord may have been knocked loose.
Lab 12.4 1. The main symptom is that not all nodes on the hub will access the LAN. 2. After implementing a solution, you must test it to verify that it works properly. For example, if a printer is not working, may your solution is to reload a new print driver. After loading the new print driver, you must test this by printing a report to it. Don't assume the new print driver will work. 3. Many problems can be resolved by simply asking the user if any changes have been made. You should be polite about this and not sound accusatory. Often, the user may have forgotten they made a change because they thought it was insignificant. By asking probing questions related to the problem, you may jog the user's memory and help them remember if a change was made. The main reason that you should ask if a user change has been made is to reduce the amount of time lost from tracking down a seemingly spurious problem. 4. F 5. In this scenario the affected users are from the same department and are connected to the same hub. Thus, it appears to be a hub problem. Because each department has separate hubs, you may have a larger problem if you received a call from users in multiple departments. Either all hubs malfunctioned at the same time, which is doubtful, or the entire network may be down possibly due to a downed server.
Chapter 13
Lab 13.1 1. The practice of measuring and recording a LAN's current state of operation. Baselining measurements may include the utilization rate for your backbone, number of users logged on per day or per hour, number of protocols that run on your network, statistics about errors, frequency with which networked applications are used, or information regarding which users take up the most bandwidth. 2. The process of identifying and tracking the software and hardware on the LAN. The first step in asset management is to take an inventory of each node on the network. This inventory should include not only the total number of components on the LAN, but also each devices configuration files, model number, serial number, location on the LAN and technical support contact. 3. Change management is the process of following all the software and hardware changes on all pieces of equipment located throughout the LAN. This should be updated whenever a change occurs to a piece of equipment. The benefit is that you are aware of all software and hardware, their revision levels and can quickly adapt to the changing needs of the user environment. 4. T 5. a, b, c, d and e 6. F 7. T 8. F
Lab 13.2 1. A software upgrade is a major change to the existing software code. An upgrade usually includes changes to the functionality or interface of the program. 2. A patch is additional code that provides an enhancement or a repair to a specific program. 3. T 4. F 5. An application upgrade is an upgrade to a software program used by end-users to perform their daily tasks. A network operating system upgrade is an upgrade to the operating system that the applications use. 6. c
Lab 13.3 1. F 2. T 3. T 4. Three possible key issues to consider: a. Cost of upgrade b. speed after upgrade c. how the backbone upgrade affects the users d. will any software need to be upgraded on other equipment
5. a. Token Ring to Ethernet b. Ethernet to ATM c. replacing all hubs with switches d. migrating from 10 Mbps Ethernet to 100 Mbps Ethernet e. replacing all twisted pair for Fiber
6. T
Lab 13.4 1. The Internet can assist you by allowing you to research different vendor offerings for cost or functionality. 2. Many experts subscribe to newsgroups. It is important to use newsgroups because many experts subscribe to them. They can assist you with many technical problems and give free advice. 3. Smarter devices will continue to bring a greater concern for security. As systems adopt the same (open) standards, they become more vulnerable to hackers who can easily figure out the code after mastering similar systems. 4. Some examples of trends include: Faster data processing and transmission will bring network access to more people in less time. More comprehensive integration means that more products sold by different vendors will work well together. Open standards will make networking careers less specialized and probably more interesting. Greater accessibility will bring technology to more users. 5. F
Chapter 14
Lab 14.1 1. Encryption is the process of scrambling data into a format that can be read only by a computer with the key to unscrambling the data. It is a security technique. 2. Polymorphism refers to the process of a virus changing its characteristics, such as size, when transferred to a new system. This makes them harder to detect. 3. Signature scanning is the comparison of a file's content with known virus signatures in a database. Integrity checking is a method of comparing current file characteristics against an archived version of these characteristics to detect any changes. 4. T 5. T 6. Viruses that are programmed to activate on a particular date.
Lab 14.2 1. Line conditioning is the process of including special noise filters to guard against line noise. Line noise is the fluctuation in voltage levels caused by other devices or EMI. 2. A UPS (Uninterruptible Power Supply) is a device with a battery that is attached to one or more devices to prevent them from shutting down abruptly in the event of power loss. It gives you time to gracefully shutdown the device, thereby preventing any loss of information or damage to the system. A generator provides power to an entire building, and thus they are typically costlier than a UPS. 3. A surge is a momentary increase in voltage due to distant lightning strikes or electrical problems. They last only for a few thousandths of a second but can degrade the computer's power supply. 4. b 5. d 6. A standby UPS provides continuous voltage to a device by switching to a battery in the event of power loss. An online UPS uses A/C power from the wall to continuously charge the battery. The device connected to the online UPS is charged from the battery instead of the wall outlet. This provides continuous service because the computer does not have to switch from A/C to battery backup. While an online UPS is preferable because it provides uninterrupted service, an online UPS is more expensive than a standby UPS. 7. T
Lab 14.3 1. F 2. F 3. T 4. T 5. c 6. F 7. RAID level 0 (Disk striping) works by writing the data equally into 64 KB blocks across several disks in the array. It is fast but not fault tolerant because if one disk fails, then all data is lost because RAID level 0 provides for no redundancy.
Lab 14.4 1. Mirroring copies the data to two disks. In the event of one disk failure, data can be accessed via the second disk in the mirror. Mirroring is fault tolerant but suffers a performance hit on disk writes because it must write twice. 2. F 3. T 4. a 5. T 6. F 7. Redundant Array of Inexpensive Disks (RAID) is a method of storing data to improve access to data and/or integrity of data. There are 5 levels of RAID offering varying degrees of performance and/or fault tolerance.
Lab 14.5 1. Fault tolerance is the degree to which a system can tolerate a problem (the fault) and still operate. 2. T 3. RAID level 3 stripes the data across several disks in the array. There is one single parity disk. RAID level 5 stripes the data and the parity across all disks. RAID level 5 is more fault tolerant than RAID level 0. 4. Server mirroring is a fault-tolerant method where one server is duplicated with identical components. This is expensive but highly fault tolerant. 5. Parity is a mechanism used to verify the integrity of data by adding either a 0 or 1 to the data. These parity bits make a difference because they use an XOR operation on the bits. For example, 1 XORed with 1 yields 0. If you XORed 1 with 0, you would get 1. Stated simply, if data on one disk fails, the parity bits are used to calculate the data on the failed disk. 6. An advantage of server clustering is that the failure of one server does not prevent the application from running. A disadvantage is that they must be geographically close, which may be hazardous in the event of fire or another catastrophic event. 7. Hot swappable refers to identical components that automatically assume the functions of their counterpart if one suffers failure. 8. b
Lab 14.6 1. A backup is important to ensuring the integrity of the data in the event of a disk failure. 2. Some companies store backups in a remote location in case of a fire or flood, or some other catastrophic event at the companys physical facility that might destroy the backup. 3. Disaster recovery is the process of restoring critical functionality and data in the event of an enterprise-wide outage. 4. c 5. A backup rotation scheme is important for maintaining integrity of the tapes being sent offsite. 6. a 7. Possible key elements include: What kind of rotation schedule will backups follow? How will you verify the accuracy of backups? How long will you save backups? Is the backup software reliable? Is the backup hardware reliable? Does the data span multiple tapes and require human intervention?
Chapter 15
Lab 15.1 1. F 2. The purpose of auditing is to track activity on the network. This helps identify which users have accessed which files and the method of access (e.g., Did the user read a file ?, Did the user write to a file ?). 3. Authentication is the process of verifying a user's identify and authority to use a system. 4. A root is a highly privileged user on a UNIX system. 5. A hacker is someone who masters the inner workings of an OS in order to better understand them. A cracker intends to do harm.
Lab 15.2 1. Social Engineering is the process of designing computers to fit human needs. 2. F 3. F 4. IP spoofing refers to obtaining an IP address that allows a cracker to pretend to have authority they don't really have. 5. Flashing is the mischievous practice of sending garbage characters to one machine, for the purpose of causing havoc on the computer screen that receives the characters. 6. F 7. A firewall is a device that blocks connections by using port numbers or IP addresses, among other methods.
Lab 15.3 1. Forcing a unique password for a user ensures that the user alone has access to the password. Of course, if the user gives out the password, the integrity of the password is compromised. However, the user is still accountable for any wrongdoing. 2. F 3. Encryption is the process of scrambling data into a format that can be read only by a computer with the key to unscrambling the data. It is a security technique. 4. T 5. Secure Socket Layer (SSL) is a method of encrypting web pages while in transmission.
Lab 15.4 1. A network address restriction forces a user to use a particular workstation. If an intruder happens to get the user name and password for a user but attempts to logon to a different workstation, they will be denied access. It is a security strategy. 2. T 3. T 4. T 5. If network address restriction is in force, the hacker will be denied access. A network address restriction limits a username and password to use on a specific node on the network.
Lab 15.5 1. You can set up login time restrictions to allow users to logon during their normal working hours. This prevents their user name and password from being misused during off-time hours. 2. F 3. To restrict usage, allow users to only logon during their shift. 4. T 5. a. Do not use familiar types of passwords. b. Do not use words that appear in the dictionary. c. Make passwords longer than six characters. d. Requiring users to use mix case letters. e. Requiring a password scheme that requires a mix of alphabetic characters and numbers. f. Requiring passwords to be changed periodically.
Chapter 16
Lab 16.1 1. A project plan is the way in which details of a project are organized (for example, the timeline and the significant tasks). Plans for small projects may take the form of a simple text or spreadsheet document. For larger projects, you would use project management software. It facilitates project planning by providing a framework for inputting tasks, timelines, resource assignments, completion dates, and so on. 2. You must identify the dependencies and predecessor tasks in order to determine what tasks must be completed prior to others. 3. A project sponsor is the manager or other higher up who agrees with the project's goals and strives to help you achieve them. 4. Every project has significant accomplishments that mark specific steps in their projects. A milestone is reference point that marks the completion of a major task or group in the project. 5. A feasibility study is performed to determine if the project should be implemented at all. It helps determine if the benefits outweigh the costs.
Lab 16.2 1. A precedent activity is one that requires completion before the next subsequent one can begin. 2. A needs assessment is the process of clarifying reasons and objectives of a proposed change. 3. A pilot network is a network where changes are implemented prior to running on a production network. It is necessary to test software and hardware on a pilot or test network so you don't destroy the production or live network data. 4. Contingency planning is the process of identifying the steps that will minimize risks of unforeseen circumstances endangering the quality of the project's goal.
Lab 16.3 1. Process management - the planning for and handling of the steps involved in accomplishing a goal. 2. a. To ensure the project's goal are understood by all. b. To keep a project's timeline on budget and on track. c. To ensure all necessary software and hardware are upgraded and compatible with revision levels. d. To determine which tasks must be completed before others. e. To avoid duplication of effort. 3. Funding is important so a budget can be set to initiate the project. 4. A network is tested after an upgrade to ensure that it still functions properly after the changes have been implemented. 5. You should document changes so you know how to handle a similar situation in the future.