Exam 12: Network Configuration
Exam 1: Introduction to Linux50 Questions
Exam 2: Linux Installation and Usage50 Questions
Exam 3: Exploring Linux Filesystems50 Questions
Exam 4: Linux Filesystem Management50 Questions
Exam 5: Linux Filesystem Administration50 Questions
Exam 6: Linux Server Deployment50 Questions
Exam 7: Working With the Bash Shell50 Questions
Exam 8: System Initialization and X Windows50 Questions
Exam 9: Managing Linux Processes50 Questions
Exam 10: Common Administrative Tasks50 Questions
Exam 11: Compression, System Backup, and Software Installation50 Questions
Exam 12: Network Configuration50 Questions
Exam 13: Configuring Network Services50 Questions
Exam 14: Troubleshooting, Performance, and Security50 Questions
Select questions type
Match each term with the correct statement below.
a.broadcast
b.classless interdomain routing (CIDR) notation
c.host name
d.Internet Protocol (IP) address
e.IP version 4 (IPv4)
f.link local
g.multicast
h.octet
i.protocol
j.route table
-A set of rules of communication used between computers on a network.
(Short Answer)
4.9/5
(41)
What two commands below can be used to manipulate the routing table?
(Multiple Choice)
5.0/5
(27)
Select the two numbers below that represent the number of bits needed to make an IPv4 or IPv6 IP address:
(Multiple Choice)
4.8/5
(43)
Match each term with the correct statement below.
a.broadcast
b.classless interdomain routing (CIDR) notation
c.host name
d.Internet Protocol (IP) address
e.IP version 4 (IPv4)
f.link local
g.multicast
h.octet
i.protocol
j.route table
-A series of four 8-bit numbers that represent a computer on a network.
(Short Answer)
4.7/5
(35)
What tool below was designed as a secure remote access utility that encrypts information that passes across the network?
(Multiple Choice)
4.9/5
(37)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)