BCCS199_Session_12 Flashcards

1
Q

Linux sets up a “conversation” between a local process and…?

A

a remote server, called a TCP/IP socket.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Like everything else in Linux, a socket is treated as a file which can be…?

A

written to and read from.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A program uses the same system functions to communicate with a socket as with an…?

A

ordinary file. The details of how the communication is done are handled at a much lower level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An application such as a web browser can hold many…?

A

conversations at once with different (or the same) servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Different conversations are identified by…?

A

different IP addresses and/or port numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In HTTP, a server always receives data on port 80. each separate client conversation, however, has a…?

A

unique randomly-generated port number which the server uses to send data to that client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Different protocols use…?

A

unique port numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ports less than 1024 are called privileged ports, and are…?

A

handled especially by the kernel. This helps to ensure that, for example, all HTTP traffic (port 80) is managed by the kernel and not some “rouge” malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Find your ip address like this…?

A

hostname -I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Find the listening ports this way…?

A

Netstat -tuna | grep “LISTEN”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internet email is handled by two applications…?

A

Mail Transfer Agent (MTA).
- A “push” protocol; sends email via SMTP (port 25).
- Sends mail via MTA’s on different servers through the Internet, much like a network of post offices.
Mail User Agent (MUA).
- A “pull” protocol; receives email via POP (port 110) or IMAP (port 143).
- Receives email from MTA; delivers to final recipient on request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The mail command line application has been around since…?

A

early Unix days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

It provides a basic email service without the….?

A

frills, bells and whistles or the massive overhead of a GUI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

/sbin/ifconfig displays…?

A

local IP configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ping confirms..?

A

low level network connectivity between hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

host makes direct…?

A

DNS queries.

17
Q

The netstat -tuna command lists currently active…?

A

network services and connections.

18
Q

/sbin/traceroute can diagnose…?

A

routing problems.

19
Q

The Elinks terminal HTTP client, invoked as the command links, can be used to…?

A

browse web pages from a non graphical environment.

20
Q

The curl application is a non-interactive multi-protocol client (including HTTP, HTTPS, and FTP) which can be used to…?

A

transfer files in batch mode.

21
Q

The wget application is a non-interactive multi-protocol client (including HTTP, HTTPS, and FTP) which can be used to …?

A

recursively transfer web pages, recursing through all pages the web page references.

22
Q

A remote shell allows you to log into…?

A

another machine and run commands on the command line.

23
Q

Requires a remote shell server to…?

A

be running on the other machine.

24
Q

Original application: rsh. Not secure, because data is…?

A

not encrypted.

25
Q

ssh uses a…?

A

public key encryption technique.

26
Q

Public/private key encryption…?

A
  • Two related keys (very large numbers).
  • One is public and can be distributed to anyone.
  • The other is private, and not shared with anyone.
  • Key pairs can be generated with the ssh-keygen command.
27
Q

To transfer data, you combine the receiver’s public and the sender’s private keys to encrypt the data. This can only be decrypted using the….?

A

receiver’s private key.

28
Q

Linux, as usual, implements international network standards using a…?

A

suite of command-line utilities.

Though many of these have had GUI applications added as a front end, typically administrators use the command line for its versatility.