Chapter 11 Web Sites From Remote Servers the Main Networking

subject Type Homework Help
subject Pages 7
subject Words 1592
subject Authors Ron Carswell, Shen Jiang, Terrill Freese

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 11: Networking
TRUE/FALSE
1. SOHO is the standard used by home and business computers and all networking software, and is the
foundation of the Internet Protocol Suite.
2. The Internet Protocol Suite Network layer allows the IP to transfer packets across a link.
4. By default, the Network icon is not on the Start menu of the Windows 7 Network Connection Details
window.
5. Between the NTFS Full Control and Modify permissions, the more restrictive permission is Full
Control.
MULTIPLE CHOICE
1. Fedora 13 provides peer-to-peer networking with ____, which is based on the common client/server
protocol of Server Message Block (SMB).
a.
SOHO
c.
DHCP
b.
Samba
d.
POP3
2. A VPN (virtual private network) uses a technique known as ____ to transfer data securely on the
Internet to a remote access server on your workplace network.
a.
piping
c.
subletting
b.
leasing
d.
tunneling
3. The Internet Protocol uses unique addresses, simply called ____ addresses, to identify computers or
devices in a network.
a.
IP
c.
standard
b.
UNC
d.
DNS
4. The Internet Protocol Suite is divided into ____ “layers” of communication from bottom to top.
a.
two
c.
five
b.
four
d.
six
page-pf2
5. POP3 (Post Office Protocol 3) operates in the ____ layer of the Internet Protocol Suite.
a.
Transport
c.
Network
b.
Internet
d.
Application
6. ____ is the division of a network into groups of computers that have a common, designated IP address
routing prefix.
a.
Subnetting
c.
Leasing
b.
Subleasing
d.
Time-division multiplexing
7. The ____ IP address is a node (a router) on a TCP/IP network that serves as an access point to another
network.
a.
DHCP
c.
gateway
b.
subnetwork
d.
DNS
8. The ____ IP address of the server provides domain name resolution.
a.
DHCP
c.
gateway
b.
subnetwork
d.
DNS
9. One way to view the Fedora 13 IPv4 settings is to use the ____ command in a Terminal window.
a.
view
c.
network
b.
nm-tool
d.
IP
10. You can join an existing Windows 7 network workgroup, by default called ____, or you can create a
new one.
a.
DEFAULTGRP
c.
WORKGROUP
b.
NETGRP
d.
GROUP
11. The homegroup is protected with a(n) ____, so you can always choose what you share with the group.
a.
encryption key
c.
sticky bit
b.
password
d.
share
12. Using UNC notation requires that you know the name or ____ of the server and share.
a.
location
c.
IP address
b.
password
d.
subnet address
13. To access a Fedora 13 share, you must ____ the share.
a.
mount
c.
clean
b.
load
d.
execute
page-pf3
14. ____ are responsible for setting up shared printers on the network.
a.
Disk drive manufacturers
c.
Users
b.
Managers
d.
Network administrators
15. Only ____ permits user accounts and user groups to be linked to folder and file permissions.
a.
NT
c.
NTFS
b.
FAT32
d.
FAT NT
16. Which Windows 7 shared folder permission allows you to change file permissions and take ownership
of the file resources?
a.
Read
c.
Change
b.
Write
d.
Full Control
17. Permissions assigned at the ____ level override those assigned at the folder level.
a.
network
c.
file
b.
group
d.
share
18. NTFS permissions are ____ when a file or folder is moved or copied to a FAT16 or FAT32 formatted
partition.
a.
inherited
c.
changed to “read only”
b.
removed
d.
changed to “full control”
19. Which Fedora 13 file and directory permission provides read and execute authority?
a.
r-x
c.
--x
b.
r--
d.
---
20. When the Fedora 13 execute bit is set for the owner, the SUID bit is set to ____.
a.
e
c.
s
b.
o
d.
x
21. A(n) ____ appears as the third character of the Fedora 13 Others permission bits when the sticky bit is
set.
a.
p
c.
t
b.
s
d.
z
COMPLETION
page-pf4
1. Simply stated, a(n) ____________________ is a series of computer devices or nodes interconnected
by communication paths.
2. The ____________________ is a system of linked networks that are worldwide in scope and facilitate
data communication services that permit access to the World Wide Web and e-mail.
3. A(n) ____________________ is a set of rules that enables two computers to talk to each other.
4. ____________________ inheritance occurs when you create or copy a subfolder or a file and the
subfolder or file inherits the permissions of the parent folder by default.
5. Setting the Fedora 13 ____________________ bit ensures that only the owner (and root, of course)
who created a file in his directory can delete the file and prevent malicious or accidental deletion by
others.
MATCHING
Match each item with a statement below.
a.
DHCP
f.
Intranet
b.
HTTP
g.
SMTP
c.
workgroup
h.
homegroup
d.
Internet Protocol
i.
FTP
e.
client/server model
1. Used for sending and receiving e-mail.
2. Provides a basis for file and printer sharing.
3. Allows Web users to request Web sites from remote servers.
4. The main networking protocol that allows for the communication of data across a network.
5. Has become a central idea of networking.
6. Makes it easy to share your libraries and printers on a home network.
7. A computer networking protocol used by hosts (DHCP clients) to retrieve IP address assignments and
other configuration information.
page-pf5
8. Allows for the rapid transfer of files across the Web.
9. A private network that uses Internet-type applications, but is available only within a single
organization.
SHORT ANSWER
1. Identify and describe a LAN.
2. What are the advantages of using a VPN?
3. Describe the two standards of IP addresses.
4. Describe the Internet Protocol Suite.
page-pf6
5. How do you see the shares that another computer is offering using the NET VIEW command?
6. How do you access a network share from the Windows 7 command prompt?
7. Describe Fedora 13’s methods for accessing shared files.
8. Explain how Administrators use local user groups to simplify the management and authorization of
network resources.
page-pf7
9. How does Windows 7 provide shared folder access on a network?
10. Why is setting the Fedora 13 SUID bit to s dangerous?

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.