Exam 12: Network Configuration
Exam 1: Introduction to Linux50 Questions
Exam 2: Linux Installation and Usage50 Questions
Exam 3: Exploring Linux Filesystems50 Questions
Exam 4: Linux Filesystem Management50 Questions
Exam 5: Linux Filesystem Administration50 Questions
Exam 6: Linux Server Deployment50 Questions
Exam 7: Working With the Bash Shell50 Questions
Exam 8: System Initialization and X Windows50 Questions
Exam 9: Managing Linux Processes50 Questions
Exam 10: Common Administrative Tasks50 Questions
Exam 11: Compression, System Backup, and Software Installation50 Questions
Exam 12: Network Configuration50 Questions
Exam 13: Configuring Network Services50 Questions
Exam 14: Troubleshooting, Performance, and Security50 Questions
Select questions type
Match each term with the correct statement below.
a.broadcast
b.classless interdomain routing (CIDR) notation
c.host name
d.Internet Protocol (IP) address
e.IP version 4 (IPv4)
f.link local
g.multicast
h.octet
i.protocol
j.route table
-A notation that is often used to represent an IP address and its subnet mask.
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
b
Match each term with the correct statement below.
a.broadcast
b.classless interdomain routing (CIDR) notation
c.host name
d.Internet Protocol (IP) address
e.IP version 4 (IPv4)
f.link local
g.multicast
h.octet
i.protocol
j.route table
-The TCP/IP communication destined for all computers on a network.
Free
(Short Answer)
4.8/5
(28)
Correct Answer:
a
In order to enable IP routing on Linux at boot, what setting must be configured in /etc/sysctl.conf?
Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
B
A Class A network uses how many bits for the network ID, and how many bits for the host ID?
(Multiple Choice)
5.0/5
(29)
Select the command that can be used to send a small TCP/IP packet to another IP address and await a response:
(Multiple Choice)
4.8/5
(31)
You can view or set the host name for a Linux computer using the ____________________ command.
(Short Answer)
4.8/5
(28)
Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?
(Essay)
4.8/5
(35)
Match each term with the correct statement below.
a.broadcast
b.classless interdomain routing (CIDR) notation
c.host name
d.Internet Protocol (IP) address
e.IP version 4 (IPv4)
f.link local
g.multicast
h.octet
i.protocol
j.route table
-The most common version of IP used on the Internet. It uses a 32-bit addressing scheme organized into different classes
(Short Answer)
4.9/5
(33)
Match each term with the correct statement below.
a.broadcast
b.classless interdomain routing (CIDR) notation
c.host name
d.Internet Protocol (IP) address
e.IP version 4 (IPv4)
f.link local
g.multicast
h.octet
i.protocol
j.route table
-A portion of an IP address that represents eight binary bits.
(Short Answer)
4.8/5
(30)
What option can be added to the netstat command in order to display network statistics?
(Multiple Choice)
4.9/5
(39)
The sshd daemon is configured by editing what configuration file?
(Multiple Choice)
4.9/5
(28)
An IPv6 IP address consists of 16-bit numbers in what numbering scheme?
(Multiple Choice)
4.9/5
(43)
The IP address of the network interface on the router to which you send packets is called the ____________________.
(Essay)
4.7/5
(39)
What is the Advanced Encryption Standard (AES) encryption algorithm's largest key length size?
(Multiple Choice)
4.8/5
(37)
____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.
(Short Answer)
4.9/5
(39)
___________ is a mathematical operation that compares two binary digits and gives a result of 1 or 0. If both binary digits being compared have a value of 1, the result is 1. If one digit is 0 and the other is 1, or if both digits are 0, the result is 0.
(Short Answer)
4.8/5
(36)
What option can be used with ssh to enable tunneling of X Windows information?
(Multiple Choice)
4.8/5
(36)
Describe what a subnet mask is, and explain why it is used. Then, detail how it is used to determine the network ID of an IP address.
(Essay)
4.8/5
(38)
How many DNS servers can be configured in the /etc/resolv.conf file?
(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)