Exam 14: Network Configuration
Exam 1: Introduction to Linux32 Questions
Exam 2: Preparing for Linux Installation32 Questions
Exam 3: Linux Installation and Usage32 Questions
Exam 4: Exploring Linux Filesystems32 Questions
Exam 5: Linux Filesystem Management32 Questions
Exam 6: Linux Filesystem Administration32 Questions
Exam 7: Advanced Installation32 Questions
Exam 8: Working With the Bash Shell32 Questions
Exam 9: System Initialization and X Windows32 Questions
Exam 10: Managing Linux Processes32 Questions
Exam 11: Common Administrative Tasks32 Questions
Exam 12: Compression, System Backup, and Software Installation32 Questions
Exam 13: Troubleshooting and Performance32 Questions
Exam 14: Network Configuration32 Questions
Exam 15: Configuring Network Services and Security32 Questions
Select questions type
The subnet mask for a Class C IP address is ____.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
C
Each octet in an IP address represents a(n)____ binary number.
Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
B
Home users can use a LAN, but not a WAN.
Free
(True/False)
4.8/5
(30)
Correct Answer:
False
The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.
(Multiple Choice)
4.8/5
(38)
Describe the telnet and SSH utilities. What is the difference between them?
(Essay)
4.9/5
(33)
Match each term with the correct statement below.
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(32)
The ____ command sends a small TCP/IP packet to another IP address and awaits a response.
(Multiple Choice)
4.9/5
(30)
You can view or set the host name for a Linux computer using the ____________________ command.
(Short Answer)
4.8/5
(29)
The use of NFS is less common than the use of FTP to transfer files among UNIX and Linux computers.
(True/False)
4.9/5
(32)
The /etc/resolv.conf file can contain up to ____ DNS servers.
(Multiple Choice)
4.8/5
(32)
____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.
(Short Answer)
4.9/5
(27)
One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.
(Multiple Choice)
4.9/5
(37)
The ____ ftp utility command runs a shell on the local computer.
(Multiple Choice)
4.8/5
(33)
Computers that are connected via network media use a network ____________________ for sending and receiving information to and from other computers on the network.
(Short Answer)
4.9/5
(35)
What are POP, IMAP, and SMTP? What is the difference between POP and IMAP?
(Essay)
4.8/5
(22)
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets .
(True/False)
4.9/5
(35)
Two or more computers that are connected with media that can exchange information are called a(n)____________________.
(Short Answer)
4.8/5
(43)
Showing 1 - 20 of 32
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)