Deck 15: Configuring Network Services and Security

Full screen (f)
exit full mode
Question
The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.

A)DirectoryIndex index.html
B)DocumentRoot index.html
C)Index index.html
D)UseIndex index.html
Use Space or
up arrow
down arrow
to flip the card.
Question
The ____ command displays all routers between the current computer and a remote computer.

A)route
B)maproute
C)findroute
D)traceroute
Question
By default, the smb.conf file shares all printers and home directories for recognized Windows users.
Question
Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.

A)continue
B)noshell
C)nokill
D)nohup
Question
The ____ zone configuration file contains a PTR record used to identify the loopback adapter.

A)/var/named/named.ca
B)/etc/named.conf
C)/var/named/named.local
D)/etc/named.loop
Question
To see what network services are running on your network, you can run the ____ command.

A)nmap
B)map
C)networkmap
D)nm
Question
All DNS servers contain a DNS cache file.
Question
Large network daemons that are not started by the Internet Super Daemon and called ____ daemons.

A)self-sufficient
B)independent
C)autonomous
D)stand-alone
Question
The ____ command can be used to switch your current user account to another.

A)swu
B)sudo
C)su
D)switchu
Question
The FTP Server network service is a stand-alone service.
Question
When configuring FTP, anonymous FTP access is granted by default.
Question
The ____ network service allows computers on a network the ability to share one connection to the Internet.

A)Squid Proxy Server
B)Samba Server
C)X Server
D)NIS Server
Question
HTTP uses port ____.

A)TCP 20
B)TCP 25
C)TCP 80
D)TCP 110
Question
The ____ network service resolves fully qualified domain names to IP addresses for a certain namespace on the Internet.

A)DHCP Server
B)Apache Web Server
C)BIND / DNS Server
D)NIS Server
Question
The ____ IDS is a PERL-based program that is designed to work with AIDE to check the integrity of Linux computers remotely across a network.

A)Snort
B)SWATCH
C)PortSentry
D)ICU
Question
If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
Question
DNS uses ports ____.

A)TCP 20, 21
B)TCP 53, UDP 53
C)TCP 80, 81
D)TCP 69, UDP 69
Question
A(n)____ is a program that can start a network daemon.

A)network bootstrapper
B)TCP wrapper
C)IP wrapper
D)daemon launcher
Question
The ____ option to the iptables command can be used to specify the default policy for a certain chain type.

A)-P
B)-C
C)-p
D)-c
Question
The ____ option to the iptables command can be used to specify the destination address of packets for a rule.

A)-D
B)-L
C)-F
D)-d
Question
What is NIS? What is a master and slave NIS server? Give examples of configuration files that NIS is commonly used to coordinate.
Question
The ____________________ is typically used to start and manage connections for smaller network daemons such as the telnet, rlogin, and FTP daemons.
Question
____ is an IDS that involves modifying the Linux kernel to increase process and file security as well as detect security breaches.

A)ICU
B)LIDS
C)SWATCH
D)PortSentry
Question
Match between columns
A program that can be used to detect unauthorized access to a Linux system.
tripwire
A program that can be used to detect unauthorized access to a Linux system.
recursive query
A program that can be used to detect unauthorized access to a Linux system.
IDS
A program that can be used to detect unauthorized access to a Linux system.
zone
A program that can be used to detect unauthorized access to a Linux system.
reverse lookup
A program that can be used to detect unauthorized access to a Linux system.
routing
A program that can be used to detect unauthorized access to a Linux system.
directive
A program that can be used to detect unauthorized access to a Linux system.
rules
A program that can be used to detect unauthorized access to a Linux system.
forward lookup
The act of forwarding data packets from one network to another.
tripwire
The act of forwarding data packets from one network to another.
recursive query
The act of forwarding data packets from one network to another.
IDS
The act of forwarding data packets from one network to another.
zone
The act of forwarding data packets from one network to another.
reverse lookup
The act of forwarding data packets from one network to another.
routing
The act of forwarding data packets from one network to another.
directive
The act of forwarding data packets from one network to another.
rules
The act of forwarding data packets from one network to another.
forward lookup
A common IDS for Linux that monitors files and directories.
tripwire
A common IDS for Linux that monitors files and directories.
recursive query
A common IDS for Linux that monitors files and directories.
IDS
A common IDS for Linux that monitors files and directories.
zone
A common IDS for Linux that monitors files and directories.
reverse lookup
A common IDS for Linux that monitors files and directories.
routing
A common IDS for Linux that monitors files and directories.
directive
A common IDS for Linux that monitors files and directories.
rules
A common IDS for Linux that monitors files and directories.
forward lookup
A portion of the Domain Name Space that is administered by one or more DNS servers.
tripwire
A portion of the Domain Name Space that is administered by one or more DNS servers.
recursive query
A portion of the Domain Name Space that is administered by one or more DNS servers.
IDS
A portion of the Domain Name Space that is administered by one or more DNS servers.
zone
A portion of the Domain Name Space that is administered by one or more DNS servers.
reverse lookup
A portion of the Domain Name Space that is administered by one or more DNS servers.
routing
A portion of the Domain Name Space that is administered by one or more DNS servers.
directive
A portion of the Domain Name Space that is administered by one or more DNS servers.
rules
A portion of the Domain Name Space that is administered by one or more DNS servers.
forward lookup
A line within a configuration file.
tripwire
A line within a configuration file.
recursive query
A line within a configuration file.
IDS
A line within a configuration file.
zone
A line within a configuration file.
reverse lookup
A line within a configuration file.
routing
A line within a configuration file.
directive
A line within a configuration file.
rules
A line within a configuration file.
forward lookup
A DNS name resolution request whereby an IP address is resolved to a FQDN.
tripwire
A DNS name resolution request whereby an IP address is resolved to a FQDN.
recursive query
A DNS name resolution request whereby an IP address is resolved to a FQDN.
IDS
A DNS name resolution request whereby an IP address is resolved to a FQDN.
zone
A DNS name resolution request whereby an IP address is resolved to a FQDN.
reverse lookup
A DNS name resolution request whereby an IP address is resolved to a FQDN.
routing
A DNS name resolution request whereby an IP address is resolved to a FQDN.
directive
A DNS name resolution request whereby an IP address is resolved to a FQDN.
rules
A DNS name resolution request whereby an IP address is resolved to a FQDN.
forward lookup
The components of a firewall that match specific network traffic that is to be allowed or dropped.
tripwire
The components of a firewall that match specific network traffic that is to be allowed or dropped.
recursive query
The components of a firewall that match specific network traffic that is to be allowed or dropped.
IDS
The components of a firewall that match specific network traffic that is to be allowed or dropped.
zone
The components of a firewall that match specific network traffic that is to be allowed or dropped.
reverse lookup
The components of a firewall that match specific network traffic that is to be allowed or dropped.
routing
The components of a firewall that match specific network traffic that is to be allowed or dropped.
directive
The components of a firewall that match specific network traffic that is to be allowed or dropped.
rules
The components of a firewall that match specific network traffic that is to be allowed or dropped.
forward lookup
A DNS resolution request that was resolved with the use of top-level DNS servers.
tripwire
A DNS resolution request that was resolved with the use of top-level DNS servers.
recursive query
A DNS resolution request that was resolved with the use of top-level DNS servers.
IDS
A DNS resolution request that was resolved with the use of top-level DNS servers.
zone
A DNS resolution request that was resolved with the use of top-level DNS servers.
reverse lookup
A DNS resolution request that was resolved with the use of top-level DNS servers.
routing
A DNS resolution request that was resolved with the use of top-level DNS servers.
directive
A DNS resolution request that was resolved with the use of top-level DNS servers.
rules
A DNS resolution request that was resolved with the use of top-level DNS servers.
forward lookup
A DNS name resolution request whereby a FQDN is resolved to an IP address.
tripwire
A DNS name resolution request whereby a FQDN is resolved to an IP address.
recursive query
A DNS name resolution request whereby a FQDN is resolved to an IP address.
IDS
A DNS name resolution request whereby a FQDN is resolved to an IP address.
zone
A DNS name resolution request whereby a FQDN is resolved to an IP address.
reverse lookup
A DNS name resolution request whereby a FQDN is resolved to an IP address.
routing
A DNS name resolution request whereby a FQDN is resolved to an IP address.
directive
A DNS name resolution request whereby a FQDN is resolved to an IP address.
rules
A DNS name resolution request whereby a FQDN is resolved to an IP address.
forward lookup
Question
A(n)____________________ number uniquely identifies a particular service.
Question
How does DHCP automatically configure IP addresses?
Question
What are the five main types of encryption supported by sshd?
Question
What methods can be used to physically secure local computers?
Question
The first DNS server in a zone is called the ____________________ DNS server.
Question
To share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.
Question
Computers that have more than one network interface are called ____________________ hosts.
Question
How can netfilter/iptables be used to create a firewall service?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 15: Configuring Network Services and Security
1
The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.

A)DirectoryIndex index.html
B)DocumentRoot index.html
C)Index index.html
D)UseIndex index.html
A
2
The ____ command displays all routers between the current computer and a remote computer.

A)route
B)maproute
C)findroute
D)traceroute
D
3
By default, the smb.conf file shares all printers and home directories for recognized Windows users.
True
4
Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.

A)continue
B)noshell
C)nokill
D)nohup
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
5
The ____ zone configuration file contains a PTR record used to identify the loopback adapter.

A)/var/named/named.ca
B)/etc/named.conf
C)/var/named/named.local
D)/etc/named.loop
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
6
To see what network services are running on your network, you can run the ____ command.

A)nmap
B)map
C)networkmap
D)nm
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
7
All DNS servers contain a DNS cache file.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
8
Large network daemons that are not started by the Internet Super Daemon and called ____ daemons.

A)self-sufficient
B)independent
C)autonomous
D)stand-alone
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ command can be used to switch your current user account to another.

A)swu
B)sudo
C)su
D)switchu
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
10
The FTP Server network service is a stand-alone service.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
11
When configuring FTP, anonymous FTP access is granted by default.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
12
The ____ network service allows computers on a network the ability to share one connection to the Internet.

A)Squid Proxy Server
B)Samba Server
C)X Server
D)NIS Server
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
13
HTTP uses port ____.

A)TCP 20
B)TCP 25
C)TCP 80
D)TCP 110
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
14
The ____ network service resolves fully qualified domain names to IP addresses for a certain namespace on the Internet.

A)DHCP Server
B)Apache Web Server
C)BIND / DNS Server
D)NIS Server
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
15
The ____ IDS is a PERL-based program that is designed to work with AIDE to check the integrity of Linux computers remotely across a network.

A)Snort
B)SWATCH
C)PortSentry
D)ICU
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
16
If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
17
DNS uses ports ____.

A)TCP 20, 21
B)TCP 53, UDP 53
C)TCP 80, 81
D)TCP 69, UDP 69
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
18
A(n)____ is a program that can start a network daemon.

A)network bootstrapper
B)TCP wrapper
C)IP wrapper
D)daemon launcher
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
19
The ____ option to the iptables command can be used to specify the default policy for a certain chain type.

A)-P
B)-C
C)-p
D)-c
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
20
The ____ option to the iptables command can be used to specify the destination address of packets for a rule.

A)-D
B)-L
C)-F
D)-d
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
21
What is NIS? What is a master and slave NIS server? Give examples of configuration files that NIS is commonly used to coordinate.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
22
The ____________________ is typically used to start and manage connections for smaller network daemons such as the telnet, rlogin, and FTP daemons.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
23
____ is an IDS that involves modifying the Linux kernel to increase process and file security as well as detect security breaches.

A)ICU
B)LIDS
C)SWATCH
D)PortSentry
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
24
Match between columns
A program that can be used to detect unauthorized access to a Linux system.
tripwire
A program that can be used to detect unauthorized access to a Linux system.
recursive query
A program that can be used to detect unauthorized access to a Linux system.
IDS
A program that can be used to detect unauthorized access to a Linux system.
zone
A program that can be used to detect unauthorized access to a Linux system.
reverse lookup
A program that can be used to detect unauthorized access to a Linux system.
routing
A program that can be used to detect unauthorized access to a Linux system.
directive
A program that can be used to detect unauthorized access to a Linux system.
rules
A program that can be used to detect unauthorized access to a Linux system.
forward lookup
The act of forwarding data packets from one network to another.
tripwire
The act of forwarding data packets from one network to another.
recursive query
The act of forwarding data packets from one network to another.
IDS
The act of forwarding data packets from one network to another.
zone
The act of forwarding data packets from one network to another.
reverse lookup
The act of forwarding data packets from one network to another.
routing
The act of forwarding data packets from one network to another.
directive
The act of forwarding data packets from one network to another.
rules
The act of forwarding data packets from one network to another.
forward lookup
A common IDS for Linux that monitors files and directories.
tripwire
A common IDS for Linux that monitors files and directories.
recursive query
A common IDS for Linux that monitors files and directories.
IDS
A common IDS for Linux that monitors files and directories.
zone
A common IDS for Linux that monitors files and directories.
reverse lookup
A common IDS for Linux that monitors files and directories.
routing
A common IDS for Linux that monitors files and directories.
directive
A common IDS for Linux that monitors files and directories.
rules
A common IDS for Linux that monitors files and directories.
forward lookup
A portion of the Domain Name Space that is administered by one or more DNS servers.
tripwire
A portion of the Domain Name Space that is administered by one or more DNS servers.
recursive query
A portion of the Domain Name Space that is administered by one or more DNS servers.
IDS
A portion of the Domain Name Space that is administered by one or more DNS servers.
zone
A portion of the Domain Name Space that is administered by one or more DNS servers.
reverse lookup
A portion of the Domain Name Space that is administered by one or more DNS servers.
routing
A portion of the Domain Name Space that is administered by one or more DNS servers.
directive
A portion of the Domain Name Space that is administered by one or more DNS servers.
rules
A portion of the Domain Name Space that is administered by one or more DNS servers.
forward lookup
A line within a configuration file.
tripwire
A line within a configuration file.
recursive query
A line within a configuration file.
IDS
A line within a configuration file.
zone
A line within a configuration file.
reverse lookup
A line within a configuration file.
routing
A line within a configuration file.
directive
A line within a configuration file.
rules
A line within a configuration file.
forward lookup
A DNS name resolution request whereby an IP address is resolved to a FQDN.
tripwire
A DNS name resolution request whereby an IP address is resolved to a FQDN.
recursive query
A DNS name resolution request whereby an IP address is resolved to a FQDN.
IDS
A DNS name resolution request whereby an IP address is resolved to a FQDN.
zone
A DNS name resolution request whereby an IP address is resolved to a FQDN.
reverse lookup
A DNS name resolution request whereby an IP address is resolved to a FQDN.
routing
A DNS name resolution request whereby an IP address is resolved to a FQDN.
directive
A DNS name resolution request whereby an IP address is resolved to a FQDN.
rules
A DNS name resolution request whereby an IP address is resolved to a FQDN.
forward lookup
The components of a firewall that match specific network traffic that is to be allowed or dropped.
tripwire
The components of a firewall that match specific network traffic that is to be allowed or dropped.
recursive query
The components of a firewall that match specific network traffic that is to be allowed or dropped.
IDS
The components of a firewall that match specific network traffic that is to be allowed or dropped.
zone
The components of a firewall that match specific network traffic that is to be allowed or dropped.
reverse lookup
The components of a firewall that match specific network traffic that is to be allowed or dropped.
routing
The components of a firewall that match specific network traffic that is to be allowed or dropped.
directive
The components of a firewall that match specific network traffic that is to be allowed or dropped.
rules
The components of a firewall that match specific network traffic that is to be allowed or dropped.
forward lookup
A DNS resolution request that was resolved with the use of top-level DNS servers.
tripwire
A DNS resolution request that was resolved with the use of top-level DNS servers.
recursive query
A DNS resolution request that was resolved with the use of top-level DNS servers.
IDS
A DNS resolution request that was resolved with the use of top-level DNS servers.
zone
A DNS resolution request that was resolved with the use of top-level DNS servers.
reverse lookup
A DNS resolution request that was resolved with the use of top-level DNS servers.
routing
A DNS resolution request that was resolved with the use of top-level DNS servers.
directive
A DNS resolution request that was resolved with the use of top-level DNS servers.
rules
A DNS resolution request that was resolved with the use of top-level DNS servers.
forward lookup
A DNS name resolution request whereby a FQDN is resolved to an IP address.
tripwire
A DNS name resolution request whereby a FQDN is resolved to an IP address.
recursive query
A DNS name resolution request whereby a FQDN is resolved to an IP address.
IDS
A DNS name resolution request whereby a FQDN is resolved to an IP address.
zone
A DNS name resolution request whereby a FQDN is resolved to an IP address.
reverse lookup
A DNS name resolution request whereby a FQDN is resolved to an IP address.
routing
A DNS name resolution request whereby a FQDN is resolved to an IP address.
directive
A DNS name resolution request whereby a FQDN is resolved to an IP address.
rules
A DNS name resolution request whereby a FQDN is resolved to an IP address.
forward lookup
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
25
A(n)____________________ number uniquely identifies a particular service.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
26
How does DHCP automatically configure IP addresses?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
27
What are the five main types of encryption supported by sshd?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
28
What methods can be used to physically secure local computers?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
29
The first DNS server in a zone is called the ____________________ DNS server.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
30
To share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
31
Computers that have more than one network interface are called ____________________ hosts.
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
32
How can netfilter/iptables be used to create a firewall service?
Unlock Deck
Unlock for access to all 32 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 32 flashcards in this deck.