Hands-on Networking Fundamentals Chapter 7 Solutions Answers to the Chapter 7 Review Questions 1. Your office has 32 Windows XP computers and is just now considering a network. One of the office members suggests using a peer-to-peer network (without a server). What is your response to the suggestion? Answer: d. A server-based network is likely to be more effective, because a Windows XP peer-topeer network typically should have only up to about 10 users. 2. A small office of three people is working to set up a network to connect their Windows XP computers. All of these people are very inexperienced with computers. What Windows XP tool can they use to simplify network setup? Answer: b. Network Setup Wizard 3. In a small retail store there is one computer-based cash register, five computers, and one printer. How might a network be of benefit in this business? (Choose all that apply.) Answer: a. To make it easier to backup computers.; b. To share the printer.; c. To share files.; and d. to share an Internet connection 4. Which of the following can enable file sharing on a network that has both Windows XP and Fedora computers? (Choose all that apply.) Answer: a. Server Message Block (SMB) protocol; c. Samba; and d. Network File System (NFS) 5. One of the Windows XP computers in your small office acts as though it is not connected. Which of the following might be the problem? Answer: b. Client for Microsoft Networks has been removed. 6. In your home network, you have selected to obtain an IP address automatically. When there is no DHCP server on your network, this is called _____________. Answer: c. automatic private IP addressing 7. In Question 6, what IP address range is used? Answer: a. 169.254.0.1 to 169.254.255.254 8. You have created an account in Linux, but there seems to be a problem when you try to access that account. Which of the following might you try? Answer: d. View the /etc/passwd file to ensure the account is created properly. 9. You are setting up a shared folder in Windows XP Professional and only want users to read its contents, and not make changes to files in that folder. Which share permissions should you configure for that folder? Answer: b. Select Allow for Read. 10. One of the members of your office who uses a Windows XP computer says he is tired of having to manually access a drive shared by your computer each time he logs on. What do you suggest? Answer: c. He should map the drive and configure it to reconnect each time he logs on. 11. You created a temporary user account on a Linux computer for a financial auditor to access that computer. The auditor has left and now you want to delete the account. What command can you use? Answer: a. userdel 1 12. In Linux, you have created a documents directory that contains programs for all users to execute, and that directory contains spreadsheets for users to read or update. After you switch to that directory, which of the following commands provides the necessary file permissions? Answer: b. chmod 0777 * 13. Your colleague has configured her computer to enable access to shared directories through NFS, but one person in the office does not have access. Which of the following should your colleague check? (Choose all that apply.) Answer: b. the /etc/hosts.allow file; c. the /etc/hosts.deny file; and d. the directory permissions 14. You have been selected in your small office as the central person to manage the shared network printer and solve printer problems. Which of the following printer permissions should be configured for you in Windows XP Professional on the computer that is sharing the printer? (Choose all that apply.) Answer: c. Allow for Manage Documents and d. Allow for Manage Printers 15. Your home is networked and your daughter is lobbying to have her own dial-up line so she can use the Internet from her room instead of from the computer located in the den that is equipped with a cable modem. All of the computers in your home use Windows XP Professional. What is your response? Answer: d. Use Internet Connection Sharing (ICS) from the computer in the den. 16. In Linux, the shadow file is used for ___________________. Answer: a. keeping passwords secure 17. Your small office employs a Red Hat Enterprise Linux computer for three users to access over a network. You want to provide specific locations on the Linux computer for users to store files. Which of the following should you do? (Choose all that apply.) Answer: c. Create separate accounts for each user and d. Provide each user with a home directory. 18. Which of the following NTFS permissions apply to both folders and files? (Choose all that apply.) Answer: a. Write; b., Read; c. Modify; and d. Read & Execute 19. You are starting a business and include in the network portion of your business plan to purchase nine computers, and two printers. Your plan calls for sharing the printers. Your business partner suggests sharing the printers by connecting each one to a computer. What is the disadvantage of this approach? Answer: c. The printers cannot be used if the PCs to which they are connected are turned off. 20. One of the Windows XP Professional computers on your small office network offers a shared drive, but the problem is that often too many users access the drive at once. Your tests show that response is best when no more than three users access it at the same time. Which is an option you can try immediately? (Choose all that apply.) Answer: b. Set the properties on the Sharing tab for that shared folder to allow only three users. and d. Configure folder sharing on other computers in the office and distribute the shared files on more than one computer, so there is no need for more than three users to access shared resources on one computer at the same time. 2