Exam 12: Network Configuration
Exam 1: Introduction to Linux45 Questions
Exam 2: Linux Installation and Usage45 Questions
Exam 3: Exploring Linux Filesystems45 Questions
Exam 4: Linux Filesystem Management45 Questions
Exam 5: Linux Filesystem Administration45 Questions
Exam 6: Advanced Installation45 Questions
Exam 7: Working With the Bash Shell45 Questions
Exam 8: System Initialization and X Windows45 Questions
Exam 9: Managing Linux Processes45 Questions
Exam 10: Common Administrative Tasks45 Questions
Exam 11: Compression, System Backup, and Software Installation45 Questions
Exam 12: Network Configuration45 Questions
Exam 13: Configuring Network Services45 Questions
Exam 14: Troubleshooting, Performance, and Security45 Questions
Select questions type
You can view or set the host name for a Linux computer using the ____________________ command.
Free
(Short Answer)
4.9/5
(37)
Correct Answer:
hostname
Two or more computers that are connected with media that can exchange information are called a(n) ____________________.
Free
(Short Answer)
4.8/5
(39)
Correct Answer:
network
In an IP address, the host ID represents the network on which the computer is located. _________________________
Free
(True/False)
4.7/5
(26)
Correct Answer:
False
The /etc/resolv.conf file can contain up to ____ DNS servers.
(Multiple Choice)
4.8/5
(31)
How do you configure a NIC? What do you do if the NIC is not detected during installation?
(Essay)
4.8/5
(32)
One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.
(Multiple Choice)
5.0/5
(31)
The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.
(Multiple Choice)
4.9/5
(43)
The simplest method for mapping host names to IP addresses is by placing entries into the /etc/hosts file. _________________________
(True/False)
4.8/5
(30)
A common utility used to troubleshoot routing is the ____ command.
(Multiple Choice)
4.8/5
(24)
The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.
(Multiple Choice)
4.9/5
(29)
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets.
(True/False)
4.7/5
(30)
____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.
(Short Answer)
4.8/5
(35)
Match each term with the correct statement below.
-A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
(Multiple Choice)
4.9/5
(34)
The most common media access method used to send TCP/IP packets onto network media is called Token Ring. _________________________
(True/False)
4.8/5
(20)
____ is a remote administration tool that encrypts information that passes across the network.
(Multiple Choice)
4.9/5
(36)
The IP address of the network interface on the router to which you send packets is called the ____________________.
(Short Answer)
4.8/5
(33)
Match each term with the correct statement below.
-A utility that can be used to obtain graphical utilities from a remote Linux computer in order to perform system administration.
(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)