Deck 7: Sharing Resources on a Network
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 7: Sharing Resources on a Network
1
In most operating systems, including Windows-based and UNIX/Linux systems, access to shared resources is governed through ____ accounts.
A)user
B)group
C)reserve
D)administrator
A)user
B)group
C)reserve
D)administrator
A
2
A workstation or server can also function as a print server.
True
3
Groups are created in UNIX systems using the ____ command.
A)groupmod
B)groupadd
C)useradd
D)usermod
A)groupmod
B)groupadd
C)useradd
D)usermod
B
4
Permissions are set up by using the ____ command in UNIX/Linux.
A)usermod
B)groupmod
C)pmod
D)chmod
A)usermod
B)groupmod
C)pmod
D)chmod
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
Peer-to-peer networks are most efficient when shared resources are located on a single target computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
The ____ file permission category in UNIX/Linux systems typically entails all permissions and is designated by the letter u .
A)Group membership
B)All
C)Ownership
D)World
A)Group membership
B)All
C)Ownership
D)World
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
Peer-to-peer networks are generally effective for about ____ workstations or fewer in Windows XP.
A)10
B)30
C)50
D)100
A)10
B)30
C)50
D)100
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Adding the parameter ____ to the useradd command specifies the account password.
A)- g
B)- n
C)- p
D)- s
A)- g
B)- n
C)- p
D)- s
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
NTFS and share permissions in combination on the same folder are cumulative.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
Adding the parameter ____ to the useradd command gives an account description.
A)- c
B)- d
C)- e
D)- f
A)- c
B)- d
C)- e
D)- f
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
The user identification number ( UID)of a user account in UNIX can be a number as large as ____.
A)1,000
B)5,000
C)10,000
D)60,000
A)1,000
B)5,000
C)10,000
D)60,000
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
In UNIX/Linux systems, a directory or file can be assigned any combination of three permissions: read, write, and ____.
A)execute
B)modify
C)list folder contents
D)full control
A)execute
B)modify
C)list folder contents
D)full control
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A DHCP server is a server that uses software and DHCP to automatically assign a(n)____ address from a pool of possible addresses.
A)MAC
B)LAA
C)IP
D)BIA
A)MAC
B)LAA
C)IP
D)BIA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
In UNIX/Linux, a mapped drive is called a ____ volume.
A)logical
B)mounted
C)virtual
D)partitioned
A)logical
B)mounted
C)virtual
D)partitioned
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
In UNIX/Linux, peer-to-peer networking is made possible by ensuring that ____ is installed and properly configured.
A)FTP
B)TCP/IP
C)Telnet
D)SMTP
A)FTP
B)TCP/IP
C)Telnet
D)SMTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
In a peer-to-peer network, the computer automatically assigns itself an IP address from the reserved range of 169.254.0.1 to 169.254.255.254 and a subnet mask of ____.
A)255.0.0.0
B)255.255.0.0
C)255.255.255.0
D)255.255.255.255
A)255.0.0.0
B)255.255.0.0
C)255.255.255.0
D)255.255.255.255
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
____ are used in UNIX/Linux for granting permissions to one user or a group of users to access specific resources .
A)Collections
B)Associations
C)Aggregates
D)Groups
A)Collections
B)Associations
C)Aggregates
D)Groups
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
The most common user account management activity is changing passwords.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
In Windows XP Professional (and Windows Server 2003), a folder or drive is shared through its properties.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
In Windows XP Professional, the ____ option in folder Properties enables the contents of the folder to be stored on the client's hard drive while he or she is not on the network.
A)Security
B)Customize
C)Caching
D)Permissions
A)Security
B)Customize
C)Caching
D)Permissions
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Describe the three permissions that can be assigned to a directory or file in UNIX/Linux systems.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
What four types of password restriction information are contained in a shadow file?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
The ____ file contains the clients that are allowed to use NFS .
A)/etc/hosts.allow
B)/etc/hosts.let
C)/etc/hosts.grant
D)/etc/hosts.permit
A)/etc/hosts.allow
B)/etc/hosts.let
C)/etc/hosts.grant
D)/etc/hosts.permit
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
____________________ is a software process that enables a client workstation to attach to the shared folder of another workstation or server, and assign it a drive letter.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A(n)____ print server is a boxlike device that has a NIC (or WNIC)and one, two, or more ports for connecting printers, such as USB or parallel ports .
A)independent
B)autonomous
C)dedicated
D)extended
A)independent
B)autonomous
C)dedicated
D)extended
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
For Windows XP Professional and Windows Server 2003, printer share permissions are checked for ____.
A)Active or Inactive
B)Yes or No
C)On or Off
D)Allow or Deny
A)Active or Inactive
B)Yes or No
C)On or Off
D)Allow or Deny
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Home ____________________ are areas on the computer in which users store data.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are the disadvantages of peer-to-peer networking?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Berkeley Software Distribution (BSD)uses ____ components for printing .
A)two
B)three
C)four
D)five
A)two
B)three
C)four
D)five
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
You can use the ____ command in UNIX/Linux to mount an NFS volume.
A)chmod
B)mount
C)ifconfig
D)usermod
A)chmod
B)mount
C)ifconfig
D)usermod
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
What are the advantages and disadvantages of converting a workstation or server into a print server?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
A(n)____________________ centralizes control of network resources into a logical grouping of user accounts, computers, printers, and network devices.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Provide a summary of the NTFS share permissions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Provide four reasons for the effectiveness of peer-to-peer networking at the level of a very small network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What are the advantages and disadvantages associated with a dedicated print server?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
_________________________ is a resource-sharing protocol used in Windows-based networking .
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Do not configure ICS on a network that has servers running ____ or DNS to avoid confusion about IP addressing.
A)FTP
B)HTTP
C)DHCP
D)TCP/IP
A)FTP
B)HTTP
C)DHCP
D)TCP/IP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
A(n)_________________________ enables services and software on one computer to use services and software on a different computer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
What do important elements of peer-to-peer computing in Windows XP (and Windows Server 2003)include?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Identify and describe three share permissions available for folders in Windows XP Professional.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Identify and describe four share permissions for Windows XP Professional and Windows Server 2003 .
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck