You are on page 1of 2

Network+ Guide to Networks, 5th Edition Chapter 14 Solutions Review Questions 1.

Which of the following percentages represents the highest availability? a. 99.99% 2. What distinguishes a Trojan horse from a boot sector virus? a. A Trojan horse propagates itself via network connections while a boot sector virus propagates itself through executable files copied from disk to disk. 3. What characteristic of the IRC protocol makes it an effective way to spread v iruses and worms quickly? b. It broadcasts communication from one chat room participant to others. 4. Which of the following techniques does a polymorphic virus employ to make its elf more difficult to detect? a. It frequently changes its code characteristics. 5. If your anti-malware software uses signature scanning, what must you do to ke ep its malware-fighting capabilities current? d. Regularly update the anti-malware software's signature database. 6. Which of the following power flaws has the ability to render your server s main circuit board unusable, even after power returns to normal? d. Surge 7. Approximately how long will an online UPS take to switch its attached devices to battery power? d. No time 8. When purchasing a UPS, you have to match the power needs of your system accor ding to what unit of measure? c. Volt-amps 9. What makes SONET a highly fault-tolerant technology? a. It uses dual, fiber-optic rings to connect nodes. 10. Why is simple disk striping not fault-tolerant? b. If one disk fails, data contained on that disk is unavailable. 11. The most common form of RAID used on modern networks relies on what techniqu es? c. disk striping with distributed parity

12. Which of the following can be considered an advantage of clustering servers over mirroring servers? d. Clustering fail-over takes place more rapidly. 13. Which of the following offers the highest fault tolerance for shared data an d programs? c. SANs (storage area networks) 14. Why do SANs save and retrieve files faster than NAS devices? d. They use a proprietary network transmission method, rather than Ethernet or t oken ring. 15. Suppose you are the network manager for an ISP whose network contains five f ile servers that use software RAID, a NAS installation, and a SAN. You learn tha t the company is taking on a huge Web hosting client and you need to add 1 TB of storage space as soon as possible. To what part of the network should you add t he storage so that it causes the least disruption to the existing network? d. To the SAN 16. Which factor must you consider when using online backups that you don't typi cally have to consider when backing up to a LAN tape drive? c. Security 17. In a grandfather-father-son backup scheme, the October week 1 Thursday backup ta pe would contain what type of files? c. Files changed since Wednesday (a day before) 18. In the grandfather-father-son backup scheme, how frequently is a full backup performed? (Choose all that apply.) b. Weekly e. Monthly 19. What is the difference between an incremental backup and a differential back up? b. An incremental backup resets the archive bit after backing up files, whereas a differential backup does not. 20. You have been charged with creating a disaster recovery contingency plan for the federal benefits agency where you work. Your supervisor has said that the n etwork must have the highest availability possible, no matter what the cost. Whi ch type of disaster recovery site do you recommend? d. Hot site

You might also like