Review and Test Yourself


The following sections provide you with the opportunity to review what you learned in this chapter and to test yourself.

The Facts

For the exam, don't forget these important concepts:

  • To log on to a Netware server, you might need a username, password, tree, and context.

  • The following list summarizes the file permissions on Windows server platforms that use the NTFS file system:

    Right

    Description

    Full Control

    Provides all rights

    Modify

    Allows files to be modified

    Read & Execute

    Allows files to be read and executed (that is, run)

    List Folder Contents

    Allows the files in a folder to be listed

    Read

    Allows a file to be read

    Write

    Allows a file to be written to


  • Valid file permissions on a UNIX/Linux system include Read, Write, and Execute.

  • On Windows server platforms, you can convert from FAT partitions to NTFS partitions with the convert command.

  • Valid permissions for NetWare systems include Supervisor, Read, Write, Create, Erase, Modify, Filescan, and Access Control.

  • The usernames and passwords are case sensitive when logging on to a Linux system.

  • CSNW enables Windows-based clients to access file and print services on a NetWare server.

  • GSNW enables Windows client systems to access resources on a NetWare server through a Windows server that is acting as a gateway.

  • Samba enables Linux servers to share resources with Windows workstations.

Key Terms

  • Authentication

  • File and print services

  • Web server services

  • Novell NetWare

  • UNIX

  • Linux

  • Macintosh

  • Active Directory

  • FAT

  • FAT32

  • NTFS

  • NDS

  • NLMs

  • NFS

  • Samba

  • CSNW

  • GSNW

Exam Prep Questions

1:

You have been instructed to install a Novell NetWare server on your network. All the other servers are Windows 2000 systems. You want Windows XP Professional clients to be able to access both the Windows 2000 servers and the NetWare server. Which of the following strategies could you adopt? (Choose the two best answers.)

  • A. Install the Novell Client for Windows XP/2000 on each workstation.

  • B. Install GSNW on the NetWare server.

  • C. Install GSNW on the Windows XP Professional clients.

  • D. Install GSNW on one of the Windows 2000 servers.

2:

Which of the following is NOT a valid file permission on a UNIX or Linux system?

  • A. Read

  • B. Change

  • C. Write

  • D. Execute

3:

A user calls to report that he is having problems saving changes to a file held on an NTFS partition of a Windows Server 2003 system. The user is accessing the file through a share called NEWDATA. He has accessed the file before, but has never made any changes to it. Which of the following is NOT a valid reason for the issue the user is experiencing?

  • A. An inheritance filter is blocking permissions.

  • B. The user might not have the necessary permissions, but doesn't realize that.

  • C. The share permissions might be overriding the NTFS permissions.

  • D. The NTFS permissions might be overriding the share permissions.

4:

Which of the following versions of NetWare use eDirectory or NDS for storing and managing network objects such as user accounts? (Choose two.)

  • A. NetWare 3.11

  • B. NetWare 3.12

  • C. NetWare 4.11

  • D. NetWare 6.5

5:

A tone generator and locator are commonly referred to as what?

  • A. Fox and rabbit

  • B. Fox and hare

  • C. Fox and hound

  • D. Fox and dog

6:

Which of the following services is required to make the file and print resources of a Linux server available to Windows clients?

  • A. Squid

  • B. GSFL

  • C. FP4Linux

  • D. Samba

7:

Which of the following represent the minimum requirement to access a TCP/IP network? (Choose two.)

  • A. WINS information

  • B. Subnet mask

  • C. DNS information

  • D. IP address

  • E. Default gateway

8:

What tool would you use when working with an IDC?

  • A. Wire crimper

  • B. Media tester

  • C. OTDR

  • D. Punchdown tool

9:

Which of the following technologies enable individual files on a Windows server system to be secured against unauthorized access or viewing? (Choose two.)

  • A. EFS

  • B. HPFS

  • C. WINS

  • D. NTFS

10:

As a network administrator, you find yourself working in a wiring closet in which none of the cables have been labeled. Which of the following tools are you most likely to use to locate the physical ends of the cable?

  • A. Tone generator

  • B. Wire crimper

  • C. Punchdown tool

  • D. ping

Answers to Exam Prep Questions

A1:

The correct answers are A and D. To facilitate connection to a NetWare server from Windows clients, you can install the Novell Client for Windows XP/2000 on each workstation or install Gateway Services for NetWare on a Windows 2000 server. Alternatively, Microsoft supplies a client for NetWare that can be used in place of the Novell provided client. GSNW is a server-based service and would not be installed on the client. Answer B is not valid. GSNW is a Windows server-based service. You cannot run it on a NetWare server. For more information, see the section "Operating System Interoperability," in this chapter.

A2:

The correct answer is B. Change is not a permission used on UNIX or Linux. Read, Write, and Execute are supported.

A3:

The correct answer is A. NTFS does not provide an inheritance filter system. Therefore, an inheritance filter cannot be the issue. It might be that the user does not have the necessary permissions to edit the file, or it could be that the NTFS or share permissions are preventing the user from accessing the file. When a user accesses a file with NTFS permission on it through a share, the more restrictive of the two permission sets applies. Therefore, either one can override the other.

A4:

The correct answers are C and D. NDS was introduced with Netware 4.x and has been used on all subsequent versions, although it has since been renamed eDirectory. NetWare 3.x and prior versions of NetWare used a system called the Bindery to store user and account information.

A5:

The correct answer is C. A tone generator and locator are commonly referred to the fox and hound. None of the other answers are valid.

A6:

The correct answer is D. Samba is used to provide Windows clients with file and print services from a Linux server. None of the other options are valid.

A7:

The correct answers are B and D. To log on to a TCP/IP network, you need both the subnet mask and the IP address. Without entering the DNS and WINS configurations, these services will be unavailable, but you would still be able to log on to the network. Without the gateway configured, the client system would be restricted to the local segment.

A8:

The correct answer is D. You use a punchdown tool when working with an IDC. All the other tools are associated with making and troubleshooting cables, but they are not associated with IDCs.

A9:

The correct answers are A and D. Both EFS and NTFS are mechanisms that are used to secure individual files or folders from unauthorized viewing or access. HPFS is the High Performance File System used with the OS/2 operating system. WINS resolves NetBIOS names to the IP address.

A10:

The correct answer is A. The tone generator tool, along with the tone locator, can be used to trace cables. Crimpers and punchdown tools are not used for locating a cable. The ping utility would be of no help in this situation.



    Network+ Exam Cram 2
    Network+ Exam Cram 2
    ISBN: 078974905X
    EAN: N/A
    Year: 2003
    Pages: 194

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net