Exam 14: Network Configuration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The subnet mask for a Class C IP address is ____.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

C

Each octet in an IP address represents a(n)____ binary number.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

B

Home users can use a LAN, but not a WAN.

Free
(True/False)
4.8/5
(30)
Correct Answer:
Verified

False

The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.

(Multiple Choice)
4.8/5
(38)

Describe the telnet and SSH utilities. What is the difference between them?

(Essay)
4.9/5
(33)
Match each term with the correct statement below.
A hierarchical namespace used for host names.
ISP
The networks in which the computers are all in close physical proximity.
CIDR
A company that provides Internet access.
mutt
Correct Answer:
Verified
Premises:
Responses:
A hierarchical namespace used for host names.
ISP
The networks in which the computers are all in close physical proximity.
CIDR
A company that provides Internet access.
mutt
A common Linux mail user agent.
ssh
The networks in which computers are separated geographically by large distances.
LANs
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
FQDN
A host name that follows DNS convention.
WANs
A notation that is often used to represent an IP address and its subnet mask.
DNS
A utility that can be used to run remote applications on a Linux computer.
telnet
(Matching)
4.9/5
(32)

The ____ command sends a small TCP/IP packet to another IP address and awaits a response.

(Multiple Choice)
4.9/5
(30)

Computer names are called ____.

(Multiple Choice)
4.8/5
(26)

You can view or set the host name for a Linux computer using the ____________________ command.

(Short Answer)
4.8/5
(29)

The use of NFS is less common than the use of FTP to transfer files among UNIX and Linux computers.

(True/False)
4.9/5
(32)

The /etc/resolv.conf file can contain up to ____ DNS servers.

(Multiple Choice)
4.8/5
(32)

____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.

(Short Answer)
4.9/5
(27)

One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.

(Multiple Choice)
4.9/5
(37)

The ____ ftp utility command runs a shell on the local computer.

(Multiple Choice)
4.8/5
(33)

Class D addresses are used for multicasting.

(True/False)
5.0/5
(27)

Computers that are connected via network media use a network ____________________ for sending and receiving information to and from other computers on the network.

(Short Answer)
4.9/5
(35)

What are POP, IMAP, and SMTP? What is the difference between POP and IMAP?

(Essay)
4.8/5
(22)

The most common LAN protocol used today is ____.

(Multiple Choice)
4.9/5
(33)

Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets .

(True/False)
4.9/5
(35)

Two or more computers that are connected with media that can exchange information are called a(n)____________________.

(Short Answer)
4.8/5
(43)
Showing 1 - 20 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)