Network Implementation

Network Implementation

03 3528 ch03 5/17/05 11:10 AM Page 125 3 ............................................. Network Implementation Quick✓ Check Domain 3.0: Network Implementation Objective 3.1: Identify the Basic Capabilities (Client Support, Interoperability, Authentication, File and Print Services, Application Support, and Security) of the Following Server Operating Systems: UNIX/Linux, NetWare, Windows, and Appleshare IP (Internet Protocol) 1. You have been given the task of installing Samba on a Linux Quick Answer: 159 server. Which services does the product provide? Detailed Answer: 163 ❑ A. File and print services ❑ B. Thin client services ❑ C. Web server services ❑ D. Proxy server services 2. Which of the following is an advantage to formatting a Quick Answer: 159 Windows NT server drive as NTFS rather than FAT? Detailed Answer: 163 ❑ A. NTFS permits the server to be used as a workstation. ❑ B. With NTFS, tape backups aren’t needed. ❑ C. NTFS offers a higher degree of security. ❑ D. NTFS eliminates the need for multiple hard drives. 3. NDS is proprietary to which of the following? Quick Answer: 159 ❑ A. NetWare Detailed Answer: 163 ❑ B. Windows NT ❑ C. Windows 9x ❑ D. UNIX 03 3528 ch03 5/17/05 11:10 AM Page 126 126 Chapter 3 ............................................ Quick✓ Check 4. Which one of the following is the directory structure used Quick Answer: 159 with Novell NetWare? Detailed Answer: 163 ❑ A. NTFS ❑ B. FAT ❑ C. NDS ❑ D. Root 5. Which of the following network protocols can be run on a Quick Answer: 159 NetWare network? Detailed Answer: 163 ❑ A. IPX ❑ B. NetBEUI ❑ C. AppleTalk ❑ D. MS-DOS 6. Which of the following is an advantage to formatting a Quick Answer: 159 Windows NT server drive as NTFS rather than FAT? Detailed Answer: 163 ❑ A. With NTFS, tape backups aren’t needed. ❑ B. NTFS offers a higher degree of security. ❑ C. NTFS permits the server to be used as a workstation. ❑ D. NTFS eliminates the need for multiple hard drives. 7. Which of the following is an advantage of NTFS over FAT? Quick Answer: 159 ❑ A. It permits the server to be used as both server and work- Detailed Answer: 163 station. ❑ B. It alleviates the need for data backups. ❑ C. It utilizes the disk space far more efficiently than FAT. ❑ D. It directly accesses the system hardware. 8. Which of the following is used to manage file systems on a Quick Answer: 159 NetWare server? Detailed Answer: 163 ❑ A. NDS ❑ B. NFS ❑ C. DHCP ❑ D. WINS 9. Which two of the following client operating systems are sup- Quick Answer: 159 ported by Windows and NetWare? Detailed Answer: 164 ❑ A. UNIX workstations ❑ B. Novell CAFS Client ❑ C. Windows NT Workstation ❑ D. MAC OS X 03 3528 ch03 5/17/05 11:10 AM Page 127 Network Implementation 127 ................................................ Quick✓ Check 10. The NetWare directory structure begins with ______. Quick Answer: 159 ❑ A. Directory Detailed Answer: 164 ❑ B. Leaf ❑ C. Domain ❑ D. Root 11. Which of the following network operating systems is associat- Quick Answer: 159 ed with NDS? Detailed Answer: 164 ❑ A. NetWare ❑ B. Windows NT ❑ C. Windows 9x ❑ D. UNIX 12. What is the basis of Novell NetWare? Quick Answer: 159 ❑ A. X.25 Detailed Answer: 164 ❑ B. X.500 ❑ C. V.34 ❑ D. X.400 13. Which of the following is an advantage of UNIX that’s not Quick Answer: 159 offered by other network operating systems? Detailed Answer: 164 ❑ A. Only UNIX supports TCP/IP. ❑ B. It’s portable among different machine types. ❑ C. It’s the only NOS that supports routable protocols. ❑ D. It doesn’t require client addressing. 14. What is the default network protocol on a UNIX server? Quick Answer: 159 ❑ A. IPX/SPX Detailed Answer: 164 ❑ B. IPX ❑ C. TCP/IP ❑ D. NetBIOS 15. Which network protocol is shipped with commercial versions Quick Answer: 159 of UNIX? Detailed Answer: 164 ❑ A. TCP/IP ❑ B. IPX/SPX ❑ C. BGRP ❑ D. NWLink 16. ______ supports 64-bit applications. Quick Answer: 159 ❑ A. AppleTalk Detailed Answer: 164 ❑ B. Windows NT ❑ C. NetWare ❑ D. UNIX 03 3528 ch03 5/17/05 11:10 AM Page 128 128 Chapter 3 ............................................ Quick✓ Check 17. Which protocol is used with the Internet and UNIX? Quick Answer: 159 ❑ A. WINS Detailed Answer: 164 ❑ B. NetBEUI ❑ C. IEEE 802.5 ❑ D. TCP/IP 18. Which of the following networking protocols does Linux use? Quick Answer: 159 ❑ A. TCP/IP Detailed Answer: 164 ❑ B. AppleTalk ❑ C. IPX ❑ D. NWLink 19. Three servers are scheduled for an upgrade. What do you do Quick Answer: 159 first? Detailed Answer: 164 ❑ A. Install the upgrade on all three servers. ❑ B. Install the upgrade on a test server. ❑ C. Install the upgrade on one server and observe the effects on users. ❑ D. Don’t perform the upgrade. 20. In what type of network environment do individual computers Quick Answer: 159 maintain a list of user accounts describing passwords and Detailed Answer: 165 access rights? ❑ A. Domain ❑ B. Standalone ❑ C. Workgroup ❑ D. Active Directory 21. What type of network is share-level security often associated Quick Answer: 159 with? Detailed Answer: 165 ❑ A. Peer-to-peer ❑ B. Server based ❑ C. WANs ❑ D. Centralized server 22. Which of the following best describes the difference between Quick Answer: 159 user and share-level security? Detailed Answer: 165 ❑ A. Share-level security is more restrictive. ❑ B. User-level security is more restrictive. ❑ C. There is no difference. ❑ D. User-level security can be set up in group accounts. 03 3528 ch03 5/17/05 11:10 AM Page 129 Network Implementation 129 ................................................ Quick✓ Check 23. Which of the following best describes folder replication? Quick Answer: 159 ❑ A. Attaching a tape unit to the hard drives of a server Detailed Answer: 165 ❑ B. Copying the contents of a hard drive to another hard drive ❑ C. Copying a folder to another server or workstation ❑ D. Configuring a workstation for temporary use as a server 24. The method used to back up server data is to copy the server Quick Answer: 159 files to another server. Which one of the following best Detailed Answer: 165 describes this type of backup method? ❑ A. Differential ❑ B. Folder replication ❑ C. Tape backup ❑ D. Incremental 25. You are adding a Windows XP workstation to a network host- Quick Answer: 159 ed by UNIX servers. There is also an Apple MAC workstation Detailed Answer: 165 on the network. Which protocols must be loaded in the sys- tem to enable communications between all the computers in the network? (Select all that apply.) ❑ A. NWLINK ❑ B. AppleTalk ❑ C. TCP/IP ❑ D. NetBEUI 26. You are setting up a Windows 2000 Professional computer in a Quick Answer: 159 network that contains Novell NetWare 4.11 servers. What Detailed Answer: 165 client software do you need to install in the Windows machine to communicate with these servers? ❑ A. TCP/IP ❑ B. CSNW ❑ C. Netlink ❑ D. NWCT 27. What items are required for a UNIX client to connect to an Quick Answer: 159 entirely UNIX-based network environment’s network share Detailed Answer: 165 using the host name? ❑ A. IP, Subnet Mask, WINS ❑ B. IP, Subnet Mask, LMHOSTS ❑ C. IP, Subnet Mask, HOSTS ❑ D. IP, DNS, WINS 03 3528 ch03 5/17/05 11:10 AM Page 130 130 Chapter 3 ............................................ Quick✓ Check 28. Which server stores information about resources in a Quick Answer: 159 Windows Server 2003 domain running Active Directory? Detailed Answer: 165 ❑ A. Domain Master ❑ B. Domain Tree ❑ C. Domain Controller ❑ D. Domain Configurator 29. Identify the hierarchical directory service. Quick Answer: 159 ❑ A. Windows NT domains Detailed Answer: 165 ❑ B. Active Directory ❑ C. Linux Password files ❑ D. The NetWare Bindery 30. A user cannot modify her username and password in Open Quick Answer: 159 Directory for Mac OS X server. Which of the following Detailed Answer: 165 actions will best resolve this issue? ❑ A. Convert the user to give master configurator rights. ❑ B. Change the password from “Crypt” to “Open Directory.” ❑ C. Establish Turbo Shell as the login shell. ❑ D. Modify the login to use “Key Chain” access rather than the login window. 31. You have a Windows 2000 server-based domain with an Apple Quick Answer: 159 MAC client that is unable to see the server on the network. Detailed Answer: 166 What items need to be installed to enable the client to com- municate with the server? ❑ A. 802.11A ❑ B. NetBEUI ❑ C. Token Ring ❑ D. Appleshare 32. When a user in a Linux environment wishes to authenticate Quick Answer: 159 using Kerberos, the request is processed and granted by a____. Detailed Answer: 166 ❑ A. Kerberos Key Distribution Center ❑ B. Kerberos Password Distributor ❑ C. Secure Layer Protocol Server ❑ D. Kerberos Authentication Server 33. Which Windows groups can share folders by default? Quick Answer: 159 ❑ A. Admin group only Detailed Answer: 166 ❑ B. Admin and Power Users groups ❑ C. Admin and Share Users groups ❑ D. Admin and Guest groups 03 3528 ch03 5/17/05 11:10 AM Page 131 Network Implementation 131 ................................................ Quick✓ Check 34. Which of the following are true concerning NDS? Quick Answer: 159 ❑ A. Remote users cannot access network connections via dial-up Detailed Answer: 166 connections. ❑ B. Mobile users do not require changing the NDS name context. ❑ C. Mobile users do not require a special object entry. ❑ D. There is no difference between mobile and remote users. Objective 3.2: Identify the Basic Capabilities Needed for Client Workstations to Connect to and Use Network Resources (For Example: Media, Network Protocols, and Peer and Server Services) 1. A workstation is being added to an Ethernet LAN. The NIC Quick Answer: 159 card has been installed, IRQ assigned along with an I/O range Detailed Answer: 166 with no conflicts.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    56 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us