Exam 12: Network Configuration

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

You can view or set the host name for a Linux computer using the ____________________ command.

Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Verified

hostname

Two or more computers that are connected with media that can exchange information are called a(n) ____________________.

Free
(Short Answer)
4.8/5
(39)
Correct Answer:
Verified

network

In an IP address, the host ID represents the network on which the computer is located. _________________________

Free
(True/False)
4.7/5
(26)
Correct Answer:
Verified

False

The /etc/resolv.conf file can contain up to ____ DNS servers.

(Multiple Choice)
4.8/5
(31)

How do you configure a NIC? What do you do if the NIC is not detected during installation?

(Essay)
4.8/5
(32)

One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.

(Multiple Choice)
5.0/5
(31)

The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.

(Multiple Choice)
4.9/5
(43)

The simplest method for mapping host names to IP addresses is by placing entries into the /etc/hosts file. _________________________

(True/False)
4.8/5
(30)

A common utility used to troubleshoot routing is the ____ command.

(Multiple Choice)
4.8/5
(24)

The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

(Multiple Choice)
4.9/5
(29)

Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets.

(True/False)
4.7/5
(30)

What is VNC? How does it transfer graphics across the network?

(Essay)
4.9/5
(39)

____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.

(Short Answer)
4.8/5
(35)

Match each term with the correct statement below. -A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.

(Multiple Choice)
4.9/5
(34)

The most common media access method used to send TCP/IP packets onto network media is called Token Ring. _________________________

(True/False)
4.8/5
(20)

____ is a remote administration tool that encrypts information that passes across the network.

(Multiple Choice)
4.9/5
(36)

Class D addresses are used for multicasting.

(True/False)
4.8/5
(44)

The IP address of the network interface on the router to which you send packets is called the ____________________.

(Short Answer)
4.8/5
(33)

Match each term with the correct statement below. -A utility that can be used to obtain graphical utilities from a remote Linux computer in order to perform system administration.

(Multiple Choice)
4.8/5
(29)

The subnet mask for a Class C IP address is ____.

(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)