Full download Network+ Guide to Networks 7th Edition West Test Bank all chapter 2024 pdf

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 34

Network+ Guide to Networks 7th

Edition West Test Bank


Go to download the full and correct content document:
https://testbankfan.com/product/network-guide-to-networks-7th-edition-west-test-bank
/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Network+ Guide to Networks 7th Edition West Solutions


Manual

https://testbankfan.com/product/network-guide-to-networks-7th-
edition-west-solutions-manual/

Network+ Guide to Networks 8th Edition West Test Bank

https://testbankfan.com/product/network-guide-to-networks-8th-
edition-west-test-bank/

Network+ Guide to Networks 8th Edition West Solutions


Manual

https://testbankfan.com/product/network-guide-to-networks-8th-
edition-west-solutions-manual/

Network+ Guide to Networks 5th Edition Dean Test Bank

https://testbankfan.com/product/network-guide-to-networks-5th-
edition-dean-test-bank/
Network+ Guide to Networks 6th Edition Tamara Dean Test
Bank

https://testbankfan.com/product/network-guide-to-networks-6th-
edition-tamara-dean-test-bank/

Network+ Guide to Networks 6th Edition Tamara Dean


Solutions Manual

https://testbankfan.com/product/network-guide-to-networks-6th-
edition-tamara-dean-solutions-manual/

Guide to Network Security Fundamentals 6th Edition


Ciampa Test Bank

https://testbankfan.com/product/guide-to-network-security-
fundamentals-6th-edition-ciampa-test-bank/

Guide to Network Defense and Countermeasures 3rd


Edition Weaver Test Bank

https://testbankfan.com/product/guide-to-network-defense-and-
countermeasures-3rd-edition-weaver-test-bank/

MCTS Guide to Microsoft Windows Server 2008 Network


Infrastructure Configuration 1st Edition Bender Test
Bank

https://testbankfan.com/product/mcts-guide-to-microsoft-windows-
server-2008-network-infrastructure-configuration-1st-edition-
bender-test-bank/
Chapter 07 Cloud Computing and Remote Access

TRUEFALSE

1. An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.

(A) True

(B) False

Answer : (A)

2. After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the
tunnel.​

(A) True

(B) False

Answer : (B)

3. The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.​

(A) True

(B) False

Answer : (B)

4. PPP can support several types of Network layer protocols that might use the connection.​

(A) True

(B) False

Answer : (A)

5. ​Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP.

(A) True

(B) False

Answer : (A)

MULTICHOICE
6. Which type of cloud service model involves hardware services that are provided virtually,
including network infrastructure devices such as virtual servers?​

(A) IaaS​

(B) ​PaaS

(C) ​SaaS

(D) ​XaaS

Answer : (A)

7. ​What cloud service model involves providing applications through an online user interface,
providing for compatibility with a multitude of different operating systems and devices?

(A) ​IaaS

(B) ​SaaS

(C) ​XaaS

(D) ​PaaS

Answer : (B)

8. ​Which of the following is NOT an encryption algorithm used by SSH?

(A) ​SHA-2

(B) ​DES

(C) ​RSA

(D) ​Kerberos

Answer : (A)

9. ​The SSH service listens on what TCP port?

(A) ​20

(B) ​21

(C) ​22

(D) ​23

Answer : (C)

10. The original version of the Secure Hashing Algorithm (SHA) was developed by the NSA, and
used a hash of what length?​

(A) ​128 bit

(B) ​160 bit

(C) ​256 bit

(D) ​512 bit

Answer : (B)

11. ​What protocol below only provides the framework for authenticating clients and servers, but
relies on other encryption and authentication schemes to verify the credentials of clients or servers?

(A) ​MS-CHAP

(B) ​MS-CHAPv2

(C) ​EAP

(D) ​TKIP

Answer : (C)

12. When using public and private keys to connect to an SSH server, where must your public key be
placed before you can connect?​

(A) ​In an authorization file under your home directory on your computer.

(B) ​In an authorization file on the host where the SSH server is.

(C) ​In the /etc/ssh/keys folder.

(D) ​In the /var/run/ssh/public folder.

Answer : (B)

13. What security principle provides proof of delivery and proof of the sender's identity?​

(A) ​utility

(B) ​integrity

(C) ​availability

(D) ​non-repudiation

Answer : (D)

14. ​The combination of a public key and a private key are known by what term below?
(A) ​key set

(B) ​key team

(C) ​key pair

(D) ​key tie

Answer : (C)

15. Digital certificates are issued by organizations known as what term?​

(A) ​certification authorities

(B) ​certification registrars

(C) ​identity verifiers

(D) ​certificate exchanges

Answer : (A)

16. ​What security encryption protocol requires regular re-establishment of a connection and can be
used with any type of TCP/IP transmission?

(A) ​L2TP

(B) ​TLS

(C) ​IPsec

(D) ​SSL

Answer : (C)

17. At what layer of the OSI model does the IPsec encryption protocol operate?​

(A) ​Physical layer

(B) ​Network layer

(C) ​Transport layer

(D) ​Application layer

Answer : (B)

18. The PPP headers and trailers used to create a PPP frame that encapsulates Network layer
packets vary between 8 and 10 bytes in size due to what field?​

(A) priority​
(B) ​FCS

(C) ​FEC

(D) ​encryption

Answer : (B)

19. When using a site-to-site VPN, what type of device sits at the edge of the LAN and establishes
the connection between sites?​

(A) ​VPN proxy

(B) ​VPN server

(C) ​VPN transport

(D) ​VPN gateway

Answer : (D)

20. Amazon and Rackspace both utilize what virtualization software below to create their cloud
environments?​

(A) ​VMware vSphere

(B) ​Oracle VirtualBox

(C) ​Parallels

(D) ​Citrix Xen

Answer : (D)

21. What protocol below is a Microsoft proprietary protocol first available in Windows Vista?​

(A) ​L2TP

(B) ​PPTP

(C) ​TTLS

(D) ​SSTP

Answer : (D)

22. What authentication protocol sends authentication information in cleartext without encryption?​

(A) ​PAP

(B) ​MS-CHAP
(C) ​MS-CHAPv2

(D) ​EAP

Answer : (A)

23. ​How often should administrators and network users be required to change their password?

(A) 60 days

(B) 90 days

(C) ​120 days

(D) ​180 days

Answer : (A)

24. What encryption protocol was designed as more of an integrity check for WEP transmissions
rather than a sophisticated encryption protocol?​

(A) ​Kerberos

(B) ​TKIP

(C) ​AES

(D) ​EAP

Answer : (B)

25. ​A SecurID key chain fob from RSA security generates a password that changes how often?

(A) ​every 20 seconds

(B) ​every 30 seconds

(C) ​every 60 seconds

(D) ​every 70 seconds

Answer : (C)

26. What two protocols below are Data Link Layer protocols designed to connect WAN endpoints in
a direct connection, such as when a client computer connects to a server at an ISP using a dial-up or
DSL connection and modem?

(A) OpenVPN

(B) ​SLIP
(C) ​PPTP

(D) ​PPP

Answer :

27. What two different types of encryption can be used by IPsec during data transfer?​

(A) ​Secure Sockets Layer (SSL)

(B) ​Authentication Header (AH)

(C) ​Encapsulating Security Payload (ESP)

(D) ​Advanced Encryption Standard (AES)

Answer :

28. The key management phase of IPSec is reliant on which two services below?

(A) ​Internet Key Exchange (IKE)

(B) ​Internet Security Association and Key Management Protocol (ISAKMP)

(C) ​Authentication Header (AH)

(D) ​Encapsulating Security Payload (ESP)

Answer :

29. What two key lengths are the most popular for the SHA-2 hashing algorithm?​

(A) ​160

(B) ​256

(C) ​512

(D) ​1024

Answer :

30. What two options below are AAA services?​

(A) ​OpenSSH

(B) ​OpenVPN

(C) ​RADIUS

(D) ​TACACS+
Answer :

SHORTANSWER

31. The _________________ cloud service model provides virtual environments online that can be
tailored to the needs of developers.Answer : Platform as a Service (PaaS)

32. A _________________ is a service that is shared between multiple organizations, but not available
publicly.​Answer : community cloud

33. A variant of TLS is ___________________, which provides authentication like SSL/TLS, but does not
require a certificate for each user.​Answer : Tunneled Transport Layer Security (TTLS)

34. ​In Kerberos, a temporary set of credentials that a client uses to prove that its identity has been
validated is known as a _____________.Answer : ticket

35. When PPP is used over an Ethernet network, it is known as ________________.​Answer : PPPoE
Answer : Point to Point over Ethernet

MATCH

36. ​Match each correct item with the statement below.

ESSAY

37. What are the three tenets of the CIA triad, and how do they provide assurances that data will be
protected?

Graders Info :

​To protect data, encryption provides the following assurances:

● confidentiality-Data can only be viewed by its intended recipient or at its intended destination.
● ​integrity-Data was not modified after the sender transmitted it and before the receiver picked it
up.
● ​availability-Data is available and accessible to the intended recipient when needed, meaning the
sender is accountable for successful delivery of the data.

38. Describe how public key encryption works.​


Graders Info :

In public key encryption , data is encrypted using two keys: One is a key known only to a user (that
is, a private key), and the other is a public key associated with the user. A user' s public key can be
obtained the old-fashioned way- by asking that user- or it can be obtained from a third-party source,
such as a public key server. A public key server is a publicly accessible host (such as a server on the
Internet) that freely provides a list of users' public keys, much as a telephone book provides a list of
peoples' phone numbers.

39. Describe the TLS/SSL handshake process as initiated by a web client accessing ​a secure
website.

Graders Info :

Given the scenario of a browser accessing a secure Web site, the SSL/TLS handshake works as
follows

1. The browser, representing the client computer in this scenario, sends a client_hello message to
the Web server, which contains information about what level of security the browser is capable of
accepting and what type of encryption the browser can decipher. The client_hello message also
establishes a randomly generated number that uniquely identifies the client and another number
that identifies the SSL session.
2. The server responds with a server_hello message that confirms the information it received from
the browser and agrees to certain terms of encryption based on the options supplied by the
browser. Depending on the Web server' s preferred encryption method, the server may choose to
issue to the browser a public key or a digital certificate.
3. If the server requests a certificate from the browser, the browser sends it. Any data the browser
sends to the server is encrypted using the server' s public key. Session keys used only for this one
session are also established.

40. Describe the three way handshake process as used by CHAP.​

Graders Info :

The handshake process used by CHAP is as follows:

1. challenge-The server sends the client a randomly generated string of characters.


2. response-The client adds its password to the challenge and encrypts the new string of characters.
It sends this new string of characters in a response to the server. Meanwhile, the server also
concatenates the user's password with the challenge and encrypts the new character string, using
the same encryption scheme the client used.
3. ​accept/reject-The server compares the encrypted string of characters it received from the client
with the encrypted string of characters it has generated. If the two match, it authenticates the
client. But if the two differ, it rejects the client's request for authentication.
41. How is GRE used by the PPP protocol?

Graders Info :

After PPTP establishes the VPN tunnel, GRE (Generic Routing Encapsulation), developed by Cisco, is
used to transmit PPP data frames through the tunnel. GRE encapsulates PPP frames to make them
take on the temporary identity of IP packets at Layer 3. To the WAN, messages look like
inconsequential IP traffic-the private information is masked inside a new layer of IP headers. But the
points at each end of the tunnel only see the original protocols that were safely wrapped inside the
GRE frame. Encapsulating alone does not provide security, though, so GRE is used in conjunction
with IPsec, an encryption protocol, to increase the security of the transmissions.​
Another random document with
no related content on Scribd:
Sackville, M. Selected poems. (N ’20)
Sandburg, C. Smoke and steel. (N ’20)
Sanger, W: C., jr. Verse. (S ’20)
Sarett, L. Many many moons. (My ’20)
Sassoon, S. Picture-show. (Je ’20)
Schauffler, R. H. White comrade. (F ’21)
Seiffert, M. A. Woman of thirty. (Mr ’20)
Seymour, W: K., ed. Miscellany of British
poetry. (Ap ’20)
Sieveking, L. deG. Dressing gowns and glue. (Je
’20)
Sitwell, O. Argonaut and Juggernaut. (Ap ’20)
Some British ballads. (F ’21)
Spring Rice, C. A. Poems. (Ja ’21)
Squire, J: C. Birds. (D ’20)
Still, J: Poems in captivity. (My ’20)
Swinburne, A. C: Selections. (D ’20)
Swinnerton, H. Passenger. (N ’20)
Teasdale, S. Flame and shadow. (D ’20)
Thompson, J: R. Poems. (Je ’20)
Thorley, W. C:, tr. and ed. Fleurs-de-lys. (Je ’20)
Trine, G. S. Dreams and voices. (Ja ’21)
Troubetzkoy, A. As the wind blew. (D ’20)
Turner, W. J. Dark wind. (Jl ’20)
Untermeyer, L:, ed. Modern American poetry.
(My ’20)
Untermeyer, L:, ed. Modern British poetry. (S
’20)
Untermeyer, L: New Adam. (N ’20)
Van Dyke, T. Songs of seeking and finding. (D
’20)
Vansittart, R. G. Singing caravan. (Ap ’20)
Vernède, R. E. War poems. (N ’20)
Waley, A., comp. Japanese poetry. (N ’20)
Walsh, T: Don Folquet, and other poems. (O
’20)
Walsh, T:, ed. Hispanic anthology. (D ’20)
Walters, L. D’O. Anthology of recent poetry, (D
’20)
Welles, W. Hesitant heart. (My ’20)
Wells, C., comp. Book of humorous verse. (Ja
’21)
Widdemer, M. Haunted hour. (Ap ’20)
Wilkinson, M. O. Bluestone. (O ’20)
Wilson, C. C. Fir trees and fireflies. (F ’21)
Wilson, T. P. C. Waste paper philosophy. (F ’21)
Wood, C. Jehovah. (S ’20)
Woodberry, G: E: Roamer, and other poems. (Je
’20)
Young, F. B. Poems, 1916–1918. (S ’20)
Poems by a little girl. Conkling, H. (Je ’20)
Poems in captivity. Still, J: (My ’20)
Poetry
Aiken, C. P. Scepticisms. (Ag ’20)
Erskine, J: Kinds of poetry. (S ’20)
Gayley, C: M., and Kurtz, B: P. Methods and
materials of literary criticism. (S ’20)
Perry, B. Study of poetry. (Ag ’20)
Poetry of John Dryden. Van Doren, M. (Ja ’21)
Poetry of the people. Gayley, C: M., and Flaherty,
M. C:, comps. (S ’20)
Poets, English
Moore, S. Some soldier poets. (Ag ’20)
Poets in the nursery. Powell, C: (D ’20)
Points of friction. Repplier, A. (N ’20)
Poland
Boswell, A. B. Poland and the Poles. (Ap ’20)
Goodhart, A. L. Poland and the minority races.
(D ’20)
Waliszewski, K. Poland the unknown. (S ’20)
Police
Fosdick, R. B. American police systems. (Ja ’21)
Woods, A. Policeman and public. (Ap ’20)
Policeman and public. Woods A. (Ap ’20)
Polish fairy tales. Glinski, A. J. (F ’21)
Political science
Bigelow, M. M. Papers on the legal history of
government. (Ap ’20)
Jones, H: Principles of citizenship. (D ’20)
Laski, H. J. Political thought in England from
Locke to Bentham. (S ’20)
Peterson. S: Democracy and government. (Mr
’20)
Storey, M. Problems of today. (N ’20)
Political systems in transition. Fenwick, C: G. (D
’20)
Political thought in England from Locke to
Bentham. Laski, H. J. (S ’20)
Politics
McCabe, J. Taint in politics. (O ’20)
Pollyooly dances. Jepson, E. (Ag ’20)
Pool of stars. Meigs, C. (My ’20)
Poor dear Theodora! Irwin, F. (My ’20)
Poor man’s rock. Sinclair, B. W: (D ’20)
Poor relations. Mackenzie, C. (Mr ’20)
Poor white. Anderson, S. (D ’20)
Poor wise man. Rinehart, M. (D ’20)
Popular chemical dictionary. Kingzett, C: T: (Ag
’20)
Porcelain
Lewer, H. W: China collector. (My ’10)
Pork-production. Smith, W: W. (S ’20)
Port Allington stories. Vernède, R. E. (N ’20)
Port of New York. Rush, T. E: (Jl ’20)
Portraits
Fletcher, C: R. L. Historical portraits, 1700–
1850. (D ’20)
Portraits of the eighties. Hutchinson, H. G. (S ’20)
Portygee. Lincoln, J. C. (Je ’20)
Position of the laborer in a system of nationalism.
Furniss, E. S. (N ’20)
Potterism. Macaulay, R. (D ’20)
Pottery
Rhead, G: W. Earthenware collector. (My ’20)
Power of a god, and other one-act plays. Guild, T.
H. (My ’20)
Power of a lie. Bojer, J. (Jl ’20)
Power of prayer. Paterson. W: P., and Russell, D:,
eds. (F ’21)
Practical fly fishing. St John, L. (Je ’20)
Practical hints on playwriting. Platt, A. (N ’20)
Practical illustration. Whiting, J: D. (Ja ’21)
Practical views on psychic phenomena. Wright, G:
E. (Ag ’20)
Practice and theory of Bolshevism. Eng title of
Bolshevism. Russell, B. A. W: (Ja ’21)
Prairie mother. Stringer, A. J: A. (N ’20)
Prairie-schooner princess. Maule, M. K. (N ’20)
Pratt, Mrs Harry Rogers. See Rothery, A. E.
Prayer
Crane, A. M. Ask and receive. (F ’21)
Paterson, W: P., and Russell, D:, eds. Power of
prayer. (F ’21)
Preaching
Donnelly, F. P. Art of interesting. (N ’20)
Fitch, A. P. Preaching and paganism. (F ’21)
Preaching and paganism. Fitch, A. P. (F ’21)
Precepts and judgments. Foch, F. (O ’20)
Prejudices. Mencken, H: L: (Ja ’21)
Present and past banking in Mexico. McCaleb, W.
F. (Ap ’20)
Present day Paris and the battlefields. Story, A. M.
S. (N ’20)
Presenting Jane McRae. Luther, M. L. (S ’20)
Presidents (United States)
Dunn, A. W. How presidents are made. (Je ’20)
Presidents and pies. Anderson, I. W. (Je ’20)
Preventive man. McFadden, G. V. (Jl ’20)
Prices
Academy of political science. Inflation and high
prices. (F ’21)
Friday, D: Profits, wages, and prices. (N ’20)
McPherson, L. G. Flow of value. (My ’20)
Murchison, C. T. Resale price maintenance. (My
’20)
Prime minister. Spender, H. (Ag ’20)
Primitive society. Lowie, R. H. (Ag ’20)
Principles of accounting. Hodge, A. C., and
McKinsey, J. O. (D ’20)
Principles of æsthetics. Parker, D. H: (D ’20)
Principles of citizenship. Jones, H: (D ’20)
Principles of education. Coursault, J. H. (D ’20)
Principles of electric spark ignition in internal
combustion engines. Morgan, J: D: (D ’20)
Principles of sociology. Ross, E: A. (S ’20)
Principles of sociology with educational
applications. Clow, F: R. (S ’20)
Principles of war. Foch, F. (O ’20)
Prisoner of Pentonville. (Jl ’20)
Prisoner of Trotsky’s. Kalpaschnikoff, A. (Ag ’20)
Prize stories 1919. O. Henry memorial award. (Jl
’20)
Problem of nervous breakdown. Ash, E. L. (Ag
’20)
Problem of the nervous child. Evans, E. (My ’20)
Problems in business law. Moore, J. H., and
Houston, C: A. (Ag ’20)
Problems in foreign exchange. Shugrue, M. J. (F
’21)
Problems of law. Wigmore, J: H: (D ’20)
Problems of today. Storey, M. (N ’20)
Proceedings of the international conference of
women physicians. (Ja ’21)
Professor’s love-life. Maldclewith, R., pseud. (Ap
’20)
Profits, wages, and prices. Friday, D: (N ’20)
Prohibition
McKenzie, F: A. Pussyfoot Johnson. (O ’20)
Project method in education. Branon, M. E. (My
’20)
Project work in education. Stockton, J. L. (O ’20)
Prologue. Duganne, P. (N ’20)
Prometheus. Pérez de Ayala, R. (D ’20)
Proofs of the spirit world. Chevreuil, L. (S ’20)
Proofs of the truths of spiritualism. Henslow, G:
(Mr ’20)
Prophet of Joy. Bradford, G. (O ’20)
Proportional form. Colman, S:, and Coan, C. A. (Je
’20)
Prospecting
Cornell, F. C. Glamour of prospecting. (F ’21)
Prospecting for oil and gas. Panyity. L: S. (F ’21)
Proverbs
Guiterman, A. Chips of jade. (F ’21)
Psychical miscellanea. Hill, J: A. (Je ’20)
Psychical research
Carrington, H. Higher psychical development.
(N ’20)
Dresser, H. W. Open vision. (Je ’20)
Hill, J: A. Psychical miscellanea. (Je ’20)
Holt, H: Cosmic relations and immortality. (D
’20)
Magnussen, J. God’s smile. (N ’20)
Myers, F: W: H: Human personality and its
survival of bodily death. (Ag ’20)
Wright, G: E. Practical views on psychic
phenomena. (Ag ’20)
Psychoanalysis
Coriat, I. H: Repressed emotions. (F ’21)
Freud, S. General introduction to
psychoanalysis. (N ’20)
Lay, W. Man’s unconscious passion. (F ’21)
Low, B. Psycho-analysis. (Jl ’20)
O’Higgins, H. J. Secret springs. (D ’20)
Swisher, W. S: Religion and the new
psychology. (D ’20)
Tridon, A. Psychoanalysis. (Ap ’20)
Tridon, A. Psychoanalysis and behavior. (N ’20)
Psychology
Constable, F. C. Myself and dreams. (Ap ’20)
Edman, I. Human traits and their social
significance. (N ’20)
McKim, W: D. Study for the times. (Ja ’21)
Tansley, A. G: New psychology and its relation
to life. (O ’20)
Warren, H. C. Human psychology. (Jl ’20)
Watson, J: B. Psychology from the standpoint of
a behaviorist. (Ag ’20)
Psychology, Educational
Edwards, A. S. Fundamental principles of
learning and study. (F ’21)
Strong, E: K., jr. Introductory psychology for
teachers. (D ’20)
Psychology, Pathological
Hollingworth, H. L. Psychology of functional
neuroses. (D ’20)
Mackay, W: M. Disease and remedy of sin. (F
’21)
Psychology from the standpoint of a behaviorist.
Watson, J: B. (Ag ’20)
Psychology of dreams. Walsh, W: S. (Jl ’20)
Psychology of functional neuroses. Hollingworth,
H. L. (D ’20)
Psychology of nationality and internationalism.
Pillsbury, W. B. (Ag ’20)
Psychology of nations. Partridge, G: E. (My ’20)
Psychology of social reconstruction. Patrick, G: T:
W. (D ’20)
Public health
Hill, H. W. Sanitation for public health nurses.
(F ’21)
Newsholme, A. Public health and insurance. (Ja
’21)
Public health and insurance. Newsholme, A. (Ja
’21)
Public opinion
Lippmann, W. Liberty and the news. (Ap ’20)
Public school orchestras and bands. Woods, G. H.
(Je ’20)
Public speaking
Burton, A. Public speaking made easy. (N ’20)
Donnelly, F. P. Art of interesting. (N ’20)
Kleiser, G. Pocket guides to public speaking.
(My ’20)
Stratton, C. Public speaking. (O ’20)
Publicity
Routzahn, M. B. Traveling publicity campaigns.
(F ’21)
Pumpelly, Raphael. 1837–
Pumpelly, R. Travels and adventures of Raphael
Pumpelly. (F ’21)
Puppet-plays
Joseph, H. H. Book of marionettes. (Jl ’20)
Puritan and pagan. Corbett, E. F. (Ja ’21)
Puritans
Flynn, J: S. Influence of Puritanism on the
political and religious thought of the English.
(F ’21)
Purple heights. Oemler, M. (N ’20)
Pussyfoot Johnson. McKenzie, F: A. (O ’20)
Putnam’s handbook of buying and selling. Collins,
A. F: and V. D. (Je ’20)
Pyeshkoff, Alexei Maximovich. See Gorki, M.,
pseud.

Q., pseud. See Quiller-Couch, Sir A. T:


Quaker singer’s recollections. Bispham, D: S. (Ap
’20)
Quakerism
Graham, J: W: Faith of a Quaker. (D ’20)
Quarries and quarrying
Howe, J. A. Stones and quarries. (Ja ’21)
“Queen Lucia.” Benson, E: F: (S ’20)
Quest of the Indies. Dark, R: (D ’20)
Quirt. Bower, B. M., pseud. (Jl ’20)

Rabbits
Sherlock, C. C. Care and management of
rabbits. (O ’20)
Race and nationality. Oakesmith, J: (Mr ’20)
Race problems
Stoddard, L. Rising tide of color against white
world-supremacy. (Jl ’20)
Rachel comforted. Maturin, E. (D ’20)
Rachel Fitzpatrick. Poore, I. M. (S ’20)
Radford, William, 1809–1890
Meissner, S. de. Old naval days. (Ja ’21)
Ragged inlet guards. Wallace, D. (Mr ’20)
Railroad builders. Moody, J: (D ’20)
Railroads
United States
Bradley, G. D. Story of the Santa Fe. (Jl ’20)
Dozier, H. D. History of the Atlantic coast line
railroad. (Je ’20)
Moody, J: Railroad builders. (D ’20)
Rain before seven. Leadbitter, E. (Jl ’20)
Rainbow gold. Evison, M. (N ’20)
Rapids. Sullivan, A. (S ’20)
Raspberry jam. Wells, C. (Ap ’20)
Rather like.... Castier, J. (Ag ’20)
Raymond Robins’ own story. Hard, W: (Mr ’20)
Readers
Pritchard, M. T:, and Ovington M. W., comps.
Upward path. (O ’20)
Readers, Geographical
Babson, R. W. Central American journey. (My
’20)
Readers, Supplementary
Fairbanks, H. W. Conservation reader. (Jl ’20)
Readings in the history of education. Cubberley,
E. P. (F ’21)
Real democracy in operation. Bonjour, F. (Jl ’20)
Real diary of the worst farmer. Shute, H: A: (Je
’20)
Realism
McDowall, A. S. Realism. (D ’20)
Realities of war. Eng title of Now it can be told.
Gibbs, P. H. (My ’20)
Reasonable revolution. Pickard, B. (My ’20)
Rebels. Ganz, M., and Ferber, N. J. (Ap ’20)
Rebirth of Korea. Cynn, H. H. (Ja ’21)
Rebuilding Europe in the face of world-wide
bolshevism. Hillis, N. D. (Jl ’20)
Recent developments in European thought.
Marvin, F. S., ed. (D ’20)
Recollections
Aldrich, L. Crowding memories. (N ’20)
Allison, W: My kingdom for a horse! (D ’20)
Armstrong, M. Day before yesterday. (S ’20)
Asquith, M. Margot Asquith, an autobiography.
(D ’20)
Aston, G: G. Memories of a marine. (D ’20)
Bispham, D: S. Quaker singer’s recollections.
(Ap ’20)
Bliss, D. Reminiscences of Daniel Bliss. (D ’20)
Clark, C. My quarter century of American
politics. (Ap ’20)
Fortescue, S. J: Looking back. (D ’20)
Hamilton, F: S. Vanished pomps of yesterday.
(Jl ’20)
Huneker, J. G. Steeplejack. (N ’20)
Jonescu, T. Some personal impressions. (Mr
’20)
Livermore, T: L. Days and events. (Mr ’20)
Lucy, H: W: Diary of a Journalist. (F ’21)
Mackenzie, J. K. Story of a fortunate youth. (F
’21)
Mallock, W: H. Memoirs of life and literature.
(O ’20)
Massenet, J. E. F. My recollections. (My ’20)
Meissner, S. de. Old naval days. (Ja ’21)
Millais, J: G. Sportsman’s wanderings. (Mr ’20)
Money, W. B. Humours of a parish, and other
quaintnesses. (O ’20)
Nekliudov, A. V. Diplomatic reminiscences
before and during the world war, 1911–1917.
(F ’21)
Peel, G. A. Recollections. (S ’20)
Ritchie, A. I. From friend to friend. (Je ’20)
Scott, P. M. Fifty years in the royal navy. (Ap
’20)
Sully, J. My life and friends. (Ja ’21)
Reconstruction (European war)
Bass, J: F. Peace tangle. (D ’20)
Dilnot, F. England after the war. (N ’20)
Hillis, N. D. Rebuilding Europe in the face of
world-wide bolshevism. (Jl ’20)
Hobson, J: A. Morals of economic
internationalism. (Ja ’21)
Zilboorg, G. Passing of the old order in Europe.
(D ’20)
United States
Crowder, E. H. Spirit of selective service. (My
’20)
Fenwick, C: G. Political systems in transition.
(D ’20)
Reconstruction in philosophy. Dewey, J: (N ’20)
Recreation
Grey, E; G. Recreation. (My ’20)
Recreations of a psychologist. Hall, G. S. (Ja ’21)
Red belts. Pendexter, H. (Mr ’20)
Red cross
Bakewell, C: M. Story of the American Red cross
in Italy. (D ’20)
Fife. G: B. Passing legions. (Ja ’21)
Hungerford, E: With the doughboy in France. (F
’21)
Red lady. Burt, K. (Je ’20)
Red seal. Lincoln, N. S. (Je ’20)
Red terror and green. Dawson, R: (Je ’20)
Reddy Brant. Tuttle, W. C. (O ’20)
Redmond, John, 1851–1918
Gwynn, S. L. John Redmond’s last years. (Ap
’20)
Refugee rock. Holland, R. S. (N ’20)
Reign of Patti. Klein, H. (N ’20)
Relation of the judiciary to the constitution.
Meigs, W: M. (O ’20)
Relativity (physics)
Einstein, A. Relativity. (N ’20)
Freundlich, E. Foundations of Einstein’s theory
of gravitation. (F ’21)
Harrow, B: From Newton to Einstein. (Jl ’20)
Lorentz, H. A. Einstein theory of relativity. (D
’20)
Slosson, E. E. Easy lessons in Einstein. (Je ’20)
Release of the soul. Cannan, G. (Ag ’20)
Religion
Dodwell, C. E. W. Righteousness versus
religion. (D ’20)
Dole, C: F. Religion for the new day. (F ’21)
Pratt, J. B. Religious consciousness. (D ’20)
Schleiter, F: Religion and culture. (Ag ’20)
Walsh, J. J. Religion and health. (F ’21)
Webb, C. C: J. Divine personality and human
life. (N ’20)
History
Cooke, G: W. Social evolution of religion. (S
’20)
Religion among American men. Committee on the
war and the religious outlook. (Je ’20)
Religion and health. Walsh, J. J. (F ’21)
Religion and the new psychology. Swisher, W. S:
(D ’20)
Religion for the new day. Dole, C: F. (F ’21)
Religion of the spirit world. Henslow, G: (N ’20)
Religions
Carpenter, E: Pagan & Christian creeds. (Ap
’20)
Religious consciousness. Pratt, J. B. (D ’20)
Religious education
Athearn, W. S. National system of education. (Jl
’20)
Blachly, C. D. Treatment of the problem of
capital and labor in social-study courses in
the churches. (D ’20)
Graves, F. P. What did Jesus teach? (Je ’20)
Grossmann, L: Aims of teaching in Jewish
schools. (Ap ’20)

You might also like