Exam 12: Network Configuration
Exam 1: Introduction to Linux45 Questions
Exam 2: Linux Installation and Usage45 Questions
Exam 3: Exploring Linux Filesystems45 Questions
Exam 4: Linux Filesystem Management45 Questions
Exam 5: Linux Filesystem Administration45 Questions
Exam 6: Advanced Installation45 Questions
Exam 7: Working With the Bash Shell45 Questions
Exam 8: System Initialization and X Windows45 Questions
Exam 9: Managing Linux Processes45 Questions
Exam 10: Common Administrative Tasks45 Questions
Exam 11: Compression, System Backup, and Software Installation45 Questions
Exam 12: Network Configuration45 Questions
Exam 13: Configuring Network Services45 Questions
Exam 14: Troubleshooting, Performance, and Security45 Questions
Select questions type
A route table is a list of TCP/IP networks that is stored in system memory.
(True/False)
4.8/5
(28)
IPv6 IP addresses are written using eight 16-bit ____ numbers.
(Multiple Choice)
4.8/5
(40)
Describe the telnet and SSH utilities. What is the difference between them?
(Essay)
4.8/5
(32)
Match each term with the correct statement below.
-The networks in which the computers are all in close physical proximity.
(Multiple Choice)
4.9/5
(38)
The ssh command has traditionally been used to obtain a command-line shell on remote Linux servers. _________________________
(True/False)
4.7/5
(33)
Match each term with the correct statement below.
-A utility that can be used to run remote applications on a Linux computer.
(Multiple Choice)
4.8/5
(27)
The ____ command sends a small TCP/IP packet to another IP address and awaits a response.
(Multiple Choice)
4.8/5
(21)
A network ____________________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.
(Short Answer)
4.9/5
(33)
Directed communication from one computer to another single computer using TCP/IP is referred to as a(n) unicast. _________________________
(True/False)
4.9/5
(43)
Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?
(Essay)
4.9/5
(34)
What is a subnet mask? What purpose does it serve? How is it used to determine the network ID of an IP address?
(Essay)
4.9/5
(30)
Match each term with the correct statement below.
-A company that provides Internet access.
(Multiple Choice)
4.9/5
(35)
The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.
(Multiple Choice)
4.7/5
(37)
Match each term with the correct statement below.
-A notation that is often used to represent an IP address and its subnet mask.
(Multiple Choice)
4.8/5
(27)
Each octet in an IP address represents a(n) ____ binary number.
(Multiple Choice)
5.0/5
(33)
Match each term with the correct statement below.
-The networks in which computers are separated geographically by large distances.
(Multiple Choice)
4.8/5
(37)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)