Sunteți pe pagina 1din 6

Hands-on Networking Fundamentals Chapter 3 Solutions Answers to the Chapter 3 Review Questions

1. Which of the following are properties of a LAN protocol? (Choose all that apply.) Answer: a. handles source and destination node addressing; b. follows standards such as the !""" #$% standards; and d. enables reliable networ& lin&s 'he wor&station used by the (ar&eting director in your co(pany has been successfully hac&ed through the open 'elnet port e)en though she does not use 'elnet. What step should be ta&en to thwart future attac&s? Answer: c. Close 'C* and +,* port %-. .ince it has lower o)erhead why is +,* not used for all co((unications along with !*? Answer: b. 'C* has a higher le)el of reliability for ti(es when i(portant data is trans(itted. 'he subnet (as& is used for which of the following? (Choose all that apply.) Answer: b. to create subnetwor&s and d. to show the class of addressing

%.

-. /. 0.

1our co(pany2s networ& seg(ent that is used by the 3esearch ,epart(ent e4periences (any broadcasts fro( )arious de)ices. What can you as networ& ad(inistrator do to control the broadcasts so that they are not sent to other networ& seg(ents? Answer: a. Configure the router that connects the 3esearch ,epart(ent seg(ent so that broadcasts are not forwarded to other networ& seg(ents. 5. 1our networ& is )ery busy and you decide to (onitor the networ& traffic. Which of the following can be a significant source of e4tra traffic on a networ&? Answer: d. 'C* ac&nowledge(ents 1our co(pany2s networ& uses ,7C* to lease !*)/ addresses. When an e(ployee gets a new co(puter and it is necessary to configure the !*)/ networ& connecti)ity which of the following should you use in Windows 6? (Choose all that apply.) Answer: c. 8btain an !* address auto(atically A new office assistant in your co(pany has said that he is e4perienced in setting up Windows .er)er %$$# 3%. 1ou disco)er that he is planning to (anually assign the !*)/ address 1%6.$.$.1$$ to the ser)er. What is the proble( with this assign(ent? Answer: b. 'he address 1%6.$.$.1$$ is a(ong a group of !*)/ addresses that are reser)ed and should not be assigned. 1ou (anage a (ediu(:si;ed networ& that is on two floors in a building. 1ou ha)e a networ& (onitoring station and want to set up a networ& agent on each floor. Which of the following de)ices are candidates for networ& agents? (Choose all that apply.) Answer: a. switches b. ser)ers and c. wor&stations

6.

#.

9.

1$. 'he !*)5 address $1$%<$6cc<5%1#<$$$$<$$$$<$$$$</06%</ebd can also be rewritten as which of the following? (Choose all that apply.) Answer: b. $1$%<$6cc<5%1#<</06%</ebd and d. $1$%<$6cc<5%1#<$<$<$</06%</ebd 11. 1ou are debating with a colleague about whether to use **'* or L%'* for re(ote co((unications. Which of the following is an ad)antage of using L%'*? Answer: d. L%'* can ta&e ad)antage of =AC addresses but **'* cannot.

1%. An online stoc& bro&erage has had reports of hac&ers obtaining infor(ation about accounts while custo(ers are online. 'he fir( disco)ers that an inad)ertent progra((ing change in its new software has o(itted use of which of the following security (ethods? Answer: a. 7''*. 1-. 1ou are designing a new networ& for a (ail order co(pany of %#/ e(ployees. Networ& reliability is a (ust for a successful business strategy. When you set up ,N. which of the following should you do? Answer: c. Configure a pri(ary and a secondary ,N. ser)er. 1/. When a ser)er crashes and goes offline on a networ& which of the following helps to deter(ine that the ser)er is una)ailable? Answer: a. !C=* 10. !n !*)5 the flow label field is used for what ser)ice? Answer: b. >uality of .er)ice 15. 1our co(pany wants to (igrate to !*)5 because of its i(pro)ed security features. 8ne i(portant security feature that is re?uired for !*)5 and that is not re?uired for !*)/ is which of the following? Answer: d. !*sec 16. What protocol does !*)5 use to disco)er the physical addresses of nodes on a networ&? Answer: b. Neighbor ,isco)ery (N,) *rotocol 1#. 1ou are consulting for a business for which the beginning !*)/ octet used on its networ& is %%% which (a&es this a Class C networ&. What is the (a4i(u( nu(ber of addressable nodes that this business can ha)e using traditional !*)/ addressing? Answer: c. %0/ 19. 1ou are in a (anage(ent (eeting for your co(pany in which the current topic is the 'C*@!*)/ networ&. 8ne of the (anagers is concerned that when so(eone turns off a wor&station infor(ation &eeps circulating around the networ& (a&ing co((unications slower and slower. What is your answer? Answer: d. An !*)/ pac&et contains a 'i(e to Li)e field that enables these &inds of pac&ets to be discarded. %$. 1our uni)ersity has decided to (igrate to !*)5 and in the process enable its CAN to use both !*)/ and !*)5. !n a (eeting one of the application progra((ers in the !' depart(ent states a concern about there being networ& confusion in differentiating between !*)/ and !*)5 pac&ets. What is your co((ent to address this concern? Answer: a. Aoth !*)/ and !*)5 contain a )ersion nu(ber at the beginning of each pac&et so that it is clear which is an !*)5 pac&et and which is an !*)/ pac&et. %1. 1our networ& needs %# host identifiers for %05 nodes. Which of the following for(ulas help you calculate the nu(ber of bits needed for the networ& identifier? Answer: c. -% B # C %/

Hands-On Pro e!ts "ips and Solutions #or Chapter 3 A!tivit$ 3-%
Learning to close 'C* port ser)ices that lea)e a co(puter wide open to an attac&er (who uses a port scan to find open ports) can sa)e a user or a co(pany2s ser)er fro( a disaster caused by an intruder. !n this acti)ity students bloc& 3e(ote Assistance and 3e(ote ,es&top in Windows 6 or .er)er %$$#@.er)er %$$# 3%.

A!tivit$ 3-&
!n this acti)ity students learn how to bloc& 'C* port %% to shut down access through ..7 in a Linu4 co(puter. .tudents learn how to use a Linu4 firewall to )erify port %% is not a)ailable.

A!tivit$ 3-3
. !n this acti)ity students learn fro( where to )iew the !* address configuration infor(ation in Windows 6 or Windows .er)er %$$#@.er)er %$$# 3%. !n .tep 0 students should record the !* address infor(ationDthe !* address and subnet (as&Dif it is configured (anually.

A!tivit$ 3-'
!n this acti)ity students use ifconfig to )iew the !*)/ address and subnet (as& for their Linu4 wor&station. !n .tep - they should notice the !*)/ address and in step / they should obser)e the subnet (as&.

A!tivit$ 3-(
Eor this acti)ity students learn to use the .yste( *references Networ& utility in =ac 8. F .now Leopard and Lion to )iew the 'C*@!* configuration infor(ation. !n .tep 0 students should record the !* address and subnet (as& for their co(puter.

A!tivit$ 3-)
!n this acti)ity students learn where to configure !*)5 in Windows 6@.er)er %$$#@.er)er %$$# 3%. !n conGunction with this acti)ity consider discussing further the concepts of subnet (as& in !*)/ and subnet prefi4 in !*)5.

A!tivit$ 3-*
Eor this acti)ity students learn where to configure !*)5 in Linu4 with the HN8=" -.4 des&top using the Networ& Connections application. !n .tep 6 the options for the =ethod bo4 include< !gnore Auto(atic Auto(atic addresses only Auto(atic ,7C* only =anual Lin&:Local 8nly .hared to other co(puters (deacti)ated by default)

A!tivit$ 3-+
.tudents learn how to use E'* fro( !nternet "4plorer =o;illa or .afari in this acti)ity. Note that they practice accessing a folder of files to download but do not actually download a file. Consider

e4panding this acti)ity by ha)ing students download a file fro( this Web site or fro( another one that is your preference.

A!tivit$ 3-,
!n this acti)ity students learn how to (a&e Windows 6 an .N=* agent by enabling .N=*. Consider supple(enting the acti)ity to show students how to use a networ& (anage(ent station or =icrosoft Networ& =onitor or *erfor(ance =onitor to access and (onitor networ& traffic through the new .N=* agent.

A!tivit$ 3-%Eor this acti)ity students learn how to bloc& ping and !C=* tests in =ac 8. F .now Leopard and Lion. 'hey also learn fro( where to bloc& nonessential !nternet co((unications (nonessential 'C* and +,* ports).

Solutions to the Case Pro e!t Assignments


Nishida Iitchens is a (ediu(:si;ed co(pany that (a&es pac&aged Japanese foods including noodle and sauce co(binations. 'heir foods are distributed to grocery stores and specialty food stores throughout Canada "urope and the +nited .tates. 'he co(pany is (o)ing into a new building and has hired Networ& ,esign Consultants to help the( create a new networ&. Aefore the (o)e their head networ& ad(inistrator accepted a Gob with another co(pany and his ine4perienced assistant has been pro(oted as the head networ& ad(inistrator. Nishida Iitchens has a business and sales unit of /% co(puter users. 'he plant in which the foods are produced pac&aged and shipped has /0 co(puter users. 'he co(pany has both Windows .er)er %$$# 3% and 3ed 7at "nterprise Linu4 ser)ers. 'he business and sales unit uses Windows 6 wor&stations. 'he plant users ha)e a co(bination of Windows 6 and 3ed 7at "nterprise Linu4 co(puters on user2s des&tops. 'he co(pany plans to ha)e !nternet connecti)ity a)ailable to all networ& users. Nishida Iitchens has an outlet store across town which pro)ides the public with direct sales of its products. 'he outlet store also has !nternet connecti)ity on a s(all networ& of 1% co(puters that are running Windows 6.

Case *roGect -:1< Choosing a Networ& *rotocol


What protocol do you reco((end for this networ& and what are its ad)antages? Answer: 'C*@!* is the (ost effecti)e protocol to reco((end for the new networ&. 7ere are so(e reasons< !t is used on (ost networ&s and is the protocol of preference for all of the operating syste(s in use on the Nishida Iitchens networ&. 'hey will need 'C*@!* for !nternet connecti)ity. =ore de)ices are (ade for 'C*@!* co((unications than for any other LAN protocol. 'here are (ore troubleshooting analysis and networ& (anage(ent tools a)ailable for 'C*@!* than for other protocols. !f there is a change in the networ&ing staff it will be easier to find networ& professionals who ha)e e4perience with 'C*@!*. 'here are (any useful protocols and applications associated with 'C*@!*.

Case *roGect -:%< !*)5 Ad)antages

Nishida Iitchens wants to e4plore the )alue of con)erting to !*)5 o)er the ne4t two years. *repare a report or slide presentation that outlines the ad)antages of !*)5. Answer: 'wo significant ad)antages of !*)5 are (ore !* addressing options and the i(ple(entation of better security. !*)5 also introduces the use of the anycast pac&et that contains a destination address that is associated with (ultiple interfaces. 'here are (any other options that include (as listed in the te4tboo&)<

A 1%#:bit address capability (15 bytes) A single address associated with (ultiple interfaces Address autoconfiguration and C!,3 addressing A /$:byte header instead of !*)/2s %$:byte header New !* e4tension headers that can be i(ple(ented for special needs including (ore routing and security options Address autoconfiguration and C!,3 addressing Contains the Elow Label field for better pac&et flow handling by routers using >uality of .er)ice (>o.) 8ffers si(pler auto(atic address configuration 3outing tables used by routers can be (ore co(pact and efficient through using route aggregation +se of Address 3esolution *rotocol is replaced by Neighbor ,isco)ery protocol

Case *roGect -:-< =onitoring the Networ&


Nishida Iitchens wants the ability to (onitor its networ& to &eep the networ& stable and to troubleshoot proble(s. What should Nishida Iitchens i(ple(ent to acco(plish networ& (onitoring at the (ain location and the outlet store? 7ow can networ& (onitoring be (ade secure?
Answer: Networ& (onitoring can be acco(plished by using .N=* along with two ele(ents< a networ& (anage(ent station (N=.) and networ& agents. 'he N=. (onitors networ&ed de)ices that are e?uipped to co((unicate )ia .N=*. 'he (anaged de)ices run agent software that is in contact with the networ& (anage(ent station. ,e)ices such as ser)ers wor&stations N!Cs switches routers bridges and hubs can be networ& agents. .N=* is the protocol that enables the networ& (onitoring. !t enables agents to collect data in the for( of the =!A for the N=. to access and assess. =onitoring of the networ& at the outlet store can be acco(plished through using 3e(ote Networ& =onitoring (3=8N). 'he re(ote database used by 3=8N is 3=8N =!A:!!. A way that students ha)e learned so far to (a&e networ& (onitoring secure is by configuring a co((unity na(e or string to be used by .N=* between the N=. and networ& agents.

Case *roGect -:/< "stablishing an ":=ail .er)er


Nishida Iitchens is considering the i(ple(entation of its own e:(ail ser)er so that e(ployees can e4change e:(ail with one another and with others o)er the !nternet. What ele(ent is i(portant to i(ple(ent in the e:(ail ser)er so that (essages can be transported o)er the !nternet? 7ow does this ele(ent wor&? Answer: .i(ple =ail 'ransfer *rotocol (.='*) enables the e4change of e:(ail between the users the ser)ers and across the !nternet. As discussed in the te4t (essages sent through .='* ha)e two parts< an address header and the (essage te4t. 'he address header contains the address of e)ery .='* node through which it has tra)eled and a date sta(p for e)ery transfer point. !f the recei)ing node is una)ailable .='* can wait for a period of ti(e and try to send the (essage again and then bounce the (ail bac& to the sender if the recei)ing node does not beco(e acti)e within a specified period. ,eploying .='* re?uires an .='*:co(patible e:(ail application at the sending and recei)ing nodes. .='* applications designate a ser)er as a central (ail gateway for connecting wor&stations and process e: (ail distribution through a ?ueue in a directory or print spooler. 'he ?ueue ser)es as a post office or do(ain for e:(ail clients. Clients can log on to the ser)er to obtain their (essages or the ser)er can forward (essages to its clients.

Case *roGect -:0< Choosing a WAN Co((unications *rotocol


Eor WAN co((unications such as o)er the !nternet connection what protocol should be used by the Windows F* *rofessional and 3ed 7at "nterprise Linu4 wor&stations? What are the ad)antages of this protocol? Answer: *oint:to:*oint *rotocol (***) should be used for re(ote co((unications. 'his protocol is used to encapsulate 'C*@!* o)er a WAN. 'he ad)antages of this protocol are< !t can carry (ultiple protocols. !t can auto(atically set up co((unications with se)eral layers of the 8.! (odel at once. !t supports connection authentication and encryption for security. Nor(ally the Windows 6 *rofessional and 3ed 7at "nterprise Linu4 co(puters will ha)e *** capabilities configured by default. !f Nishida Iitchens decides to use a K*N in the future the co(pany should also plan to use either **'* or L%'* as the re(ote co((unications protocol. L%'* is si(ilar to **'* but has =AC addressing recognition as well as !* recognition.

S-ar putea să vă placă și