You are on page 1of 2

Network+ Guide to Networks, 5th Edition Chapter 14 Solutions Review Questions 1.

Which of the following percentages represents the highest availability? a. 99.99% 2. What distinguishes a Trojan horse from a boot sector virus? a. A Trojan horse propagates itself via network connections while a boot sector virus propagates itself through executable files copied from disk to disk. 3. What characteristic of the IRC protocol makes it an effective way to spread v iruses and worms quickly? b. It broadcasts communication from one chat room participant to others. 4. Which of the following techniques does a polymorphic virus employ to make its elf more difficult to detect? a. It frequently changes its code characteristics. 5. If your anti-malware software uses signature scanning, what must you do to ke ep its malware-fighting capabilities current? d. Regularly update the anti-malware software's signature database. 6. Which of the following power flaws has the ability to render your server s main circuit board unusable, even after power returns to normal? d. Surge 7. Approximately how long will an online UPS take to switch its attached devices to battery power? d. No time 8. When purchasing a UPS, you have to match the power needs of your system accor ding to what unit of measure? c. Volt-amps 9. What makes SONET a highly fault-tolerant technology? a. It uses dual, fiber-optic rings to connect nodes. 10. Why is simple disk striping not fault-tolerant? b. If one disk fails, data contained on that disk is unavailable. 11. The most common form of RAID used on modern networks relies on what techniqu es? c. disk striping with distributed parity

Monthly 19. a NAS installation. Which of the following offers the highest fault tolerance for shared data an d programs? c. SANs (storage area networks) 14.) b. To the SAN 16. Which of the following can be considered an advantage of clustering servers over mirroring servers? d. Suppose you are the network manager for an ISP whose network contains five f ile servers that use software RAID. Your supervisor has said that the n etwork must have the highest availability possible. no matter what the cost. 15. Security 17. Whi ch type of disaster recovery site do you recommend? d. 13. 20. In the grandfather-father-son backup scheme. Hot site . Files changed since Wednesday (a day before) 18. What is the difference between an incremental backup and a differential back up? b. They use a proprietary network transmission method. You learn tha t the company is taking on a huge Web hosting client and you need to add 1 TB of storage space as soon as possible. An incremental backup resets the archive bit after backing up files. Which factor must you consider when using online backups that you don't typi cally have to consider when backing up to a LAN tape drive? c. how frequently is a full backup performed? (Choose all that apply. In a grandfather-father-son backup scheme. You have been charged with creating a disaster recovery contingency plan for the federal benefits agency where you work. To what part of the network should you add t he storage so that it causes the least disruption to the existing network? d. Why do SANs save and retrieve files faster than NAS devices? d. Weekly e. and a SAN. Clustering fail-over takes place more rapidly. whereas a differential backup does not. rather than Ethernet or t oken ring.12. the October week 1 Thursday backup ta pe would contain what type of files? c.