Deck 15: Configuring Network Services and Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
Play
Full screen (f)
Deck 15: Configuring Network Services and Security
1
The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.
A)DirectoryIndex index.html
B)DocumentRoot index.html
C)Index index.html
D)UseIndex index.html
A)DirectoryIndex index.html
B)DocumentRoot index.html
C)Index index.html
D)UseIndex index.html
A
2
The ____ command displays all routers between the current computer and a remote computer.
A)route
B)maproute
C)findroute
D)traceroute
A)route
B)maproute
C)findroute
D)traceroute
D
3
By default, the smb.conf file shares all printers and home directories for recognized Windows users.
True
4
Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.
A)continue
B)noshell
C)nokill
D)nohup
A)continue
B)noshell
C)nokill
D)nohup
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
The ____ zone configuration file contains a PTR record used to identify the loopback adapter.
A)/var/named/named.ca
B)/etc/named.conf
C)/var/named/named.local
D)/etc/named.loop
A)/var/named/named.ca
B)/etc/named.conf
C)/var/named/named.local
D)/etc/named.loop
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
To see what network services are running on your network, you can run the ____ command.
A)nmap
B)map
C)networkmap
D)nm
A)nmap
B)map
C)networkmap
D)nm
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
All DNS servers contain a DNS cache file.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
Large network daemons that are not started by the Internet Super Daemon and called ____ daemons.
A)self-sufficient
B)independent
C)autonomous
D)stand-alone
A)self-sufficient
B)independent
C)autonomous
D)stand-alone
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ command can be used to switch your current user account to another.
A)swu
B)sudo
C)su
D)switchu
A)swu
B)sudo
C)su
D)switchu
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
The FTP Server network service is a stand-alone service.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
When configuring FTP, anonymous FTP access is granted by default.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
The ____ network service allows computers on a network the ability to share one connection to the Internet.
A)Squid Proxy Server
B)Samba Server
C)X Server
D)NIS Server
A)Squid Proxy Server
B)Samba Server
C)X Server
D)NIS Server
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
HTTP uses port ____.
A)TCP 20
B)TCP 25
C)TCP 80
D)TCP 110
A)TCP 20
B)TCP 25
C)TCP 80
D)TCP 110
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ network service resolves fully qualified domain names to IP addresses for a certain namespace on the Internet.
A)DHCP Server
B)Apache Web Server
C)BIND / DNS Server
D)NIS Server
A)DHCP Server
B)Apache Web Server
C)BIND / DNS Server
D)NIS Server
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
The ____ IDS is a PERL-based program that is designed to work with AIDE to check the integrity of Linux computers remotely across a network.
A)Snort
B)SWATCH
C)PortSentry
D)ICU
A)Snort
B)SWATCH
C)PortSentry
D)ICU
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
DNS uses ports ____.
A)TCP 20, 21
B)TCP 53, UDP 53
C)TCP 80, 81
D)TCP 69, UDP 69
A)TCP 20, 21
B)TCP 53, UDP 53
C)TCP 80, 81
D)TCP 69, UDP 69
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
A(n)____ is a program that can start a network daemon.
A)network bootstrapper
B)TCP wrapper
C)IP wrapper
D)daemon launcher
A)network bootstrapper
B)TCP wrapper
C)IP wrapper
D)daemon launcher
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
The ____ option to the iptables command can be used to specify the default policy for a certain chain type.
A)-P
B)-C
C)-p
D)-c
A)-P
B)-C
C)-p
D)-c
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
The ____ option to the iptables command can be used to specify the destination address of packets for a rule.
A)-D
B)-L
C)-F
D)-d
A)-D
B)-L
C)-F
D)-d
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
What is NIS? What is a master and slave NIS server? Give examples of configuration files that NIS is commonly used to coordinate.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
The ____________________ is typically used to start and manage connections for smaller network daemons such as the telnet, rlogin, and FTP daemons.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
____ is an IDS that involves modifying the Linux kernel to increase process and file security as well as detect security breaches.
A)ICU
B)LIDS
C)SWATCH
D)PortSentry
A)ICU
B)LIDS
C)SWATCH
D)PortSentry
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
Match between columns
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
A(n)____________________ number uniquely identifies a particular service.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
How does DHCP automatically configure IP addresses?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
What are the five main types of encryption supported by sshd?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
What methods can be used to physically secure local computers?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
The first DNS server in a zone is called the ____________________ DNS server.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
To share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
Computers that have more than one network interface are called ____________________ hosts.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
32
How can netfilter/iptables be used to create a firewall service?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck