Exam 12: Network Configuration
Exam 1: Introduction to Linux50 Questions
Exam 2: Linux Installation and Usage50 Questions
Exam 3: Exploring Linux Filesystems50 Questions
Exam 4: Linux Filesystem Management50 Questions
Exam 5: Linux Filesystem Administration50 Questions
Exam 6: Linux Server Deployment50 Questions
Exam 7: Working With the Bash Shell50 Questions
Exam 8: System Initialization and X Windows50 Questions
Exam 9: Managing Linux Processes50 Questions
Exam 10: Common Administrative Tasks50 Questions
Exam 11: Compression, System Backup, and Software Installation50 Questions
Exam 12: Network Configuration50 Questions
Exam 13: Configuring Network Services50 Questions
Exam 14: Troubleshooting, Performance, and Security50 Questions
Select questions type
How do you configure a NIC? What do you do if the NIC is not detected during installation?
(Essay)
4.8/5
(42)
Match each term with the correct statement below.
a.broadcast
b.classless interdomain routing (CIDR) notation
c.host name
d.Internet Protocol (IP) address
e.IP version 4 (IPv4)
f.link local
g.multicast
h.octet
i.protocol
j.route table
-The TCP/IP communication destined for a certain group of computers.
(Short Answer)
4.8/5
(34)
What command can be used to assign a TCP/IP configuration to a NIC as well as view the current configuration of all network interfaces?
(Multiple Choice)
4.8/5
(42)
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets.
(True/False)
4.9/5
(42)
A route table is a list of TCP/IP networks that is stored in system memory.
(True/False)
4.8/5
(44)
What two daemons can be used to start and manage connections for smaller network daemons such as telnet and rlogin?
(Multiple Choice)
4.9/5
(35)
What command can be used to troubleshoot routing by displaying all routers between the current computer and a remote computer?
(Multiple Choice)
4.8/5
(34)
The ARCfour encryption algorithm uses variable-length keys up to 2048 bits in length.
(True/False)
4.8/5
(35)
A network _______________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.
(Short Answer)
4.8/5
(32)
What two IP addresses below cannot be assigned to a host computer because they refer to all networks and all computers on all networks, respectively?
(Multiple Choice)
4.8/5
(38)
Match each term with the correct statement below.
a.broadcast
b.classless interdomain routing (CIDR) notation
c.host name
d.Internet Protocol (IP) address
e.IP version 4 (IPv4)
f.link local
g.multicast
h.octet
i.protocol
j.route table
-A table of information used to indicate which networks are connected to network interfaces.
(Short Answer)
4.7/5
(32)
Match each term with the correct statement below.
a.broadcast
b.classless interdomain routing (CIDR) notation
c.host name
d.Internet Protocol (IP) address
e.IP version 4 (IPv4)
f.link local
g.multicast
h.octet
i.protocol
j.route table
-The portion of an IPv6 address that refers to a unique computer. It is analogous to the host portion of an IPv4 address.
(Short Answer)
4.9/5
(34)
Each octet in an IP address represents a binary number consisting of how many bits / bytes?
(Multiple Choice)
4.8/5
(41)
Select below the configuration file that is used to configure the BIND / DNS server:
(Multiple Choice)
4.8/5
(37)
Match each term with the correct statement below.
a.broadcast
b.classless interdomain routing (CIDR) notation
c.host name
d.Internet Protocol (IP) address
e.IP version 4 (IPv4)
f.link local
g.multicast
h.octet
i.protocol
j.route table
-A user-friendly name assigned to a computer.
(Short Answer)
4.7/5
(30)
Describe the telnet and SSH utilities. What is the difference between them?
(Essay)
4.9/5
(33)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)