Exam 15: Configuring Network Services and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.

Free
(Multiple Choice)
5.0/5
(39)
Correct Answer:
Verified

A

The FTP Server network service is a stand-alone service.

Free
(True/False)
4.9/5
(28)
Correct Answer:
Verified

False

A(n)____________________ number uniquely identifies a particular service.

Free
(Short Answer)
4.7/5
(39)
Correct Answer:
Verified

port

All DNS servers contain a DNS cache file.

(True/False)
4.8/5
(28)

What are the five main types of encryption supported by sshd?

(Essay)
4.7/5
(30)

The ____ option to the iptables command can be used to specify the default policy for a certain chain type.

(Multiple Choice)
4.9/5
(35)
Match each term with the correct statement below.
A program that can be used to detect unauthorized access to a Linux system.
reverse lookup
The act of forwarding data packets from one network to another.
recursive query
A common IDS for Linux that monitors files and directories.
rules
Correct Answer:
Verified
Premises:
Responses:
A program that can be used to detect unauthorized access to a Linux system.
reverse lookup
The act of forwarding data packets from one network to another.
recursive query
A common IDS for Linux that monitors files and directories.
rules
A portion of the Domain Name Space that is administered by one or more DNS servers.
routing
A line within a configuration file.
forward lookup
A DNS name resolution request whereby an IP address is resolved to a FQDN.
IDS
The components of a firewall that match specific network traffic that is to be allowed or dropped.
zone
A DNS resolution request that was resolved with the use of top-level DNS servers.
directive
A DNS name resolution request whereby a FQDN is resolved to an IP address.
tripwire
(Matching)
4.8/5
(34)

If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.

(True/False)
4.8/5
(37)

DNS uses ports ____.

(Multiple Choice)
4.8/5
(32)

The ____ option to the iptables command can be used to specify the destination address of packets for a rule.

(Multiple Choice)
4.8/5
(30)

To share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.

(Short Answer)
4.9/5
(28)

The ____________________ is typically used to start and manage connections for smaller network daemons such as the telnet, rlogin, and FTP daemons.

(Short Answer)
4.7/5
(31)

The ____ command can be used to switch your current user account to another.

(Multiple Choice)
4.9/5
(38)

Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.

(Multiple Choice)
4.8/5
(31)

To see what network services are running on your network, you can run the ____ command.

(Multiple Choice)
4.9/5
(31)

Large network daemons that are not started by the Internet Super Daemon and called ____ daemons.

(Multiple Choice)
4.8/5
(36)

What is NIS? What is a master and slave NIS server? Give examples of configuration files that NIS is commonly used to coordinate.

(Essay)
4.9/5
(32)

The ____ network service allows computers on a network the ability to share one connection to the Internet.

(Multiple Choice)
5.0/5
(37)

By default, the smb.conf file shares all printers and home directories for recognized Windows users.

(True/False)
4.7/5
(29)

What methods can be used to physically secure local computers?

(Essay)
4.9/5
(35)
Showing 1 - 20 of 32
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)