Network Management in the Windows Environment
In this experiment we will be working with the creation of servers, assigning
permissions, creating groups, among other topics in Windows Administration. This experiment
will be a little long sinc
Domain Name System, BIND, configuration within a network
In this laboratory you will be configuring the named service so that your server
functions as the name server for your network. Linux systems (and others) typically
use a package called
Routers in WANs and routing protocols configuration
In this lab the student will create routing scheme, also will observe the result of correct
routing tables. Also the student must implement routing protocols and perform manual route
Binding schemes at the physical, and network levels
In this lab we will create an IP addressing scheme, also will observe the relation between
the Layer 2 and Layer 3 of the TCP/IP model. We are going to work with setting up a network.
In this laboratory you will be installing different operating systems. We will install Fedora
Linux, Windows Vista, Windows 7, Windows 2003, Windows 2008, Windows 2008R2. Following
installation, each mac
Network+ Guide to Networks, 7E, Jill West, Cengage learning, Chapter 11
1. What is the lowest layer of the OSI model at which LANs and WANs support the same protocols?
a. Layer 2
b. Layer 3 pg. 548
c. Layer 4
d. Layer 5
2. An organization can lease a priv
Network+ Guide to Networks, 7E, Jill West, Cengage learning, Chapter 8
1. Your organization just approved a special budget for a network security upgrade. What
procedure should you conduct in order to make recommendations for the upgrade priorities?
Network+ Guide to Networks, 7E, Jill West, Cengage learning, Chapter 10
1. How many bits of a Class A IP address are used for host information?
a. 8 bits
b. 16 bits
c. 24 bits pg. 492
d. 32 bits
2. What is he formula for determining the number of possible
Network+ Guide to Networks, 7E, Jill West, Cengage learning, Chapter 12
1. Which ICS component senses attributes of the physical system and converts analog data to
digital data, but cannot control the physical system?
Network+ Guide to Networks, 7E, Jill West, Cengage learning, Chapter 6
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same
a. LAYER 4
b. LAYER 3
c. LAYER 2
d. LAYER 1
Network+ Guide to Networks, 7E, Jill West, Cengage learning, Chapter 7
1. Which cloud computing service model gives software developers access to multiple
operating systems for testing?p335
2. What service
Exam 1 study guide
Terminology from the history of data
Data communication, the process of conveying information from one place to another, existed
long before computers and dates back to earliest recorded history. As various pre-computer
Network+ Guide to Networks, 7E, Jill West, Cengage learning, Chapter 1
1) In the client-server model, what is the primary protocol used for communication
between a browser and Web server?
c. HTTP, pg21,pg3
2) Which tw
Which protocol's header would a Layer 4 device read and process?
What number does a host use to identify the application involved in a
What field in a TCP segment is used to determine if an arriving data unit exactly
Chapter 3 Quiz review
At what layer of the OSI model would a TCP or UDP header be added to a
A globally unique number that identifies an autonomous system. ASNs work
similarly to IP addresses that identify individual nodes on a network. E
1. When an Ethernet NIC has been configured by the OS to use half-duplex, the
transmit pair of the twisted-pair cable uses_transmissions, the receive
pair in the cable uses_transmissions, and the twisted-pair cable
Network+ Guide to Networks, 7E, Jill West, Cengage learning, Chapter 2
1. Which part of a MAC address is unique to each manufacturer?
a. The network identifier
b. The OUI, pg4 or pg52
c. The device identifier
d. The physical address
Network+ Guide to Networks, 7E, Jill West, Cengage learning, Chapter 3
Which protocols header would a Layer 4 device read and process?
b. TCP pg 107
2. What number does the host use to identify the application involve
During termination of twisted pair cabling, what should be done to ensure
minimal cross talk is introduced?
No more than 1 inch of the cable should be exposed.
If the use of a pre-existing Ethernet infrastructure is desired for a SAN, what
The location where an incoming network interface enters a building and
connects with the building backbone cabling. This interface might connect the
building's network with a campuswide network, or might designate where the
telecommunications service prov
1. Which of the following cabling types is not recognized by the TIA/EIA for
2. What kind of networking device on today's racks does nothing to the data
transmitted on a line other than pass i