Deck 14: Network Configuration

Full screen (f)
exit full mode
Question
The subnet mask for a Class B IP address is ____.

A)255.0.0.0
B)255.255.0.0
C)255.255.255.0
D)255.255.255.255
Use Space or
up arrow
down arrow
to flip the card.
Question
One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.

A)/etc/hosts.trusted
B)/etc/hosts.tr
C)/etc/hosts.eq
D)/etc/hosts.equiv
Question
The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename .

A)upload filename
B)mput filename
C)put filename
D)get filename
Question
Class D addresses are used for multicasting.
Question
The use of NFS is less common than the use of FTP to transfer files among UNIX and Linux computers.
Question
The subnet mask for a Class C IP address is ____.

A)255.0.0.0
B)255.255.0.0
C)255.255.255.0
D)255.255.255.255
Question
The ____ command sends a small TCP/IP packet to another IP address and awaits a response.

A)ping
B)ring
C)png
D)ipquery
Question
The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.

A)ssh
B)slogin
C)telnet
D)rlogin
Question
To transfer information to and from a shared Windows directory, you can mount that directory to a local Linux directory using the ____ filesystem type.

A)nfs
B)ext2
C)ntfs
D)smbfs
Question
The /etc/resolv.conf file can contain up to ____ DNS servers.

A)2
B)3
C)4
D)5
Question
The ____ ftp utility command runs a shell on the local computer.

A)~
B)#
C)!
D)*
Question
Computer names are called ____.

A)host IDs
B)network names
C)host names
D)network IDs
Question
The most common LAN protocol used today is ____.

A)UDP/IP
B)IPX/SPX
C)TCP/IP
D)DLC
Question
The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

A)ipconfig
B)ifconf
C)ipconf
D)ifconfig
Question
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets .
Question
E-mail is typically downloaded from an e-mail server via ____ or ____.

A)SSH; FTP
B)POP; IMAP
C)POP; FTP
D)SSH; IMAP
Question
Each octet in an IP address represents a(n)____ binary number.

A)4-bit
B)8-bit
C)4-byte
D)8-byte
Question
The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.

A)1.1.1.1; 255.255.255.255
B)0.0.0.0; 255.255.255.255
C)0.0.0.0; 256.256.256.256
D)1.1.1.1; 256.256.256.256
Question
Home users can use a LAN, but not a WAN.
Question
SLIP is a newer technology than PPP.
Question
Match between columns
A hierarchical namespace used for host names.
WANs
A hierarchical namespace used for host names.
ISP
A hierarchical namespace used for host names.
ssh
A hierarchical namespace used for host names.
LANs
A hierarchical namespace used for host names.
FQDN
A hierarchical namespace used for host names.
CIDR
A hierarchical namespace used for host names.
telnet
A hierarchical namespace used for host names.
mutt
A hierarchical namespace used for host names.
DNS
The networks in which the computers are all in close physical proximity.
WANs
The networks in which the computers are all in close physical proximity.
ISP
The networks in which the computers are all in close physical proximity.
ssh
The networks in which the computers are all in close physical proximity.
LANs
The networks in which the computers are all in close physical proximity.
FQDN
The networks in which the computers are all in close physical proximity.
CIDR
The networks in which the computers are all in close physical proximity.
telnet
The networks in which the computers are all in close physical proximity.
mutt
The networks in which the computers are all in close physical proximity.
DNS
A company that provides Internet access.
WANs
A company that provides Internet access.
ISP
A company that provides Internet access.
ssh
A company that provides Internet access.
LANs
A company that provides Internet access.
FQDN
A company that provides Internet access.
CIDR
A company that provides Internet access.
telnet
A company that provides Internet access.
mutt
A company that provides Internet access.
DNS
A common Linux mail user agent.
WANs
A common Linux mail user agent.
ISP
A common Linux mail user agent.
ssh
A common Linux mail user agent.
LANs
A common Linux mail user agent.
FQDN
A common Linux mail user agent.
CIDR
A common Linux mail user agent.
telnet
A common Linux mail user agent.
mutt
A common Linux mail user agent.
DNS
The networks in which computers are separated geographically by large distances.
WANs
The networks in which computers are separated geographically by large distances.
ISP
The networks in which computers are separated geographically by large distances.
ssh
The networks in which computers are separated geographically by large distances.
LANs
The networks in which computers are separated geographically by large distances.
FQDN
The networks in which computers are separated geographically by large distances.
CIDR
The networks in which computers are separated geographically by large distances.
telnet
The networks in which computers are separated geographically by large distances.
mutt
The networks in which computers are separated geographically by large distances.
DNS
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
WANs
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
ISP
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
ssh
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
LANs
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
FQDN
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
CIDR
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
telnet
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
mutt
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
DNS
A host name that follows DNS convention.
WANs
A host name that follows DNS convention.
ISP
A host name that follows DNS convention.
ssh
A host name that follows DNS convention.
LANs
A host name that follows DNS convention.
FQDN
A host name that follows DNS convention.
CIDR
A host name that follows DNS convention.
telnet
A host name that follows DNS convention.
mutt
A host name that follows DNS convention.
DNS
A notation that is often used to represent an IP address and its subnet mask.
WANs
A notation that is often used to represent an IP address and its subnet mask.
ISP
A notation that is often used to represent an IP address and its subnet mask.
ssh
A notation that is often used to represent an IP address and its subnet mask.
LANs
A notation that is often used to represent an IP address and its subnet mask.
FQDN
A notation that is often used to represent an IP address and its subnet mask.
CIDR
A notation that is often used to represent an IP address and its subnet mask.
telnet
A notation that is often used to represent an IP address and its subnet mask.
mutt
A notation that is often used to represent an IP address and its subnet mask.
DNS
A utility that can be used to run remote applications on a Linux computer.
WANs
A utility that can be used to run remote applications on a Linux computer.
ISP
A utility that can be used to run remote applications on a Linux computer.
ssh
A utility that can be used to run remote applications on a Linux computer.
LANs
A utility that can be used to run remote applications on a Linux computer.
FQDN
A utility that can be used to run remote applications on a Linux computer.
CIDR
A utility that can be used to run remote applications on a Linux computer.
telnet
A utility that can be used to run remote applications on a Linux computer.
mutt
A utility that can be used to run remote applications on a Linux computer.
DNS
Question
Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?
Question
Two or more computers that are connected with media that can exchange information are called a(n)____________________.
Question
____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.
Question
The most common mail user agent used in Red Hat Fedora Linux is ____.

A)Mozilla
B)mail
C)mutt
D)Outlook
Question
What are POP, IMAP, and SMTP? What is the difference between POP and IMAP?
Question
The IP address of the network interface on the router to which you send packets is called the ____________________.
Question
How do you configure a NIC? What do you do if the NIC is not detected during installation?
Question
Computers that are connected via network media use a network ____________________ for sending and receiving information to and from other computers on the network.
Question
What is a subnet mask? What purpose does it serve? How is it used to determine the network ID of an IP address?
Question
You can view or set the host name for a Linux computer using the ____________________ command.
Question
Describe the telnet and SSH utilities. What is the difference between them?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Network Configuration
1
The subnet mask for a Class B IP address is ____.

A)255.0.0.0
B)255.255.0.0
C)255.255.255.0
D)255.255.255.255
B
2
One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.

A)/etc/hosts.trusted
B)/etc/hosts.tr
C)/etc/hosts.eq
D)/etc/hosts.equiv
D
3
The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename .

A)upload filename
B)mput filename
C)put filename
D)get filename
B
4
Class D addresses are used for multicasting.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
The use of NFS is less common than the use of FTP to transfer files among UNIX and Linux computers.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
The subnet mask for a Class C IP address is ____.

A)255.0.0.0
B)255.255.0.0
C)255.255.255.0
D)255.255.255.255
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
The ____ command sends a small TCP/IP packet to another IP address and awaits a response.

A)ping
B)ring
C)png
D)ipquery
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.

A)ssh
B)slogin
C)telnet
D)rlogin
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
To transfer information to and from a shared Windows directory, you can mount that directory to a local Linux directory using the ____ filesystem type.

A)nfs
B)ext2
C)ntfs
D)smbfs
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
The /etc/resolv.conf file can contain up to ____ DNS servers.

A)2
B)3
C)4
D)5
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
The ____ ftp utility command runs a shell on the local computer.

A)~
B)#
C)!
D)*
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
Computer names are called ____.

A)host IDs
B)network names
C)host names
D)network IDs
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
The most common LAN protocol used today is ____.

A)UDP/IP
B)IPX/SPX
C)TCP/IP
D)DLC
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

A)ipconfig
B)ifconf
C)ipconf
D)ifconfig
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets .
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
E-mail is typically downloaded from an e-mail server via ____ or ____.

A)SSH; FTP
B)POP; IMAP
C)POP; FTP
D)SSH; IMAP
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
Each octet in an IP address represents a(n)____ binary number.

A)4-bit
B)8-bit
C)4-byte
D)8-byte
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.

A)1.1.1.1; 255.255.255.255
B)0.0.0.0; 255.255.255.255
C)0.0.0.0; 256.256.256.256
D)1.1.1.1; 256.256.256.256
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
Home users can use a LAN, but not a WAN.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
SLIP is a newer technology than PPP.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
Match between columns
A hierarchical namespace used for host names.
WANs
A hierarchical namespace used for host names.
ISP
A hierarchical namespace used for host names.
ssh
A hierarchical namespace used for host names.
LANs
A hierarchical namespace used for host names.
FQDN
A hierarchical namespace used for host names.
CIDR
A hierarchical namespace used for host names.
telnet
A hierarchical namespace used for host names.
mutt
A hierarchical namespace used for host names.
DNS
The networks in which the computers are all in close physical proximity.
WANs
The networks in which the computers are all in close physical proximity.
ISP
The networks in which the computers are all in close physical proximity.
ssh
The networks in which the computers are all in close physical proximity.
LANs
The networks in which the computers are all in close physical proximity.
FQDN
The networks in which the computers are all in close physical proximity.
CIDR
The networks in which the computers are all in close physical proximity.
telnet
The networks in which the computers are all in close physical proximity.
mutt
The networks in which the computers are all in close physical proximity.
DNS
A company that provides Internet access.
WANs
A company that provides Internet access.
ISP
A company that provides Internet access.
ssh
A company that provides Internet access.
LANs
A company that provides Internet access.
FQDN
A company that provides Internet access.
CIDR
A company that provides Internet access.
telnet
A company that provides Internet access.
mutt
A company that provides Internet access.
DNS
A common Linux mail user agent.
WANs
A common Linux mail user agent.
ISP
A common Linux mail user agent.
ssh
A common Linux mail user agent.
LANs
A common Linux mail user agent.
FQDN
A common Linux mail user agent.
CIDR
A common Linux mail user agent.
telnet
A common Linux mail user agent.
mutt
A common Linux mail user agent.
DNS
The networks in which computers are separated geographically by large distances.
WANs
The networks in which computers are separated geographically by large distances.
ISP
The networks in which computers are separated geographically by large distances.
ssh
The networks in which computers are separated geographically by large distances.
LANs
The networks in which computers are separated geographically by large distances.
FQDN
The networks in which computers are separated geographically by large distances.
CIDR
The networks in which computers are separated geographically by large distances.
telnet
The networks in which computers are separated geographically by large distances.
mutt
The networks in which computers are separated geographically by large distances.
DNS
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
WANs
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
ISP
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
ssh
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
LANs
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
FQDN
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
CIDR
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
telnet
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
mutt
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
DNS
A host name that follows DNS convention.
WANs
A host name that follows DNS convention.
ISP
A host name that follows DNS convention.
ssh
A host name that follows DNS convention.
LANs
A host name that follows DNS convention.
FQDN
A host name that follows DNS convention.
CIDR
A host name that follows DNS convention.
telnet
A host name that follows DNS convention.
mutt
A host name that follows DNS convention.
DNS
A notation that is often used to represent an IP address and its subnet mask.
WANs
A notation that is often used to represent an IP address and its subnet mask.
ISP
A notation that is often used to represent an IP address and its subnet mask.
ssh
A notation that is often used to represent an IP address and its subnet mask.
LANs
A notation that is often used to represent an IP address and its subnet mask.
FQDN
A notation that is often used to represent an IP address and its subnet mask.
CIDR
A notation that is often used to represent an IP address and its subnet mask.
telnet
A notation that is often used to represent an IP address and its subnet mask.
mutt
A notation that is often used to represent an IP address and its subnet mask.
DNS
A utility that can be used to run remote applications on a Linux computer.
WANs
A utility that can be used to run remote applications on a Linux computer.
ISP
A utility that can be used to run remote applications on a Linux computer.
ssh
A utility that can be used to run remote applications on a Linux computer.
LANs
A utility that can be used to run remote applications on a Linux computer.
FQDN
A utility that can be used to run remote applications on a Linux computer.
CIDR
A utility that can be used to run remote applications on a Linux computer.
telnet
A utility that can be used to run remote applications on a Linux computer.
mutt
A utility that can be used to run remote applications on a Linux computer.
DNS
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
Two or more computers that are connected with media that can exchange information are called a(n)____________________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
The most common mail user agent used in Red Hat Fedora Linux is ____.

A)Mozilla
B)mail
C)mutt
D)Outlook
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
What are POP, IMAP, and SMTP? What is the difference between POP and IMAP?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
The IP address of the network interface on the router to which you send packets is called the ____________________.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
How do you configure a NIC? What do you do if the NIC is not detected during installation?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
Computers that are connected via network media use a network ____________________ for sending and receiving information to and from other computers on the network.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
What is a subnet mask? What purpose does it serve? How is it used to determine the network ID of an IP address?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
You can view or set the host name for a Linux computer using the ____________________ command.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
32
Describe the telnet and SSH utilities. What is the difference between them?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 32 flashcards in this deck.