Name:
CS/IS 197 Homework #2
Module 1 – Unit 4, 5, 6
Unit 4 – System Setup
- What is BIOS?
- What is UEFI and what does it provide support for?
- What does Secure Boot prevent and how does it do that?
- When is upgrading firmware worth doing?
- What does the acronym POST stand for?
- List the 4 main boot managers and the OS they are used in.
- Which 3 file systems do windows servers support?
- Which file system do most Linux distributions use?
Unit 5 – Server Operating Systems
- What is the first job in specifying a new server?
- What two things do you need to consider when deciding where to put a new server?
- What are the four editions of Server 2012?
- What are the two main implementations of UNIX?
- What are the three best known distributions of Linux?
- What is the first step in specifying or upgrading server hardware?
- What is meant by an unattended installation?
- What is the advantage of using disk imaging software to clone an installation of Windows?
- What tool should be run before imaging a disk for cloning?
- Are 32-bit and 64-bit drivers compatible?
- What is the name of the utility you use to manage devices in Windows?
- When is virtual memory used?
Unit 6 – Troubleshooting Procedures
- What are the 8 steps in CompTIA’s Server+ troubleshooting model?
- What is the difference between “open” questions and “closed” questions?
- What should you do if you cannot solve a problem yourself?
- What are the three typical solutions to any problem?
- What is root cause analysis?
- Why is it a good idea to document troubleshooting into a ticket system?
Module 2 – Unit 1, 2, 3
Unit 1 – Ethernet
- Describe UTP cable.
- Where is CAT6A cabling mostly deployed?
- How is a crossover cable created and what were they used for?
- Describe the main differences between SMF and MMF.
- What is the maximum network speed of Fast Ethernet?
- Describe the difference between a hub and a switch.
- What are the 2 major applications of 10G Ethernet?
- What is PXE?
- What is network port bonding and why would you use this in a server?
- What is the first thing to do if you think there is a hardware problem in a network?
Unit 2 – Internet Protocol
- What is TCP and why is it used by most applications?
- What is UDP and when is it used?
- What 2 pieces of information does an IP address provide?
- What is a subnet mask used for?
- List the 2 things that must be entered when configuring TCP/IP manually.
- What happens if you do not configure a default gateway?
- What is the purpose of DNS servers?
- What is DHCP and what is it used for?
- What happens when a computer is configured to use a DHCP server but cannot contact one?
- If your computer has a private IP address, what 2 ways can it get Internet access?
- What does ipconfig display, when used without any switches?
- True or False: You can use ipconfig to determine whether the adapter has been correctly configured.
- What is the UNIX and Linux command that provides output similar to Windows’ ipconfig?
- What is the ping utility used for?
- Which protocol does ping use?
- What two messages are commonly received when a ping is unsuccessful?
- What might happen if 2 systems end up with the same IP address?
- What are the 2 main parts that an IPV6 address is divided into?
- What are link-local addresses used for in IPV6?
- In hex notation, what do link local addresses start with?
Unit 3 – Routers and Firewalls
- What are the 2 main functions of a router?
- What IP address conversion does a router do when using NAT?
- What 2 commands can you use to investigate the local host’s OS route table?
- What are tracert and traceroute used for?
- What is one of the critical functions of the transport layer?
- Why is TCP described as connection-oriented?
- What applications is UDP suitable for?
- What can the netstat command be used for?
- Describe a network zone.
- What is a firewall?
- What are the 3 main private and public zones?
- What isthe idea of a DMZ?
- When should you place servers in a DMZ?
- List the 2 ways that DMZs are implemented.
- What is the principle of least access?
- What happens when a firewall or ACL misconfiguration blocks packets that are supposed to be allowed through?
- Why is it more serious when a firewall is badly configured, such that packets may be allowed through that should have been blocked?
- What are VLANs?
- What should you do when you run into a connectivity problem that does not seem to have any sort of hardware or cable cause and the hosts’ IP configurations seem correct?