Network+ Guide to Networks, 6th Edition

pullfarmInternet και Εφαρμογές Web

3 Νοε 2013 (πριν από 3 χρόνια και 5 μήνες)

3.106 εμφανίσεις

Network+

Guide to Networks,
6
th

Edition


Solutions

10


1

Network+ Guide to Networks, 6th Edition

Chapter 1
0
Solutions


Review Questions


1.

Which of the following is an advantage to virtualizing many servers in your data
center, compared to running each server on a separate physical machine?

a.

Virtualization will
improve the servers’ performance.

b.

Virtualization will conserve resources.

c.

Virtualization will
make administration easier
.

d.

Virtualization will save software costs.

2.

Which of the following applies to virtual machines, no matter what type of
virtualization sof
tware they are created with?

a.

They can only belong to one VLAN.

b.

They cannot be addressed by clients on a physical LAN.

c.

They cannot be assigned Internet
-
routable IP addresses.

d.

They exist as files on the hard drive of their host.

3.

You have created a virtual m
achine on your workstation so that you can test some
new applications. You configured the VM’s hard disk space to be dynamically
allocated. Which of the following will allocate more space for the VM when it
needs it?

a.

Virtual switch

Network+

Guide to Networks,
6
th

Edition


Solutions

10


2

b.

Virtual adapter

c.

Hypervis
or

d.

Virtual network manager

4.

You are running KVM on a Fedora Linux computer and have configured a virtual
server to use the bridged networking type. The IP address of your host machine’s
NIC is 192.168.25.71. Assuming your physical LAN uses DHCP, which of th
e
following addresses is most likely the one assigned to your virtual server?

a.

192.168.25.1

b.

192.168.25.83

c.

192.168.0.0

d.

Not enough information to draw a conclusion

5.

Which of the following is the default networking type assigned to vNICs in most
virtualization

programs?

a.

Host
-
only

b.

Grouped

c.

NAT

d.

Bridged

6.

You have decided to create four virtual Web servers on a Windows 2008 R2
server using Hyper
-
V R2. Which of the following configuration options would
you use to make sure the Web servers are accessible to users acros
s the Internet?

a.

Private virtual network

b.

Host virtual network

c.

External virtual network

Network+

Guide to Networks,
6
th

Edition


Solutions

10


3

d.

Internal virtual network

7.

You work second shift and share a desktop workstation with your colleagues who
work on the first and third shifts. Each of you has a separate vir
tual machine on
the workstation. When your third
-
shift coworker installs a new program on his
VM, it causes the machine’s operating system to stop working. What happens as a
consequence?

a.

Your VM’s operating system stops working.

b.

The host machine’s operatin
g system stops working.

c.

Your VM and the host machine work as usual, but performance of all the
VMs is compromised.

d.

Nothing changes for your VM.

8.

Each of the VMs on your host computer is configured to use the NAT networking
type. They can still pick up e
-
mai
l and surf the Web. How are they getting their IP
addresses?

a.

From the host machine’s virtualization software

b.

From the DHCP server on the physical network

c.

From the router on the physical network

d.

From another VM on the host machine that’s configured to act a
s a DHCP
server

9.

Which of the following network configuration types is best used for a company’s
e
-
mail server?

a.

Host
-
only

b.

Bridged

Network+

Guide to Networks,
6
th

Edition


Solutions

10


4

c.

NAT

d.

Grouped

10.

Which of the following network configuration types prevents VMs from
exchanging traffic with nodes other than the w
orkstation they are installed on?

a.

Host
-
only

b.

Bridged

c.

NAT

d.

Grouped

11.

You manage a data center for a large ISP that hosts virtual Web and mail servers
for many customers. One of your physical servers has four NICs and hosts four
mail servers. How many vNICs can you assign to each of the mail servers?

a.

1

b.

2

c.

4

d.

It depends on the

virtualization software.

12.

Because of the functions it performs, each port on a virtual switch can also be
considered a:

a.

V
irtual machine

b.

V
irtual bridge

c.

V
irtual router

d.

V
irtual firewall

13.

You have created multiple virtual machines on your workstation to test different
unified communications programs. You want these machines to be available to
Network+

Guide to Networks,
6
th

Edition


Solutions

10


5

your IT colleagues for testing, but you do not want the traffic generated by their
use to interfere

with routine business LAN traffic. Meanwhile, on another
workstation a coworker has installed additional communications programs for
review. You decide to create a new VLAN devoted to software evaluation. Where
do you add your coworker’s
virtual machines
to the new VLAN?

a.

On your host workstation, where you established the new VLAN

b.

On the LAN switch, which manages the VLAN

c.

On your friend’s host workstation, where the virtual machines reside

d.

On the LAN router, which directs traffic between VLANs

14.

How must a p
hysical NIC be configured so that it can connect its host’s VMs to
multiple VLANs?

a.

As a trunk

b.

As a port group

c.

As a channel

d.

As a team

15.

To complete its VPN connection, your computer is using RDP. Which of the
following VPN types are you participating in?

a.

Site
-
to
-
link

b.

Site
-
to
-
site

c.

Link
-
to
-
client

d.

Client
-
to
-
site

16.

In which of the following situations would you use RDP?

a.

To enable someone else to control your workstation, which is running
Network+

Guide to Networks,
6
th

Edition


Solutions

10


6

a Windows operating system

b.

To establish a VPN between your home workstation and

your office LAN

c.

To remotely control a distant workstation that's running a UNIX or Linux
operating system

d.

To manage a pool of modems available for multiple users to log onto your
network from a distance

17.

You have decided to set up a VPN between your home a
nd your friend's home so
that you can run a private digital telephone line over your DSL connections. Each
of you has purchased a small Cisco router for terminating the VPN endpoints.
Which of the following protocols could you use to create a tunnel betwee
n these
two routers?

a.

L2TP

b.

PPTP

c.

PP2T

d.

SLIP

18.

A VPN is designed to connect 15 film animators and programmers from around
the state of California. At the core of the VPN is a router connected to a high
-
performance server used for storing the animation files. The

server and router are
housed in an ISP's data center. The ISP provides two different T3 connections to
the Internet backbone. What type of connection must each of the animators and
programmers have to access the VPN?

a.

At least a fractional T1 connection to

the Internet

b.

At least a T1 connection to the Internet

Network+

Guide to Networks,
6
th

Edition


Solutions

10


7

c.

At least a T3 connection to the Internet

d.

Any type of Internet connection

19.

Which of the following functions makes VPN protocols unique?

a.

The ability to precisely time packet delivery

b.

The ability to interp
ret both frames and datagrams

c.

The ability to create tunnels

d.

The ability to detect eavesdropping

20.

As a business owner, you have decided to outsource all of your company’s IT
services to a cloud computing service provider. How can your clients and
employees a
ccess these services?

a.

From a smartphone using cellular signals

b.

From a desktop workstation attached to a DSL Internet connection

c.

From a server at an office overseas, using a T1

d.

All of the above

Hands
-
On Projects


Project 10
-
1


In this project students download and install the popular and free virtualization program
VirtualBox to a Windows 7 computer, then establish a virtual machine through the
VirtualBox VM Manager.
Note: the project will work equally well with workstations
run
ning other operating systems, including Linux or earlier versions of Windows, though
the steps for downloading VirtualBox from the Web may differ.

Steps 1


4: Students download the VirtualBox installation executable.

Steps 5


18: Students run the install
ation program and complete VirtualBox installation.

Steps 19


32
: Students establish an Ubuntu server VM using the VirtualBox Manager.


Network+

Guide to Networks,
6
th

Edition


Solutions

10


8

Project 10
-
2


This project picks up where P
roject 10
-
1 left off. In this project
,

students download an
Ubuntu server im
age (also free) and use it to complete creation of the virtual machine
they defined in Project 10
-
1.
Note:
As with Project 10
-
1, this

project will work equally
well with workstations running other operating systems, including Linux or earlier
versions of Windows, though the steps for downloading
Ubuntu server

from the Web may
differ.

Steps 1


4: Students download the Ubuntu server ISO
image from the Ubuntu Web site.

Steps 5


33: Students install and configure the Ubuntu server software as a virtual server.

Steps 34


36: Students log on to the new Ubuntu server.

Step 37: Students view the IP address information for the server.


Project

10
-
3


This project picks up where Project 10
-
2 left off. In this project, students stop the server,
then modify its vNIC properties, run it, stop it again to add a new vNIC, then start the
server again.
Note:
As with previous projects, this

project will w
ork equally well with
workstations running other operating systems, including Linux or earlier versions of
Windows.

Step 1: Students ensure that the VirtualBox program is running.

Steps 2


6: Students shut down the Ubuntu virtual server, first by halting
the operating
system at the command prompt, then by powering down the machine through the
VirtualBox dialog box.

Steps 7


11: Students access the network adapter settings in the VirtualBox Manager and
change the networking mode for Adapter 1 to bridged.

S
tep 12: Students assign Adapter 1 a new MAC address.

Steps 13


15: Students re
-
start the server and log in.

Step 16: Students view the IP address information on the virtual server.

Step 17: Students are asked to repeat steps 3


6 to power down the virtua
l server.

Steps 18


26
: Students create a second vNIC on the virtual server and modify its
properties.

Steps 27


30: Students re
-
start the server and view its IP properties.

Steps 31


32: Students shut down the virtual server and close the VirtualBox
program.


Case Projects


Network+

Guide to Networks,
6
th

Edition


Solutions

10


9

Case
Project 10
-
1


In this project students draw a private an
d public cloud solution for a university’s
biomedical sciences department
. They also assess their current job responsibilities and
list ways in which their tasks would ch
ange by switching to a public cloud network.
Students should have researched the solutions enough to learn that as network
administrators, they would still be responsible for software upgrades and user
management (for example, setting up new user logon ids

and ensuring users have
appropriate privileges). However, some tasks, such as backups, are typically
accomplished automatically by the cloud service provider. User access would also change,
with the department’s network administrators likely playing a sma
ller role in helping
users gain access to resources.


Case
Project 10
-
2

In this project students research and list the security assurances provided by the two
leading cloud network solutions, Amazon’s EC2 and Rackspace. Students should be able
to identify
the security measures that the provider is responsible for and ways in which
the network administrator remains responsible for security (for example, management of
privileges and data encryption).


Case
Project 10
-
3

In this project s
tudents research the energy usage of the type of server that could reliably
handle multiple virtual servers
in a private cloud environment and compare that to the
power usage of the existing network infrastructure. The larger

servers

used for a private
clo
ud will

draw more power on a per
-
server basis, but because a private cloud might use
only
one or
two of them, the reduction in energy usage is significant.