Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CIT 315 Test Bank Network management, Exams of Computer Networks

CIT 315 Test Bank Network management

Typology: Exams

2024/2025

Available from 07/10/2025

Grace_Alesy
Grace_Alesy 🇺🇸

22 documents

1 / 50

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Chapter 6: Managing Data: Backup and Recovery
Processes Key
1. Creating an archive with the tar command deletes the original data. FALSE
2. To get help with the tar command, type tar --help and press Enter. TRUE
3. A volume header is simply a digital label used to describe a file. TRUE
4. The default standard output is the printer. FALSE
5. In openSUSE, the system cron table uses the Bourne shell by default. TRUE
6. The most common backup medium is ____. A. tape B. hard disk C. USB D.
CD/DVD
7. ____ refers to unpacking the members of an archive and making them
available. A. Unzipping B. Decompression C. Decrypting D. Extraction
8. The tar utility was designed to store files conveniently on ____.
A. disk B. magnetic tape C. platters D. memory sticks
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e
pf1f
pf20
pf21
pf22
pf23
pf24
pf25
pf26
pf27
pf28
pf29
pf2a
pf2b
pf2c
pf2d
pf2e
pf2f
pf30
pf31
pf32

Partial preview of the text

Download CIT 315 Test Bank Network management and more Exams Computer Networks in PDF only on Docsity!

Chapter 6: Managing Data: Backup and Recovery

Processes Key

  1. Creating an archive with the tar command deletes the original data. FALSE
  2. To get help with the tar command, type tar --help and press Enter. TRUE
  3. A volume header is simply a digital label used to describe a file. TRUE
  4. The default standard output is the printer. FALSE
  5. In openSUSE, the system cron table uses the Bourne shell by default. TRUE
  6. The most common backup medium is ____. A. tape B. hard disk C. USB D. CD/DVD
  7. ____ refers to unpacking the members of an archive and making them available. A. Unzipping B. Decompression C. Decrypting D. Extraction
  8. The tar utility was designed to store files conveniently on ____. A. disk B. magnetic tape C. platters D. memory sticks
  1. Which advanced tar option does not have a short name? A. append B. update C. delete D. compare
  2. Which cpio utility mode copies files from one directory to another? A. copy-out B. copy-in C. copy-pass D. copy-through
  3. Which cpio utility mode extracts files from an archive? A. copy-out B. copy-in C. copy-pass D. copy-through
  4. In Linux, the default standard input is the ____. A. microphone B. screen C. mouse D. keyboard
  5. Which symbol is used to redirect input from the keyboard? A. ^ (carrot) B. | (pipe) C. < (less than) D. > (greater than)
  6. Which output redirection operator is used to redirect a command’s output to a file? A. ^ (carrot) B. | (pipe) C. < (less than) D. > (greater than)
  7. Which output redirection operator is used to make one command’s output the standard input of another comman

A. 20% to 30% B. 60% to 70% C. 70% to 80% D. 100%

  1. To see a compression ratio for any file, you can use the ____ option with the gzip utility. A. - vr B. - v C. - r D. - cr
  2. To uncompress a file compressed with the gzip utility, you use the ____ command. A. gunzip B. unzip C. bunzip D. gunzip
  3. The bzip2 utility compresses files and adds the ____ extension. A. .zp2 B. .zip C. .bz D. .bz
  4. The cron table has ____ fields. A. five B. sixed C. seven D. eight
  5. Which command is used to create, delete, and list cron tables? A. cron B. cronutil C. crontab D. cronmg
  6. Only the ____ can edit the system cron table. A. super user B. table owner C. root user D. system administrator
  1. A(n) ____________________ copies files and directories to an archive you can use to restore data in case of a s failure or data loss and corruption. system backup
  2. A(n) ____________________ is a file containing many other files, each of which is still identified by its filenam owner, permissions, timestamp, and so forth. archive
  3. The archive file’s contents are called ____________________. members
  4. A(n) ____________________ is an archive of all files on the file system. full backup
  5. A(n) ____________________ is an archive containing only files modified since the last backup. incremental backup
  6. Match each item with a statement below.
    1. This directory contains syst information that changes whil running normally. /opt (^) 2
    2. This directory contains soft added after the default installa /proc (^) 8
    3. The system uses this cron t system tasks. a /etc 6
    4. Files in this directory rarely don’t need to back them up reg/var/spool/cron/tabs 5
    5. Users use this cron table to /etc/crontab 3

your home directory, you would lose the data and the backup. It’s safer to save the tar file to a disk or move it to another location, such as a network drive.

  1. When is a snapshot file created and, what does it contain? A snapshot file is created during a full backup and contains the condition of the backed-up directory to determine which files were modified since the last backup. This is a good practice because there’s no need to back up files that have already been backed up and haven’t changed.
  2. What commands does the copy in/out (cpio) utility use to generate files to be archived and, what are the three m operation? The cpio utility uses the results of the ls or find command to generate files to be archived. It operates in three modes: copy-out, copy-in, and copy-pass.
  3. Describe compression. Compression reduces the size of data to store information in less space. Think of it as writing in shorthand. The information stays the same, but you can fit more on a piece of paper. Many compression utilities are available for Linux users.
  4. When should you run backups? Often you need to have backups run at night or on weekends. Scheduling system backups during off hours is best because fewer people are logged in to the system and there’s less disruption in service.
  5. Identify the two types of cron tables the cron system daemon uses. The cron daemon uses two types of cron tables: the user cron table in /var/spool/cron/tabs and the system cron table in /etc/crontab.
  6. Compare the fields in the system cron table to those in the user cron table.

The first five fields of the system cron table are the same as the first five fields of the user cron table. The only difference is in the sixth field. In system cron tables, the sixth field defines the user who’s running the command.

Chapter 8: Network Communications Key

  1. The TCP/IP suite consists of only two protocols: Transmission Control Protocol and Internet Protocol. FALSE
  2. The sequence in which packets are received at the destination can be different from the sequence in which they ar sent. TRUE
  3. TCP is a connectionless protocol. FALSEz
  4. TCP focuses on transfer time for data packets. FALSE
  5. By default, the ping command sends an Echo Request every second until you press Ctrl+C. TRUE
  6. The ____ layer consists of cables or other connection media. A. Physical B. Data Link C. Transport D. Internet
  7. When a message travels from one computer to the next, it starts at the ____ layer. A. Physical B. Transport C. Application D. Internet

A. port number B. port address C. IP address D. tag number

  1. The format of an IP address is four numbers separated by ____. A. spaces B. dashes C. colons D. periods
  2. The ifconfig command is an administrative utility, so you must have ____ privileges to use it. A. administrator B. root C. supervisor D. owner
  3. IPv6 addresses have ____ bits A. 6 B. 32 C. 128 D. 256
  4. Two to the power of three (2^3 ) is ____. A. six B. eight C. nine D. 32
  5. What is the binary equivalent of the decimal number 112? A. 00000111 B. 00111100 C. 01110000 D. 11100000
  6. Which term refers to transmitting to multiple destinations from a single source? A. tunneling B. multicasting C. multisourcing D. looping
  1. Which IP address class is used for experimentation? A. Class A B. Class B C. Class D D. Class E
  2. What IP address is the local host for every computer? A. 1.1.1.1 B. 1.0.0.127 C. 127.0.0.1 D. 255.255.255.
  3. What command is used to configure NICs? A. ifconfig B. niconfig C. ping D. config
  4. Which subnet mask is used for a Class C network? A. 255.0.0.0 B. 255.255.255.0 C. 0.255.255.255 D. 0.0.0.
  5. How do you restart a Linux computer? A. Type restart and press Enter. B. Type reboot and press Enter.

D. - w n

  1. ____________________ are packages of data to be routed through a network. Packets
  2. The ____________________ layer is responsible for delivering data from one location to another on the network. Transport
  3. A(n) ____________________ represents a single binary value. bit or binary digit
  4. A(n) ____________________ is used to determine which part of an IP address is the network ID and which par host ID. subnet mask
  5. The ping command uses ____________________ to send an Echo Request packet to a specified network device network and waits for a reply.

Internet Control Message Protocol(ICMP) or Internet Control Message Protocol or

ICMP

  1. Match each item with a statement below.
    1. A protocol used to generate

UDP 8

  1. A connection-oriented prot keeping track of packets and r into a single file after they hav o HTTP (^) 7
  2. A protocol that handles the packets. ICMP (^) 1
  1. A protocol used to move fil computer to another efficientlySMTP 5
  2. A protocol used to send e- m client applications. Telnet 6
  3. A virtual terminal protocol remote computer. DNS 9
  4. A connectionless protocol u receiving requests between th a network. e TCP 2
  5. A connectionless protocol t packets from one computer to FTP 4
  6. A protocol used to map a fu name with an IP address. IP 3
  7. Describe how the protocols in the TCP/IP suite are organized and list the layers. The protocols in the TCP/IP suite are organized into these three layers, known as the TCP/IP model: Application layer · Transport layer · Internet layer
  8. Describe the TCP/IP Internet layer. The TCP/IP model revolves around the Internet layer, which sends packets to their specified destinations. This layer gets its name from its capability to inter- connect networks through the use of IP information. When you send information from your computer to another computer on the network, the Internet layer adds an IP-specific header to the packet as it pushes it through the hardware layers.
  9. Define fragmentation and explain why it is used. Fragmentation is the process of dividing packets into smaller packets to transmit them through networks. A packet sent from one network might be too big for another network to receive, so IP splits the packet so that it can be transferred.
  10. Describe the binary numbering system.

In Class B networks, the subnet mask is 255.255.0.0. The first two bits of a Class B network are always 10. Class B networks are assigned to large organizations, such as government agencies, universities, and typical companies.

  1. Describe a Class C network. Class C networks have the subnet mask 255.255.255.0. The first three bits of a Class C network are always 110. More than 2 million possible Class C networks are possible, but each network can have only 254 hosts, so Class C networks are assigned to small organizations.

Chapter 9: Installing Software Packages Key

  1. The RPM utility is closed source software licensed by Red Hat, Inc. FALSE
  2. You can use the RPM utility to package a software application in binary form. TRUE
  3. When uninstalling a package using the RPM utility, you must specify the package’s full name. FALSE
  4. The openSUSE installation CD is considered to be an external repository. FALSE
  1. YaST can be used with GUI interfaces. TRUE
  2. A software ____ is an archive of related files, such as configuration, data, and documentation files, constituting a software application. A. appliance B. package C. file D. repository
  3. Software packages created with the RPM utility are often called “RPM files” or simply “____.” A. packages B. archives C. installations D. repositories
  1. What is the extension for RPM packages? A. .rpm B. .rpp C. .rpkg D. .pkg
  2. What does the first part of the RPM package filename describe? A. architecture B. release number C. software D. version
  3. The third part of the filename is the software ____. A. architecture B. release number C. date D. version
  4. Typically, the filename release number starts with one and is incremented by ____ with each new version. A. 0.5 B. 1 C. 1.5 D. 2
  1. What happens if you try to upgrade a package and RPM finds a newer version installed on the system? A. An error results. B. A prompt appears asking if you want to continue. C. RPM overwrites the newer version with the upgrade package. D. RPM reinstalls the newer version using it’s configuration file.
  2. Which RPM option is especially useful if you have downloaded several packages and want to upgrade only the already installed on your system. A. - P B. - U C. – S D. - F
  3. What happens if you try to delete a package that’s providing capabilities to another application? A. A message appears indicating the delete operation failed due to dependency issues.