CHAPTER 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

ping -c 4 server1

Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel?

22

Which of the following port numbers is associated with SSH?

53

Which of the following ports would be used to resolve a domain name to an IP address?

stand-alone daemon

A daemon that is started without the use of xinetd.

netowrk conenctions tool

A graphical NetworkManager utility that can be used to configure additional network interfaces and related technologies, such as DSL.

netowrk service

A process that responds to network requests.

teredo

A protocol used to encapsulate IPv6 packets within an IPv4 network.

network manager

A software component that manages the configuration of network interfaces.

xinetd

Extended Internet Super Daemon (xinetd) A network daemon that is used to start other network daemons on demand.

PPP

Point-to-Point Protocol (PPP) The most common WAN protocol used to send TCP/IP packets across a telephone line.

traceroute6 command

Used to trace the path an IPv6 packet takes through routers to a destination host.

systctl command

Used to view and modify files stored under /proc/sys.

known_hosts

When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint for the target computer which is stored in ___________ in the ~/.ssh/ directory.

netstat --udp netstat -u

Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.)

/etc/hostname

Which of the following files does the hostnamectl command modify to set the hostname on a machine?

files

Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address?

/etc/nsswitch.conf

You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before falling back to the /etc/hosts file. Which of the following files should you modify to make this possible?

UDP

You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of?

ssh-keygen ssh-copy-id

You want to generate SSH keys for your user account and copy them to a remote computer to simplify future SSH authentication. What two commands can you use to perform these actions? (Choose two answers.)

CIDR

classless interdomain routing (CIDR) notation A notation that is often used to represent an IP address and its subnet mask.

host command

used to reslove host name to ip address

modern manger utility

y A graphical utility that can be used to configure modem settings on Linux system

pppoeconf command

Used to configure a DSL connection on Ubuntu systems.

ethtool command

Used to configure and display NIC hardware settings.

VNC viewer

A program used to connect to a VNC server and obtain a graphical desktop.

bridging

The process of merging two separate networks using the NICs on a server.

PPPoE

The protocol used by DSL to send PPP information over an Ethernet connection.

netplan

The software component that configures NICs on modern Ubuntu systems

ifup eth0

The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up?

/27

Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed?

hostnamectl command

Used to change the host name of a computer as well as ensure that the new host name is loaded at boot time.

ppoe-setup command

Used to configure a DSL connection on Fedora systems.

ncat command

ncat (net cat) command A network testing utility. It is often used to test the functionality of services on the network.

ping6

ping6 command Used to check connectivity on an IPv6 network.

proxy server

r A server or hardware device that requests Internet resources on behalf of other computers.

dig command

resolve ip to host name

ss command

ss (socket statistics) command Used to display network connections.

ifocnfig command

ifconfig (interface configuration) command Used to display and modify the IP configuration information for a network interface.

network utility

A graphical utility in Fedora 28 that can be used to configure settings for the network interfaces on the system.

ssh-copy-id command

Used to copy SSH user keys to the home directory of a user on another computer to allow for simplified authentication.

nmcli command

Used to display and configure network interfaces using NetworkManager

networkctl command

Used to display and configure network interfaces using Systemdnetworkd.

netstat command

Used to display network information and active connections.

ssh-keygen command

Used to generate or regenerate SSH encryption keys.

route command

Used to manipulate the route table

dhclient command

Used to obtain IP configuration for a network interface from a DHCP or BOOTP server on the network.

telnet command

Used to obtain a shell on a remote computer running a Telnet daemon.

whois command

Used to obtain information about the organization that maintains a DNS domain

ip command

Used to perform a wide variety of IP management tasks on a Linux system, such as viewing and manipulating the route table. It is part of the optional iproute2 package.

nslookup command

Used to resolve host names to IP addresses

vncpasswd command

Used to set a VNC connection password for a user

iwconfig command

Used to set and display the configuration of wireless network interfaces.

nmtui command

Used to start a text version of the Network Connections tool that is part of NetworkManager.

ssh-agent command

Used to start the SSH agent process.

vncserver command

Used to start the VNC server process for a user.

nm-connection-editor command

Used to start the graphical Network Connections tool that is part of NetworkManager.

mtr command

Used to trace the path an IPv4 or IPv6 packet takes through routers to a destination host.

tracepath command

Used to trace the path an IPv4 packet takes through routers to a destination host.

traceroute command

Used to trace the path an IPv4 packet takes through routers to a destination host.

tracepath6 command

Used to trace the path an IPv6 packet takes through routers to a destination host

VNC

Virtual Network Computing (VNC) A crossplatform technology that allows users to connect to a graphical desktop across a network.

DNS /etc/hosts

What are two means available to resolve a host name to the appropriate IP address? (Choose two answers.)

/etc/services

What is the complete path and filename of the file where ports and their associated protocols are defined? ___________

TCP/IP

What is the most commonly used LAN protocol?

Putty

Which Windows program is often used to connect to a Linux server via SSH?

netstat -t

Which commands can be used to display TCP/IP connections on your Linux system? (Choose all that apply.)

/etc/nsswitch.conf

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/resolv.conf

Which file stores the IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the network interface?

/etc/sysconfig/network-scripts/ifcfg-enp8s0

Which file would you modify to permanently change the IP address of a network interface on a Fedora 28 system?

Apache (httpd) DNS (named)

Which of the following are stand-alone daemons? (Choose all that apply.)

domain comptia.org nameserver 10.1.1.4

Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.)

VNC

Which of the following can be used to graphically remotely administer a Linux machine?

ssh -X VNC

Which of the following can be used to provide graphical remote administration? (Choose all that apply.)

ss

Which of the following commands can be used to display socket information out to the terminal screen?

traceroute6 tracepath6

Which of the following commands can be used to trace an IPv6 route? (Choose two.)

ethtool

Which of the following commands will display detailed information for network hardware?

VPN

Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN?

ifconfig iwconfig ping nmcli

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)

getent

Which of the following will display entries from the Name Service Switch libraries?

route

Which one of these commands can be used to modify the route table on a Linux computer?

YAML

YAML (YAML Ain't Markup Language) A data format based on JSON that is commonly used for configuration files.

systemd-networkd

A Systemd daemon that manages the configuration of network interfaces.

default gateway

Before a computer can use a router, what configuration information must it be provided?

nmcli

On a system running NetworkManager, which of the following commands can be used to view or modify connection information?

ssh-add command

Used to add SSH user keys to the SSH agent process.

RDMA

Remote Direct Memory Access (RDMA) A technology used to allow hardware devices to communicate directly with each other without accessing the CPU of the system. It is often used by network technologies such as Infiniband.

True

SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

False

Standalone daemons are started on demand using xinetd. True or False?

ssh command

Used to connect to a SSH daemon on a remote computer.

loopback address

The IP address of 127.0.0.1 is also referred to as the _____.

False

The NetworkManager or Systemd-networkd components must be installed on a Linux system in order to configure an IP address on a network interface. True or False?

ip forwarding

The act of forwarding TCP/IP packets from one network to another; see also routing

multihomed hosts

The computers that have more than one network interface.

port

The daemons associated with network services listen for network traffic associated with a particular _____.

True

The line that configures the host name for the computer at boot time can be found in /etc/hostname. True or False?

network id

The portion of an IP address that denotes the network.

ANDIng

The process by which binary bits are compared to calculate the network and host IDs from an IP address and subnet mask.

bonding

The process of combining two NICs on the same network to provide fault tolerance or

nslookup hostname dig hostname host hostname

To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.)

zebra command

zebra command Used to configure routing protocols, such as RIP and OSPF, on a Linux system. It is part of the optional Quagga package.


Ensembles d'études connexes

FA 7 - Forecasting and Valuation

View Set

Lecture: What attracts us to another person?

View Set

Chapter 36: Introduction to the Nervous System

View Set

CMA ELECTROCARDIOGRAPHY Lesson 6

View Set