Você está na página 1de 39

Network+ Lab Manual for Guide to Networks

Review Question Answers



Chapter 1

Lab 1.1
1. T
2. F
3. F
4. F
5. F
6. A node is a device with a NIC.
7. An address is a number used to uniquely identify a node.
8. a, b, c and d

Lab 1.2
1. T
2. F
3. T
4. F
5. T
6. The server would run slowly due to the large amount of work.
7. Server security is important in preventing unauthorized access to the server.
8. a, b, and c

Lab 1.3
1. T
2. T
3. T
4. T
5. T
6. Displaying your e-mail ID allows potential employers to contact you.

Lab 1.4
1. The uses for the Internet are myriad. Some potential uses are performing research, contacting
other Internet users with similar interests, pursuing hobbies, engaging in electronic commerce,
etc.
2. The benefit of becoming certified is to demonstrate to potential employers that you possess an
appropriate level of technical skill. Some networking professionals are able to command higher
compensation after certification.
3. Some other methods of searching for a job include networking with professional and
personal contacts, reading help wanted advertisements in newspapers, industry magazines, and
trade journals, attending job fairs, or engaging the help of a professional placement service.

Lab 1.5
1. The important thing to remember here is to never provide an answer to a technical problem if
you are unsure of the correct solution. If necessary, say that you are unsure of the answer and
that you will find the information. It is better to research the problem and provide a correct
answer, rather than providing an incorrect answer, which may have negative repercussions on the
network. Your coworkers will appreciate your candor!
2. Teamwork skills are vital to your success as a networking professional, as they help you to
get along with others in the work environment and work together to find solutions to problems.
3. Oral presentations are often required to impart important information to users and other
internal and external customers. The ability to present your information in a clear and readily
understandable manner can help to avoid confusion and prevent potential crises in the future.

Lab 1.6.
1. An Internet Service Provider is an organization that provides access to the Internet.
2. A host is a server that manages shared resources.
3. The World Wide Web (WWW) is a collection of internetworked servers that share resources
and exchange information according to specific protocols and formats.
4. A protocol is a set of rules that the network uses to transfer data. Protocols ensure that data
are transferred whole, in sequence, and without error from one node on the network to another.
5. A client is a computer on the network that requests resources or services from another
computer on the network. In some cases, the client could also act as the server this would be
true in a peer network.
6. A server is a computer on the network that manages shared resources. Servers usually have
more processing power, memory, and hard disk space than clients. They run network operating
software that can manage not only data but also users, groups, security, and applications on the
network.
7. A Wide Area Network (WAN) is a network that connects two or more geographically distinct
LANs
8. A Local Area Network (LAN) is a network of computers and other devices that is confined to
a relatively small space such as a building or one office.

Chapter 2

Lab 2.1
1. a
2. c
3. F
4. The ITU (International Telecommunications Union) is a specialized United Nations agency
that regulates international telecommunication, including radio and TV frequencies, satellite and
telephony specifications, networking infrastructure, and tariffs applied to global
communications.
5. The EIA is a trade organization composed of representatives from electronics manufacturing
firms across the US. EIA began as the Radio Manufacturers Association (RMA) in 1924. Over
time, it evolved to include manufacturers of TVs, semiconductors, computers and networking
devices. It sets standards for its members and also sets ANSI standards.
6. The OSI model is an example of the importance of setting standards among computer and
network manufacturers. Without the OSI model, networks could not communicate with one
another.

Lab 2.2
1. T
2. T
3. T
4. c
5. b
6. c
7. a
8. The parts of a data frame include the source address, destination address, data and CRC.

Lab 2.3
1. c
2. T
3. T
4. T
5. T
6. F
7. T

Lab 2.4
1. The MAC address uniquely identifies the NIC, and hence the computer in which it resides.
2. F
3. F
4. The two main parts of the MAC address are the Block ID and Device ID.
5. The purpose of the Block ID is to identify the equipment vendor.
6. The Device ID is based on the NICs model and manufacture to collectively form the Device
ID.
7. F

Lab 2.5
1. The purpose of selecting a frame type on a Novell server is to let the NetWare server know
how to send the packets.
2. F
3. The default frame type for a Novell 4.1 server running IPX is 802.2.
4. The default frame type for a Novell 5.x server running IPX is 802.2.

Chapter 3

Lab 3.1
1. F
2. T
3. F
4. F
5. The purpose of ARP is to associate IP to MAC mappings. ARP uses the IP address to
determine the MAC.
6. F

Lab 3.2
1. F
2. F
3. T
4. F
5. Right click Network Neighborhood, then click Properties. Click the Protocols tab and then
click Add.
6. F
7. T

Lab 3.3
1. F
2. T
3. T
4. c
5. b
6. b

Lab 3.4
1. T
2. TCP/IP and then NetBEUI.
3. F
4. T
5. T
6. The purpose of binding is to associate or link a protocol to a service or a NIC driver.

Lab 3.5
1. Jack should go into Network Neighborhood and follow add the TCP/IP protocol to the first
NIC. He should then add NetBEUI to the second NIC.
2. T
3. You would disable a protocol if you no longer needed it. For example, if you are running
NetBEUI and TCP/IP and you were only connected to the Internet, you could simply disable
NetBEUI. By disabling a protocol, you reduce the number of broadcasts sent over the network
cabling.
4. F
5. F
6. You would disable an adapter if it was no longer in use or used only occasionally. For
example, a computer that has two NICs acts as a router. If the computer no longer acts as a
router, then disabling one of the adapters would meet this need.

Chapter 4

Lab 4.1
1. F
2. F
3. F
4. Attenuation is the amount of signal loss over a given distance. Each addition of a device to a
network segment adds slightly to the signals attenuation. A repeater can be used to regenerate
the signal and to minimize the affect of attenuation.
5. The purpose of cable shielding is to prevent crosstalk on the network.
6. Throughput is the amount of work done in a given time period.
7. a, c, e
8. The maximum throughput of a Category 3 cable is 10 Mbps.

Lab 4.2
1. The purpose of a crossover cable is to connect two computers together or two switches/hubs
together.
2. F
3. Pin 1 - 3
Pin 2 - 6
Pin 3 - 1
Pin 4 - 4
Pin 5 - 5
Pin 6 - 2
Pin 7 - 7
Pin 8 - 8
4. F
5. The wires are twisted on an STP cable to prevent crosstalk.
6. STP cable consists of twisted wire pairs that are not only individually insulated but are also
surrounded by a shielding made of metallic substance such as foil. The shielding acts as an
antenna converting the noise into current.
UTP cabling consists of one or more insulated wire pairs encased in a plastic sheath. UTP does
not contain any additional shielding for the twisted pairs. Thus, UTP is both less expensive and
less resistant to noise than STP.
7. The twist ratio is the amount of twists a cable can handle over a certain distance before the
data becomes distorted.

Lab 4.3
1. b and d
2. F
3. F
4. a, b
5. T
6. T
7. d
8. T

Lab 4.4
1. a
2. The bend radius measures the amount of bend a cable can take before loss of signal.
3. d
4. The purpose of a crimper is to affix the RJ-45 or RJ-11 connector to the cable.
5. The organizations that set twisted-pair wiring standards are: IEEE and EIA/TIA
6. T

Lab 4.5
1. The major difference between the two types of cable is that the maximum throughput of the
Category 3 cable is 10 Mbps and the maximum throughout of the Category 5 cable is 100 Mbps.
2. F
3. F
4. T
5. T
6. c
7. F

Chapter 5

Lab 5.1
1. T
2. T
3. c
4. a
5. A hybrid topology is a network design that mixes two or more of the true network topologies,
such as star, ring, and bus.
6. A star-wired ring topology has all the devices on the network connected in a ring fashion. An
electronic signal moves around to each node and the devices are connected using a MSAU or
hub, with a cable going from each computer to the MSAU. A star-wired bus topology, on the
other hand, has all the devices on the network interconnected by one single wire. A drawback to
this arrangement is that the failure of one node brings down the entire LAN.

Lab 5.2
1. A terminator is used to absorb the signal and prevent the network from hanging.
2. F
3. F
4. c

Lab 5.3
1. F
2. a
3. b
4. T
5. T
6. F
7. T
8. c

Lab 5.4
1. The purpose of the checksum is to determine if the packet is valid.
2. b
3. The purpose of a sequence number is to provide an order for the packets so they can be
reassembled in the correct order at the destination.
4. Ethernet follows a set of communication rules called Carrier Sense Multiple Access/Collision
Detect (CSMA/CD). All Ethernet networks, independent of their frame type or speed, use
CSMA/CD. On Ethernet networks, two nodes can start to transmit at the same time; this is
called a collision. Once a collision occurs, the two nodes send a jamming signal, which ensures
that no other node transmits. After a random period of time, called the backoff period the two
nodes initiate transmission once again.
5. The purpose of the source and destination addresses is to know where the packet came from
and where it is to be sent.
6. The purpose of the LLC in an Ethernet 802.2 frame is to distinguish among multiple clients
on the LAN.
7. T

Lab 5.5
1. F
2. F
3. The lights on the hub let you know the hub is working and active.
4. b
5. b, c and d
6. T

Chapter 6

Lab 6.1
1. T
2. The data bus sends data to and from the CPU and NIC.
3. T
4. F
5. F
6. Only laptops use PCMCIA NICs.
7. T
8. SMC, 3COM and Intel are three popular NIC vendors.
9. The purpose of the IRQ is to allow a device and the CPU a method of communicating.

Lab 6.2
1. A NIC driver is a software program that allows the NIC to work with the network operating
system.
2. d
3. T
4. b, c and d
5. T
6. T
7. The three settings you may need to set on a NIC are IRQ, Base Memory and I/O port address.
8. A router can make a path determination for a packet. A hub cannot make a path
determination; it simply connects nodes together.

Lab 6.3
1. Management Information Base - The database used by SNMP for queries.
2. F
3. F
4. T
5. c
6. F - Token Ring has no collisions.
7. a, b, e
8. The purpose of a port on a hub is to connect the PC's cable to the hub.
9. T

Lab 6.4
1. b
2. F - TCP/IP is a routable protocol not a routing protocol. An example of a routing protocol
would be RIP or OSPF.
3. Convergence Time is the amount of time needed for all the routers in the LAN to have their
routing tables equal.
4. e
5. T
6. c
7. RIP uses only hop count as its metric. OSPF uses other things such as network load, speed of
the LAN and hop count as metrics.
Lab 6.5
1. T
2. T
3. F
4. T
5. b
6. c
7. T
8. T
9. c

Chapter 7

Lab 7.1
1. F
2. T
3. Point to Point refers to the connection of one site to another site.
4. F
5. You would use a WAN connection.
6. A WAN is used to connect geographical sites.
7. A dedicated line provides a continuous telecommunications link between two sites. Some
companies have a dedicated line running between their site and their ISP. Companies also run
dedicated lines between buildings for continuous service or for fault tolerance purposes.
8. Joe would use a WAN connection.
9. A WAN is used to connect geographical sites.
10. Sally would use a LAN connection.
11. A LAN is used to connect nodes in close proximity.

Lab 7.2
1. T
2. T
3. F
4. T
5. EMI and RFI have no effect on fiber transmissions.
6. b

Lab 7.3
1. A modem stands for modulator/demodulator. It is a device that modulates, or converts,
digital signals into analog signals. Your computer understands digital signals (binary zeros and
ones) while the telephone line system understands analog (waves). A modem allows the
computer to sent data over the telephone line. Once received on the other end, another modem
demodulates the analog signal to a digital one that the computer on the destination end can
understand.
2. a, b, c and d
3. T
4. T
5. T
6. F
7. T
8. T

Lab 7.4
1. F
2. T
3. F
4. c
5. T
6. A multiplexer is a device that takes several low speed lines and combines those into one
single high-speed line. Typically multiplexers (or muxes) have terminals connected to them (the
many low speed lines). The terminals communicate with the mux and the mux transmits all the
data via one higher speed line to a host computer.
7. d
8. d

Lab 7.5
1. Dial-Up Networking is a method of connecting a computer to an ISP.
2. F
3. SLIP can only carry IP packets and only supports synchronous communication. PPP carries
IP, IPX or AppleTalk packets and supports synchronous and asynchronous communication.
4. Synchronous refers to a communications method in which data being transmitted and
received by nodes must conform to a timing scheme. A clock synchronizes the time for all nodes
on the network.
5. Asynchronous refers to a communications method in which all data being transmitted and
received by nodes do not have to conform to any timing scheme. Instead of a clock to provide
synchronization or timing, a start and stop bit is transmitted with the data. These start and stop
bits provide communication between the sender and receiver.
6. T
7. T

Lab 7.6
1. T
2. T
3. Remote Access Service is a service that runs on a MS Windows NT Server or Workstation.
RAS must be installed in order for client to access the server remotely via a modem. The client
must have DUN installed in order to communicate with a RAS server.

Chapter 8

Lab 8.1
1. T
2. T
3. A file system is a hierarchical arrangement of folders and files.
4. Windows NT Server supports the following file systems: NTFS, FAT, and CDFS.
5. F
6. e
7. F
8. A FAT file or partition cannot exceed 4 GB, whereas FAT32 can handle 2 TB (terabytes)
partitions. FAT uses a 16-bit address to store file size information while FAT32 uses a 32-bit
address for this. FAT is less efficient than FAT32.
9. NFTS if more secure than FAT. MS Windows NT supports NTFS and not FAT. FAT is
limited to 8.3 names. NTFS can handle 256 characters in a name. FAT uses 16-bit addressing
while NTFS uses 64-bit addressing. A FAT file or partition cannot exceed 4 GB while NTFS can
support 16 EB (exabytes)

Lab 8.2
1. F
2. T
3. A trust relationship is a security mechanism that allows two NT domains to share resources.
4. A complete trust domain model is a security model where all domains trust one another.
5. F A single Windows NT domain can support a maximum of 26,000 users
6. F A master domain model can support a maximum of 40,000 users.
7. The formula for determining the number of trusts is N(N-1). Thus, 4(4-1) = 4(3) = 12.

Lab 8.3
1. F
2. A domain is simply a group of users, servers, and other resources that share account and
security information. For example, there might be an Accounting domain for all domain users
and their resources such as files and printers.
3. The purpose of the BDC (Backup Domain Controller) is simply to receive updates from the
PDC (Primary Domain Controller) in the event the PDC goes down. At regular time intervals,
the PDC will propagate the accounts database of users and groups to the BDC.
4. The difference between a domain controller and a member server is that a domain controller
participates in domain logon validation while a member server does not.
5. F
6. F
7. T

Lab 8.4

1. The purpose of a group is to make the management of individual users easier. For instance,
one may put many users into a group and then apply security to the group.
2. F
3. T
4. F
5. a, b, e
6. T
7. F

Lab 8.5
1. The purpose of permissions is to restrict access to shared folders and printers.
2. The Read permission allows a user to view the contents of a file.
3. T
4. The Full Control permission gives complete access to a folder, while the No Access
permission gives no access to the folder - not even viewing.
5. T
6. T
7. The default permissions for a shared folder give everyone Full Control.
8. The hand graphic below a folder indicates that the folder is shared.
9. F

Chapter 9

Lab 9.1
1. The kernel is the core part of the operating system that is transferred from disk to memory at
boot time. All operating systems have a kernel that stays in memory and handles disk I/O,
terminal or video I/O and memory management. The kernel can be augmented by loading and
unloading additional programs as needed.
2. c
3. d
4. T
5. c
6. T
7. T
8. NetWare Loadable Module - a program that only runs on a Novell NetWare Server. The
function of an NLM is to provide other services to a Novell Server. For example, the NetWare
server kernel does not have HTTP or FTP capabilities built in. By loading the HTTP or FTP
NLMs, this functionality is provided.
9. F

Lab 9.2
1. A volume is an aggregation of free disk space on multiple disk drives. For example, say you
have 10 MB free space on disk 1 and 15 MB of free disk space on disk 2. You could create a
single volume to access the entire 25 MB (10 + 15). The volume would have a drive letter and
would be transparent to the user.
2. c
3. T
4. T
5. The purpose of block suballocation is to minimize disk waste.
6. F
7. T
8. T

Lab 9.3
1. The purpose of the map command is to associate a logical, or virtual drive, with a physical
drive on another computer.
2. T
3. T
4. F
5. T
6. F

Lab 9.4
1. NDS stands for Novell Directory Services, a database of users, groups, printers, volumes and
other objects.
2. An organization unit is a logical grouping of users, printers and groups and other objects in
Novell. For example, you could have a PAYROLL organization unit that has all the users,
groups and printers belonging to that department. In Novell, an organization unit is much like a
Windows folder; it contains objects such as users, printers and groups.
3. b
4. F
5. F
6. F
7. T

Lab 9.5
1. A context provides the location of an NDS object. It is analogous to a folder in Windows.
2. a
3. d
4. b
5. b and c
6. F
7. T

Chapter 10

Lab 10.1
1. c
2. F
3. T
4. a
5. d
6. The purpose of typing a password twice when changing it is to confirm that the password was
typed correctly the first time.
7. F

Lab 10.2
1. F
2. T
3. c
4. a
5. F
6. F
7. T

Lab 10.3

In questions 1 10, the answers will vary.

Lab 10.4
1. The purpose of wildcard characters is to match many characters. For example, in most
operating systems such as UNIX, Linux, MS-DOS and Windows, you can select a subset of the
files in a given directory. To accomplish this, there are two wildcard symbols: the "?" and the
"*" symbols. For example, you can execute an MS-DOS dir command by entering dir t* and it
will return only those files that begin with the letter "t"; the equivalent in UNIX and Linux is ls
t*. So, to match many characters, you would use the asterisk (*) and to match a single character
use the question mark (?).
2. F
3. e
4. F
5. F
6. The purpose of the pipe symbol is to send the output of one command to another to be used as
input. This function is typically used to modify a command in some way.

Lab 10.5
1. A file system is a hierarchical arrangement of folders and files.
2. F
3. T
4. F
5. F
6. c

Chapter 11

Lab 11.1
1. a
2. F
3. F
4. F
5. F
6. d
7. F

Lab 11.2
1. The default gateway's job is to take the packet and forward it to another network to which it is
connected.
2. T
3. The dotted decimal notation is the addressing scheme used by TCP/IP.
4. T
5. T
6. T
7. T


Lab 11.3
1. The purpose of the hosts file is to associate an IP address to a user-friendly name.
2. e
3. An alias provides a nickname for the host. An alias allows a user within an organization to
address a host by a shorter name than the full host name.
4. c
5. c
6. c
7. T

Lab 11.4
1. The purpose of DHCP is to automatically assign a node an IP address, default gateway, and
subnet mask.
2. T
3. T
4. T
5. The purpose of the DHCP lease is to allow the client to use the IP address for a certain time
period.
6. T
7. T

Lab 11.5
1. The purpose to having a secondary name server is to resolve names in case the primary name
server goes down.
2. T
3. T
4. a, b and d
5. T
6. T
7. The difference between the hosts file and DNS is that the hosts file is flat and DNS is
hierarchical.

Lab 11.6
1. WINS provides a means of resolving NetBIOS names with IP addresses.
2. F
3. F
4. F
5. F
6. T

Lab 11.7
1. The purpose of FTP is to send and receive files between TCP/IP computers.
2. T
3. T
4. T
5. a

Lab 11.8
1. b
2. F: The default port number for Telnet is 23.
3. A socket is a logical address assigned to a specific process on a host computer.
4. F
5. T
6. T

Chapter 12
Lab 12.1
1. T
2. The steps are as follows: Ping the local address, Ping the near side of the router, Ping the far
side of the router, and Ping a remote computer on the far side of the router's segment.
3. T
4. T

Lab 12.2
1. During the course of troubleshooting, you will find it necessary to test as many possible
scenarios before replacing any one component. For example, if a user calls and tells you the
computer is not working, you should not simply replace the entire chassis and monitor without
asking the user some basic questions. Typically, you should politely ask if any changes have
occurred. Many times a user changed something and either forgot or is too embarrassed to admit
it. You may find in this sample scenario, that the cable is unplugged; so, replacing the entire
chassis would be wasteful and costly. Take another scenario for example, where a user says that
they cannot connect to the web. Before replacing the NIC or cable, go to the computer and
determine if other users on the same network segment can connect. If so, then you've isolated
the problem to the computer. Upon further investigation, you may find the user cannot get to
any other server on the network. Next, you would test the cable with a good known cable to
ensure the cable is sound. If the cable checks out ok, you would then consider the NIC as the
culprit. Remove the chassis top and replace the NIC with a good known NIC. However, if you
simply replaced the NIC upon initial investigation, you would not have tested the network
segment or the cable, which might have been the problem(s).
2. T
3. b
4. T
5. A red circle with a line through it indicates a device is either in error or is disabled. Typically,
you will see this symbol adjacent to a network adapter or protocol that has been disabled (in
Network Neighborhood Properties) manually. However, you can also see this symbol in the
event of an IRQ conflict when two devices are using the same IRQ.

Lab 12.3
1. T
2. T
3. One would see messages related to problems. Specifically, one would see System, Security
and Application problems in Event Viewer. There are 3 levels of messages: Stop errors,
Informational, and Warning.
4. You need to follow a logical methodology to troubleshoot a problem more effectively and
efficiently. For example, when troubleshooting a problem, you should write down the symptoms,
identify the scope of the problem, recreate the problem, consider any changes, and implement
and test a solution. You should make notes of the tests that pass or fail so you don't duplicate
tests unnecessarily. Don't overlook the simple and obvious solution. At times, a power cord may
have been knocked loose.

Lab 12.4
1. The main symptom is that not all nodes on the hub will access the LAN.
2. After implementing a solution, you must test it to verify that it works properly. For example,
if a printer is not working, may your solution is to reload a new print driver. After loading the
new print driver, you must test this by printing a report to it. Don't assume the new print driver
will work.
3. Many problems can be resolved by simply asking the user if any changes have been made.
You should be polite about this and not sound accusatory. Often, the user may have forgotten
they made a change because they thought it was insignificant. By asking probing questions
related to the problem, you may jog the user's memory and help them remember if a change was
made. The main reason that you should ask if a user change has been made is to reduce the
amount of time lost from tracking down a seemingly spurious problem.
4. F
5. In this scenario the affected users are from the same department and are connected to the
same hub. Thus, it appears to be a hub problem. Because each department has separate hubs,
you may have a larger problem if you received a call from users in multiple departments. Either
all hubs malfunctioned at the same time, which is doubtful, or the entire network may be down
possibly due to a downed server.

Chapter 13

Lab 13.1
1. The practice of measuring and recording a LAN's current state of operation. Baselining
measurements may include the utilization rate for your backbone, number of users logged on per
day or per hour, number of protocols that run on your network, statistics about errors, frequency
with which networked applications are used, or information regarding which users take up the
most bandwidth.
2. The process of identifying and tracking the software and hardware on the LAN. The first step
in asset management is to take an inventory of each node on the network. This inventory should
include not only the total number of components on the LAN, but also each devices
configuration files, model number, serial number, location on the LAN and technical support
contact.
3. Change management is the process of following all the software and hardware changes on all
pieces of equipment located throughout the LAN. This should be updated whenever a change
occurs to a piece of equipment. The benefit is that you are aware of all software and hardware,
their revision levels and can quickly adapt to the changing needs of the user environment.
4. T
5. a, b, c, d and e
6. F
7. T
8. F

Lab 13.2
1. A software upgrade is a major change to the existing software code. An upgrade usually
includes changes to the functionality or interface of the program.
2. A patch is additional code that provides an enhancement or a repair to a specific program.
3. T
4. F
5. An application upgrade is an upgrade to a software program used by end-users to perform
their daily tasks. A network operating system upgrade is an upgrade to the operating system that
the applications use.
6. c

Lab 13.3
1. F
2. T
3. T
4. Three possible key issues to consider:
a. Cost of upgrade
b. speed after upgrade
c. how the backbone upgrade affects the users
d. will any software need to be upgraded on other equipment


5. a. Token Ring to Ethernet
b. Ethernet to ATM
c. replacing all hubs with switches
d. migrating from 10 Mbps Ethernet to 100 Mbps Ethernet
e. replacing all twisted pair for Fiber

6. T

Lab 13.4
1. The Internet can assist you by allowing you to research different vendor offerings for cost or
functionality.
2. Many experts subscribe to newsgroups. It is important to use newsgroups because many
experts subscribe to them. They can assist you with many technical problems and give free
advice.
3. Smarter devices will continue to bring a greater concern for security. As systems adopt the
same (open) standards, they become more vulnerable to hackers who can easily figure out the
code after mastering similar systems.
4. Some examples of trends include:
Faster data processing and transmission will bring network access to more people in less time.
More comprehensive integration means that more products sold by different vendors will work
well together.
Open standards will make networking careers less specialized and probably more interesting.
Greater accessibility will bring technology to more users.
5. F

Chapter 14

Lab 14.1
1. Encryption is the process of scrambling data into a format that can be read only by a computer
with the key to unscrambling the data. It is a security technique.
2. Polymorphism refers to the process of a virus changing its characteristics, such as size, when
transferred to a new system. This makes them harder to detect.
3. Signature scanning is the comparison of a file's content with known virus signatures in a
database. Integrity checking is a method of comparing current file characteristics against an
archived version of these characteristics to detect any changes.
4. T
5. T
6. Viruses that are programmed to activate on a particular date.

Lab 14.2
1. Line conditioning is the process of including special noise filters to guard against line noise.
Line noise is the fluctuation in voltage levels caused by other devices or EMI.
2. A UPS (Uninterruptible Power Supply) is a device with a battery that is attached to one or
more devices to prevent them from shutting down abruptly in the event of power loss. It gives
you time to gracefully shutdown the device, thereby preventing any loss of information or
damage to the system. A generator provides power to an entire building, and thus they are
typically costlier than a UPS.
3. A surge is a momentary increase in voltage due to distant lightning strikes or electrical
problems. They last only for a few thousandths of a second but can degrade the computer's
power supply.
4. b
5. d
6. A standby UPS provides continuous voltage to a device by switching to a battery in the event
of power loss. An online UPS uses A/C power from the wall to continuously charge the battery.
The device connected to the online UPS is charged from the battery instead of the wall outlet.
This provides continuous service because the computer does not have to switch from A/C to
battery backup. While an online UPS is preferable because it provides uninterrupted service, an
online UPS is more expensive than a standby UPS.
7. T

Lab 14.3
1. F
2. F
3. T
4. T
5. c
6. F
7. RAID level 0 (Disk striping) works by writing the data equally into 64 KB blocks across
several disks in the array. It is fast but not fault tolerant because if one disk fails, then all data is
lost because RAID level 0 provides for no redundancy.


Lab 14.4
1. Mirroring copies the data to two disks. In the event of one disk failure, data can be accessed
via the second disk in the mirror. Mirroring is fault tolerant but suffers a performance hit on disk
writes because it must write twice.
2. F
3. T
4. a
5. T
6. F
7. Redundant Array of Inexpensive Disks (RAID) is a method of storing data to improve access
to data and/or integrity of data. There are 5 levels of RAID offering varying degrees of
performance and/or fault tolerance.

Lab 14.5
1. Fault tolerance is the degree to which a system can tolerate a problem (the fault) and still
operate.
2. T
3. RAID level 3 stripes the data across several disks in the array. There is one single parity disk.
RAID level 5 stripes the data and the parity across all disks. RAID level 5 is more fault tolerant
than RAID level 0.
4. Server mirroring is a fault-tolerant method where one server is duplicated with identical
components. This is expensive but highly fault tolerant.
5. Parity is a mechanism used to verify the integrity of data by adding either a 0 or 1 to the data.
These parity bits make a difference because they use an XOR operation on the bits. For example,
1 XORed with 1 yields 0. If you XORed 1 with 0, you would get 1. Stated simply, if data on one
disk fails, the parity bits are used to calculate the data on the failed disk.
6. An advantage of server clustering is that the failure of one server does not prevent the
application from running. A disadvantage is that they must be geographically close, which may
be hazardous in the event of fire or another catastrophic event.
7. Hot swappable refers to identical components that automatically assume the functions of their
counterpart if one suffers failure.
8. b

Lab 14.6
1. A backup is important to ensuring the integrity of the data in the event of a disk failure.
2. Some companies store backups in a remote location in case of a fire or flood, or some other
catastrophic event at the companys physical facility that might destroy the backup.
3. Disaster recovery is the process of restoring critical functionality and data in the event of an
enterprise-wide outage.
4. c
5. A backup rotation scheme is important for maintaining integrity of the tapes being sent
offsite.
6. a
7. Possible key elements include:
What kind of rotation schedule will backups follow?
How will you verify the accuracy of backups?
How long will you save backups?
Is the backup software reliable?
Is the backup hardware reliable?
Does the data span multiple tapes and require human intervention?

Chapter 15

Lab 15.1
1. F
2. The purpose of auditing is to track activity on the network. This helps identify which users
have accessed which files and the method of access (e.g., Did the user read a file ?, Did the user
write to a file ?).
3. Authentication is the process of verifying a user's identify and authority to use a system.
4. A root is a highly privileged user on a UNIX system.
5. A hacker is someone who masters the inner workings of an OS in order to better understand
them. A cracker intends to do harm.

Lab 15.2
1. Social Engineering is the process of designing computers to fit human needs.
2. F
3. F
4. IP spoofing refers to obtaining an IP address that allows a cracker to pretend to have authority
they don't really have.
5. Flashing is the mischievous practice of sending garbage characters to one machine, for the
purpose of causing havoc on the computer screen that receives the characters.
6. F
7. A firewall is a device that blocks connections by using port numbers or IP addresses, among
other methods.

Lab 15.3
1. Forcing a unique password for a user ensures that the user alone has access to the password.
Of course, if the user gives out the password, the integrity of the password is compromised.
However, the user is still accountable for any wrongdoing.
2. F
3. Encryption is the process of scrambling data into a format that can be read only by a computer
with the key to unscrambling the data. It is a security technique.
4. T
5. Secure Socket Layer (SSL) is a method of encrypting web pages while in transmission.

Lab 15.4
1. A network address restriction forces a user to use a particular workstation. If an intruder
happens to get the user name and password for a user but attempts to logon to a different
workstation, they will be denied access. It is a security strategy.
2. T
3. T
4. T
5. If network address restriction is in force, the hacker will be denied access. A network address
restriction limits a username and password to use on a specific node on the network.

Lab 15.5
1. You can set up login time restrictions to allow users to logon during their normal working
hours. This prevents their user name and password from being misused during off-time hours.
2. F
3. To restrict usage, allow users to only logon during their shift.
4. T
5. a. Do not use familiar types of passwords.
b. Do not use words that appear in the dictionary.
c. Make passwords longer than six characters.
d. Requiring users to use mix case letters.
e. Requiring a password scheme that requires a mix of alphabetic characters and numbers.
f. Requiring passwords to be changed periodically.

Chapter 16

Lab 16.1
1. A project plan is the way in which details of a project are organized (for example, the timeline
and the significant tasks). Plans for small projects may take the form of a simple text or
spreadsheet document. For larger projects, you would use project management software. It
facilitates project planning by providing a framework for inputting tasks, timelines, resource
assignments, completion dates, and so on.
2. You must identify the dependencies and predecessor tasks in order to determine what tasks
must be completed prior to others.
3. A project sponsor is the manager or other higher up who agrees with the project's goals and
strives to help you achieve them.
4. Every project has significant accomplishments that mark specific steps in their projects. A
milestone is reference point that marks the completion of a major task or group in the project.
5. A feasibility study is performed to determine if the project should be implemented at all. It
helps determine if the benefits outweigh the costs.

Lab 16.2
1. A precedent activity is one that requires completion before the next subsequent one can begin.
2. A needs assessment is the process of clarifying reasons and objectives of a proposed change.
3. A pilot network is a network where changes are implemented prior to running on a production
network. It is necessary to test software and hardware on a pilot or test network so you don't
destroy the production or live network data.
4. Contingency planning is the process of identifying the steps that will minimize risks of
unforeseen circumstances endangering the quality of the project's goal.

Lab 16.3
1. Process management - the planning for and handling of the steps involved in accomplishing a
goal.
2. a. To ensure the project's goal are understood by all.
b. To keep a project's timeline on budget and on track.
c. To ensure all necessary software and hardware are upgraded and compatible with revision
levels.
d. To determine which tasks must be completed before others.
e. To avoid duplication of effort.
3. Funding is important so a budget can be set to initiate the project.
4. A network is tested after an upgrade to ensure that it still functions properly after the changes
have been implemented.
5. You should document changes so you know how to handle a similar situation in the future.

Você também pode gostar