Review Module 12

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which file holds the methods to be used and the order in which they will be applied for host name resolution?

/etc/nsswitch.conf

Which file would you modify to permanently change the IP address of a network interface on a Fedora 28 system?

/etc/sysconfig/network-scripts/ifcfg-enp8s0

Which of the following port numbers is associated with SSH?

22

Which of the following are stand-alone daemons? (Choose all that apply.)

Apache (httpd) DNS (named)

What are two means available to resolve a host name to the appropriate IP address? (Choose two answers.)

DNS /etc/hosts

The NetworkManager or Systemd-networkd components must be installed on a Linux system in order to configure an IP address on a network interface. True or False?

False

Which Windows program is often used to connect to a Linux server via SSH?

Putty

Before a computer can use a router, what configuration information must it be provided?

default router

Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)

ifconfig iwconfig ping nmcli

The IP address of 127.0.0.1 is also referred to as the _____.

loopback address

Which commands can be used to display TCP/IP connections on your Linux system? (Choose all that apply.)

mtr

The daemons associated with network services listen for network traffic associated with a particular _____.

port

Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.)

route ip

Which of the following can be used to provide graphical remote administration? (Choose all that apply.)

ssh -X VNC

Which file stores the IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the network interface?

/etc/resolv.conf

Standalone daemons are started on demand using xinetd. True or False?

False

To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.)

nslookup hostname dig hostname host hostname

You want to generate SSH keys for your user account and copy them to a remote computer to simplify future SSH authentication. What two commands can you use to perform these actions? (Choose two answers.)

ssh-keygen ssh-copy-id

SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

True

The line that configures the host name for the computer at boot time can be found in /etc/hostname. True or False?

True


Ensembles d'études connexes

Basics of Coordinate Systems and Map Projections

View Set

AP History Chapter 16 MindTap Exercises 16.8-16.13

View Set

CH 9: Starting Out With C++ CHECKPOINT QUESTIONS

View Set

D. Hays: Assessment in Counseling, CH 9

View Set

Business Mathematics - Chapter 13

View Set

Lecture 10 - Hospital-acquired and community acquired infections

View Set

Ch 13: Palliative and End-of-Life Care

View Set