Deck 7: Sharing Resources on a Network

ملء الشاشة (f)
exit full mode
سؤال
A(n)____ print server is a boxlike device that has a NIC (or WNIC)and one,two,or more ports for connecting printers,such as USB or parallel ports.

A)independent
B)autonomous
C)dedicated
D)extended
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Peer-to-peer networks can be effective for small networks because they are inexpensive to maintain.
سؤال
Which of the following is NOT a valid printer share permission in Windows 7?

A)Print
B)Manage documents
C)Delete printer queue
D)Manage this printer
سؤال
In a network with no DHCP server,computers can automatically assign themselves an IP address from the reserved range of 169.254.0.1 to 169.254.255.254,an addressing mode called which of the following?

A)DHCP-Auto
B)Static
C)Manual
D)APIPA
سؤال
____ are used in UNIX/Linux for granting permissions to one user or a group of users to access specific resources.

A)Collections
B)Associations
C)Aggregates
D)Groups
سؤال
Which of the following is a specialized server that is located on a company network for the purpose of enabling users to access network resources from home or while traveling?

A)remote access server
B)DHCP server
C)network management server
D)virtual Web server
سؤال
The ____ file contains the clients that are allowed to use NFS.

A)/etc/hosts.allow
B)/etc/hosts.let
C)/etc/hosts.grant
D)/etc/hosts.permit
سؤال
Which of the following is NOT a printer component used by Berkeley Software Distribution (BSD)?

A)lpr
B)lpset
C)lpd
D)/etc/printcap
سؤال
NTFS and share permissions in combination on the same folder are cumulative.
سؤال
In UNIX/Linux,a mapped drive is called a ____ volume.

A)logical
B)mounted
C)virtual
D)partitioned
سؤال
Which type of network are you running if your computer is a member of a workgroup?

A)peer-to-peer
B)domain
C)mainframe
D)wireless
سؤال
The ____ file permission category in UNIX/Linux systems typically entails all permissions and is designated by the letter u.

A)Group membership
B)All
C)Ownership
D)World
سؤال
In Fedora Linux,UIDs with a value less than 500 are typically used for which purpose?

A)disabled accounts
B)power users
C)system-based accounts
D)regular users
سؤال
Permissions are set up by using the ____ command in UNIX/Linux.

A)usermod
B)groupmod
C)pmod
D)chmod
سؤال
The passwd file in Linux contains user passwords in plain text format so that file must not be accessible to any user but the administrator.
سؤال
Which of the following is used to manage access to shared resources in most operating systems?

A)user accounts
B)computer accounts
C)permission accounts
D)administrator accounts
سؤال
Samba software runs on Linux operating systems and supports SMB protocol.
سؤال
In Windows 7,you cannot set permissions on a shared printer,although you can do so on Windows Server 2008.
سؤال
Which of the following Linux/UNIX commands makes an NFS volume available?

A)chmod
B)mount
C)ifconfig
D)usermod
سؤال
Which of the following commands will create a new user account in Fedora Linux?

A)newuser
B)useradd
C)account -user
D)user -new
سؤال
Which of the following involves providing a host of scalable Web-based applications and services over the Internet or a private network?

A)wireless computing
B)personal area computing
C)land-based computing
D)cloud computing
سؤال
Which of the following are types of cloud models described by Microsoft (Choose all that apply.)

A)private cloud
B)personal cloud
C)remote cloud
D)public cloud
سؤال
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
automatic address assignment when no DHCP server is available
سؤال
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
Windows software that enables your computer to access shared resources on other Windows computers
سؤال
On Windows Server 2008,the ________________ enables management of disk volumes in multiple SANS through one interface on a single server.
سؤال
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
enables you to turn one computer on your network into an "Internet server."
سؤال
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
Windows 7 uses these to identify computers on a network that are not part of a domain
سؤال
A(n)____________________ centralizes control of network resources into a logical grouping of user accounts,computers,printers,and network devices.
سؤال
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
special set of permissions that may be associated with executable programs running in UNIX/Linux systems.
سؤال
In Linux,a home ____________________ is automatically assigned to a user for storing his or her files.
سؤال
____________________ is a software process that enables a client workstation to attach to the shared folder of another workstation or server,and assign it a drive letter.
سؤال
Which of the following are common ways to implement network printing? (Choose all that apply.)

A)using a Bluetooth adapter
B)using a dedicated print server
C)sharing a printer through an operating system
D)plugging the printer's USB cable into an Ethernet hub
سؤال
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
associates users of UNIX systems who have common access needs.
سؤال
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
a subnetwork technology used for SANS and enables gigabit speed data transfers
سؤال
Provide four reasons for the effectiveness of peer-to-peer networking at the level of a very small network.
سؤال
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
resources are made available through a third-party outsourcer,but
are accessible only to users within a specific organization.
سؤال
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
a device with software that manages shared printing on a network.
سؤال
________________ is a resource-sharing protocol used in Linux systems that is compatible with the Windows SMB protocol.
سؤال
Which of the following are valid permissions that can be assigned to a file or directory in Linux/UNIX? (Choose all that apply.)

A)Read
B)Save
C)Delete
D)Execute
سؤال
Which of the following sharing options are available in Windows homegroups? (Choose all that apply.)

A)Homegroup (Full Control)
B)Nobody
C)Homegroup (Read)
D)Administrator (Read/Write)
سؤال
What four types of password restriction information are contained in a shadow file?
سؤال
Briefly describe a storage area network (SAN).
سؤال
Identify and describe the three traditional share permissions available for folders in Windows 7 through Advanced Sharing.
سؤال
Describe the three permissions that can be assigned to a directory or file in UNIX/Linux systems.
سؤال
What are the advantages and disadvantages associated with a dedicated print server?
سؤال
What are the reasons that the peer-to-peer network model becomes less effective as the number of network stations increases?
سؤال
Describe a virtual private network (VPN)and its purpose.
سؤال
What do important elements of peer-to-peer computing in Windows 7 (and Windows Server 2008)include?
سؤال
Describe how NTFS and share permissions work together.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/49
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Sharing Resources on a Network
1
A(n)____ print server is a boxlike device that has a NIC (or WNIC)and one,two,or more ports for connecting printers,such as USB or parallel ports.

A)independent
B)autonomous
C)dedicated
D)extended
C
2
Peer-to-peer networks can be effective for small networks because they are inexpensive to maintain.
True
3
Which of the following is NOT a valid printer share permission in Windows 7?

A)Print
B)Manage documents
C)Delete printer queue
D)Manage this printer
C
4
In a network with no DHCP server,computers can automatically assign themselves an IP address from the reserved range of 169.254.0.1 to 169.254.255.254,an addressing mode called which of the following?

A)DHCP-Auto
B)Static
C)Manual
D)APIPA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ are used in UNIX/Linux for granting permissions to one user or a group of users to access specific resources.

A)Collections
B)Associations
C)Aggregates
D)Groups
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is a specialized server that is located on a company network for the purpose of enabling users to access network resources from home or while traveling?

A)remote access server
B)DHCP server
C)network management server
D)virtual Web server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
7
The ____ file contains the clients that are allowed to use NFS.

A)/etc/hosts.allow
B)/etc/hosts.let
C)/etc/hosts.grant
D)/etc/hosts.permit
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is NOT a printer component used by Berkeley Software Distribution (BSD)?

A)lpr
B)lpset
C)lpd
D)/etc/printcap
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
9
NTFS and share permissions in combination on the same folder are cumulative.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
10
In UNIX/Linux,a mapped drive is called a ____ volume.

A)logical
B)mounted
C)virtual
D)partitioned
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which type of network are you running if your computer is a member of a workgroup?

A)peer-to-peer
B)domain
C)mainframe
D)wireless
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
12
The ____ file permission category in UNIX/Linux systems typically entails all permissions and is designated by the letter u.

A)Group membership
B)All
C)Ownership
D)World
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
13
In Fedora Linux,UIDs with a value less than 500 are typically used for which purpose?

A)disabled accounts
B)power users
C)system-based accounts
D)regular users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
14
Permissions are set up by using the ____ command in UNIX/Linux.

A)usermod
B)groupmod
C)pmod
D)chmod
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
15
The passwd file in Linux contains user passwords in plain text format so that file must not be accessible to any user but the administrator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is used to manage access to shared resources in most operating systems?

A)user accounts
B)computer accounts
C)permission accounts
D)administrator accounts
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
17
Samba software runs on Linux operating systems and supports SMB protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
18
In Windows 7,you cannot set permissions on a shared printer,although you can do so on Windows Server 2008.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following Linux/UNIX commands makes an NFS volume available?

A)chmod
B)mount
C)ifconfig
D)usermod
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following commands will create a new user account in Fedora Linux?

A)newuser
B)useradd
C)account -user
D)user -new
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following involves providing a host of scalable Web-based applications and services over the Internet or a private network?

A)wireless computing
B)personal area computing
C)land-based computing
D)cloud computing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following are types of cloud models described by Microsoft (Choose all that apply.)

A)private cloud
B)personal cloud
C)remote cloud
D)public cloud
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
automatic address assignment when no DHCP server is available
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
Windows software that enables your computer to access shared resources on other Windows computers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
25
On Windows Server 2008,the ________________ enables management of disk volumes in multiple SANS through one interface on a single server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
26
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
enables you to turn one computer on your network into an "Internet server."
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
Windows 7 uses these to identify computers on a network that are not part of a domain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n)____________________ centralizes control of network resources into a logical grouping of user accounts,computers,printers,and network devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
29
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
special set of permissions that may be associated with executable programs running in UNIX/Linux systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
30
In Linux,a home ____________________ is automatically assigned to a user for storing his or her files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
31
____________________ is a software process that enables a client workstation to attach to the shared folder of another workstation or server,and assign it a drive letter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the following are common ways to implement network printing? (Choose all that apply.)

A)using a Bluetooth adapter
B)using a dedicated print server
C)sharing a printer through an operating system
D)plugging the printer's USB cable into an Ethernet hub
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
33
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
associates users of UNIX systems who have common access needs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
34
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
a subnetwork technology used for SANS and enables gigabit speed data transfers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
35
Provide four reasons for the effectiveness of peer-to-peer networking at the level of a very small network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
resources are made available through a third-party outsourcer,but
are accessible only to users within a specific organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
37
Match each item with a statement below.
a.Set User ID (SUID)
b.Client for Microsoft Networks
c.hosted private cloud
d.workgroup
e.Fibre Channel
f.APIPA
g.print server
h.Internet Connection Sharing (ICS)
i.group identification number (GID)
a device with software that manages shared printing on a network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
38
________________ is a resource-sharing protocol used in Linux systems that is compatible with the Windows SMB protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
39
Which of the following are valid permissions that can be assigned to a file or directory in Linux/UNIX? (Choose all that apply.)

A)Read
B)Save
C)Delete
D)Execute
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
40
Which of the following sharing options are available in Windows homegroups? (Choose all that apply.)

A)Homegroup (Full Control)
B)Nobody
C)Homegroup (Read)
D)Administrator (Read/Write)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
41
What four types of password restriction information are contained in a shadow file?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
42
Briefly describe a storage area network (SAN).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
43
Identify and describe the three traditional share permissions available for folders in Windows 7 through Advanced Sharing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
44
Describe the three permissions that can be assigned to a directory or file in UNIX/Linux systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
45
What are the advantages and disadvantages associated with a dedicated print server?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
46
What are the reasons that the peer-to-peer network model becomes less effective as the number of network stations increases?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
47
Describe a virtual private network (VPN)and its purpose.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
48
What do important elements of peer-to-peer computing in Windows 7 (and Windows Server 2008)include?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
49
Describe how NTFS and share permissions work together.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 49 في هذه المجموعة.