Ch. 12 Questions
19.) Which of the following are stand-alone daemons? (choose all that apply)
A. Apache D. DNS
7.) Which file holds the methods to be used and the order in which they will be applied for host name resolution?
A. /etc/nsswitch.conf
20.) Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (choose all that apply.)
A. ifconfig D. netstat -i C. ping
17.) Which file would you modify to permanently change the TCP/IP address of the first NIC on a Fedora 20 system?
B. /etc/sysconfig/network-scripts/ifcfg-eth0
1.) A subnet Mask is used to differentiate the host portion from the network portion in a TCP/IP address. True or False?
TRUE
14.) The line that configures the host name for the computer at boot time can be found in /etc/hostname? True or False?
True
5.) To test DNS configuration by resolving a host name to an IP address, which command or commands can you use?
A. nslookcup hostname B. dig hostname
6.) Which two commands can be used to modify the route table on a Linux computer?
A. route C. ip
10.) What devices are used to transfer information from one network to another?
A. routers
8.)What are two means available to resolve a host name to the appropriate TCP/IP address?
B. DNS C. /etc/hosts
12.) The daemons associated with network services listen for network traffic associated with a particular___.
B. Port
2.) Which Windows program is often used to connect to a Linux server via SSH?
B. Putty
15.) Which command would be used to activate the NIC aliased as eth0?
B. ifup eth0
11.) Which of the following are graphical remote administration technologies? (choose all that apply)
B. ssh -X D. VNC
18.) Before a computer can use a router, with what configuration information must it be provided?
C. default gateway
4.) Which file stores the TCP/IP addresses of the DNS servers used to resolve host names if no DNS servers are specifie within the network configuration file for the NIC?
D. /etc/resolv.conf
16.) which of the following port numbers is associated with telnet?
D. 23
13.) The TCP/IP address of 127.0.0.1 is also referred to as the _____
D. loopback address
3.) Stand-Alone daemons are started on demand using inetd or xinetd. True or False?
FALSE
9.) SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?
True