Hands-on Networking Fundamentals

advertisement
Hands-on Networking Fundamentals
Chapter 7 Solutions
Answers to the Chapter 7 Review Questions
1.
Your office has 32 Windows XP computers and is just now considering a network. One of the
office members suggests using a peer-to-peer network (without a server). What is your response to
the suggestion?
Answer: d. A server-based network is likely to be more effective, because a Windows XP peer-topeer network typically should have only up to about 10 users.
2.
A small office of three people is working to set up a network to connect their Windows XP
computers. All of these people are very inexperienced with computers. What Windows XP tool
can they use to simplify network setup?
Answer: b. Network Setup Wizard
3.
In a small retail store there is one computer-based cash register, five computers, and one printer.
How might a network be of benefit in this business? (Choose all that apply.)
Answer: a. To make it easier to backup computers.; b. To share the printer.; c. To share files.; and
d. to share an Internet connection
4.
Which of the following can enable file sharing on a network that has both Windows XP and
Fedora computers? (Choose all that apply.)
Answer: a. Server Message Block (SMB) protocol; c. Samba; and d. Network File System (NFS)
5.
One of the Windows XP computers in your small office acts as though it is not connected. Which
of the following might be the problem?
Answer: b. Client for Microsoft Networks has been removed.
6.
In your home network, you have selected to obtain an IP address automatically. When there is no
DHCP server on your network, this is called _____________.
Answer: c. automatic private IP addressing
7.
In Question 6, what IP address range is used?
Answer: a. 169.254.0.1 to 169.254.255.254
8.
You have created an account in Linux, but there seems to be a problem when you try to access that
account. Which of the following might you try?
Answer: d. View the /etc/passwd file to ensure the account is created properly.
9.
You are setting up a shared folder in Windows XP Professional and only want users to read its
contents, and not make changes to files in that folder. Which share permissions should you
configure for that folder?
Answer: b. Select Allow for Read.
10. One of the members of your office who uses a Windows XP computer says he is tired of having to
manually access a drive shared by your computer each time he logs on. What do you suggest?
Answer: c. He should map the drive and configure it to reconnect each time he logs on.
11. You created a temporary user account on a Linux computer for a financial auditor to access that
computer. The auditor has left and now you want to delete the account. What command can you
use?
Answer: a. userdel
1
12. In Linux, you have created a documents directory that contains programs for all users to execute,
and that directory contains spreadsheets for users to read or update. After you switch to that
directory, which of the following commands provides the necessary file permissions?
Answer: b. chmod 0777 *
13. Your colleague has configured her computer to enable access to shared directories through NFS,
but one person in the office does not have access. Which of the following should your colleague
check? (Choose all that apply.)
Answer: b. the /etc/hosts.allow file; c. the /etc/hosts.deny file; and d. the directory permissions
14. You have been selected in your small office as the central person to manage the shared network
printer and solve printer problems. Which of the following printer permissions should be
configured for you in Windows XP Professional on the computer that is sharing the printer?
(Choose all that apply.)
Answer: c. Allow for Manage Documents and d. Allow for Manage Printers
15. Your home is networked and your daughter is lobbying to have her own dial-up line so she can
use the Internet from her room instead of from the computer located in the den that is equipped
with a cable modem. All of the computers in your home use Windows XP Professional. What is
your response?
Answer: d. Use Internet Connection Sharing (ICS) from the computer in the den.
16. In Linux, the shadow file is used for ___________________.
Answer: a. keeping passwords secure
17. Your small office employs a Red Hat Enterprise Linux computer for three users to access over a
network. You want to provide specific locations on the Linux computer for users to store files.
Which of the following should you do? (Choose all that apply.)
Answer: c. Create separate accounts for each user and d. Provide each user with a home directory.
18. Which of the following NTFS permissions apply to both folders and files? (Choose all that apply.)
Answer: a. Write; b., Read; c. Modify; and d. Read & Execute
19. You are starting a business and include in the network portion of your business plan to purchase
nine computers, and two printers. Your plan calls for sharing the printers. Your business partner
suggests sharing the printers by connecting each one to a computer. What is the disadvantage of
this approach?
Answer: c. The printers cannot be used if the PCs to which they are connected are turned off.
20. One of the Windows XP Professional computers on your small office network offers a shared
drive, but the problem is that often too many users access the drive at once. Your tests show that
response is best when no more than three users access it at the same time. Which is an option you
can try immediately? (Choose all that apply.)
Answer: b. Set the properties on the Sharing tab for that shared folder to allow only three users.
and d. Configure folder sharing on other computers in the office and distribute the shared files on
more than one computer, so there is no need for more than three users to access shared resources
on one computer at the same time.
2
Download