Chapter 12

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the complete path and filename of the file where ports and their associated protocols are defined?

/etc/services

Stand-alone daemons are started on demand using xinetd. True or False?

False

Which of the following files does the hostnamectl command modify to set the hostname on a machine? a. /etc/hostname b. /etc/host.conf c. /etc/hosts.conf d. /etc/hostname.conf

a. /etc/hostname

Which commands can be used to display TCP/IP connections on your Linux system? (Choose all that apply.) a. netstat -t b. mtr c. traceroute show d. ss -t

a. netstat -t d. ss -t

Which of the following is a valid APIPA address? a. 127.0.0.1 b. 169.254.38.101 c. 10.11.12.13 d. 192.168.1.17

b. 169.254.38.101

Which Windows program is often used to connect to a Linux server via SSH? a. SSHD b. Putty c. Rdesktop d. mstsc

b. Putty

When connecting to a host via SSH for the first time, the user is prompted to accept the encryption fingerprint for the target computer which is stored in [blank] in the ~/.ssh/ directory.

known_hosts

The NetworkManager or Systemd-networkd components must be installed on a Linux system in order to configure an IP address on a network interface. True or False?

False

Which file holds the methods to be used and the order in which they will be applied for host name resolution? a. /etc/nsswitch.conf b. /etc/resolve.conf c. /etc/hosts d. /etc/dns.conf

a. /etc/nsswitch.conf

The daemons associated with network services listen for network traffic associated with a particular [blank]. a. station b. port c. IP address d. allocation number

b. port

Which of the following commands can be used to display socket information out to the terminal screen? a. opensocks b. ss c. woolsocks d. sstat

b. ss

Which of the following can be used to provide graphical remote administration? (Choose all that apply.) a. telnet b. ssh -X c. ssh d. VNC

b. ssh -X d. VNC

Upon running the ifconfig command, the IP address is listed along with the subnet mask in dotted decimal notation listed as 255.255.255.224. You have installed a remote access software that has an address field that requires the address to be configured in CIDR notation. Which of the following is the equivalent CIDR notation for the subnet mask listed? a. /23 b. /24 c. /27 d. /28

c. /27

Which of the following will display entries from the Name Service Switch libraries? a. nsslist b. nss c. getent d.dispdet

c. getent

Which of the following commands will send 4 ICMP echo requests to a remote host named server1 to determine the round trip time it takes a packet to travel? a. ping -4 server1 b. ping server1 c. ping -c 4 server1 d. ping -n 4 server1

c. ping -c 4 server1

What is the most commonly used LAN protocol? a. UDP/IP b. IPX/SPX c. TCP/IP d. DLC

c. TCP/IP

SSH encrypts all traffic that passes across the network, whereas telnet does not. True or False?

True

The line that configures the host name for the computer at boot time can be found in /etc/hostname. True or False?

True

Which of the following commands can be used to trace an IPv6 route? (Choose two.) a. trace6 b. traceroute6 c. tracert6 d. tracepath6

b. traceroute6 d. tracepath6

The output of the ifconfig shows a HWaddr expressed in hexadecimal. How many bits is the hardware address shown made up of? a. 8 b. 32 c. 48 d. 128

c. 48

Which file stores the IP addresses of the DNS servers used to resolve host names if no DNS servers are specified within the network configuration file for the network interface? a. /etc/hosts b. /etc/host.conf c. /etc/resolve d. /etc/resolv.conf

d. /etc/resolv.conf

4. Which of the following commands will display detailed information for network hardware? a. lsnet b. hwdisp --network c. lshw --net d. ethtool

d. ethtool

The IP address of 127.0.0.1 is also referred to as the [blank]. a. local address b. lookup address c. local host d. loopback address

d. loopback address

On a system running Network Manager, which of the following commands can be used to view or modify connection information? a. netman b. nm c. netctonf d. nmcli

d. nmcli

You have set up a TFTP server to support PXE booting of several workstations. Which of the following protocols would this setup make use of? a. TCP b. UDP c. ICMP d. IGMP

b. UDP

Which of the following ports would be used to resolve a domain name to an IP address? a. 443 b. 23 c. 53 d. 69

c. 53

Which of the following can be used to graphically remotely administer a Linux machine? a. RDP b. Telnet c. FTP d. VNC

d. VNC

Which file would you modify to permanently change the IP address of a network interface on a Fedora 28 system? a. /etc/sysconfig/network-scripts/ifcfg-enp8s0 b. /etc/sysconfig/network c. /etc/netplan/50-cloud-init.yaml d. /etc/network/interfaces

a. /etc/sysconfig/network-scripts/ifcfg-enp8s0

Which of the following port numbers is associated with SSH? a. 22 b. 137 c. 49 d. 23

a. 22

Which of the following are stand-alone daemons? (Choose all that apply.) a. Apache (httpd) b. Washington University FTP (in.ftpd) c. telnet (in.telnetd) d. DNS (named)

a. Apache (httpd) d. DNS (named)

Which of the following are valid statements in the /etc/resolv.conf file? (Choose two.) a. domain comptia.org b. order hosts, bind c. 10.1.15.60 server10 d. nameserver 10.1.1.4

a. domain comptia.org d. nameserver 10.1.1.4

Which of the following utilities can be used to check IP configuration and test network connectivity? (Choose all that apply.) a. ifconfig b. iwconfig c. ping d. nmcli

a. ifconfig b. iwconfig c. ping d. nmcli

Which of the following commands will show active UDP connections on a Linux system? (Choose all that apply.) a. netstat -u b. netstat --udp c. netstat -t udp d. netstat udp

a. netstat -u b. netstat --udp

To test DNS configuration by resolving a host name to an IP address, which command or commands can you use? (Choose all that apply.) a. nslookup hostname b. dig hostname c. host hostname d. resolve hostname

a. nslookup hostname b. dig hostname c. host hostname

Which two commands can be used to modify the route table on a Linux computer? (Choose two answers.) a. route b. ipconfig c. ip d. traceroute

a. route c. ip

You want to generate SSH keys for your user account and copy them to a remote computer to simplify future SSH authentication. What two commands can you use to perform these actions? (Choose two answers.) a. ssh-keygen b. ssh-add c. ssh-copy-id d. ssh-agent

a. ssh-keygen c. ssh-copy-id

You currently have a Linux system configured to check the /etc/hosts file before trying to contact a DNS server to resolve host names. You want to reverse the configuration so that it checks with a DNS server before falling back to the /etc/hosts file. Which of the following files should you modify to make this possible? a. /etc/hosts b. /etc/nsswitch.conf c. /etc/resolv.conf d. /etc/named.conf

b. /etc/nsswitch.conf

What are two means available to resolve a host name to the appropriate IP address? (Choose two answers.) a. DHCP b. DNS c. /etc/hosts d. /etc/resolve.conf

b. DNS c. /etc/hosts

Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN? a. ADSL b. VPN c. NTP d. VLAN

b. VPN

Which of the following is the keyword that should be listed after the hosts statement in the /etc/nsswitch.conf file so that the system will consult the /etc/hosts file to resolve a name to an IP address? a. local b. files c. hosts d. etchosts

b. files

The system administrator has shut ethernet interface eth0 down while making some changes to the system. Which of the following commands can they use to bring the network connection back up? a. netctl eth0 up b. ifup eth0 c. int eth0 up d. interface eth0 --status up

b. ifup eth0

Before a computer can use a router, with what configuration information must it be provided? a. routing table b. subnet mask c. default gateway d. default router

c. default gateway

You run the command hostname server1 and issue the reboot command. You notice that the host name has reverted back to what it was before the reboot. Which of the following commands should you have used to change the host name instead? a. ifconfig server1 b. host server1 c. hostnamectl set-hostname server1 d. set hostname="server1"

c. hostnamectl set-hostname server1


संबंधित स्टडी सेट्स

Ch. 14 - GA Life & Health State Laws

View Set

W4: sensory and short term memory

View Set

LOS 13: Currency Exchange Rates - Determination and Forecasting

View Set

CH 14 (THE BRAIN AND CRANIAL NERVES)

View Set