Chapter 12 - Network Configuration Flashcards

1
Q

A portion of an IPv4 address that represents eight binary bits.

A

octet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A series of four 8-bit numbers that determine the network and host portions of an IP address.

A

subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Used to start the VNC server process for a user.

A

vncserver command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used to connect to a SSH daemon on a remote computer.

A

ssh command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The act of forwarding data packets from one network to another.

A

routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A table of information used to indicate which networks are connected to network interfaces.

A

route table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Used to manipulate the route table.

A

route command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The IP address of the router on the network used to send packets to remote networks

A

default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A protocol used by computers to obtain an IPv6 configuration from a router on the network.

A

Internet Control Message Protocol version 6 (ICMPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The computers that have more than one network interface.

A

multihomed hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Used to set and display the configuration of wireless network interfaces.

A

iwconfig command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used to configure a DSL connection on Ubuntu systems.

A

pppoeconf command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Systemd daemon that manages the configuration of network interfaces.

A

Systemd-networkd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The most common WAN protocol used to send TCP/IP packets across a telephone line.

A

Point-to-Point Protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The asymmetric public and private keys on a computer running sshd. They are used to negotiate the symmetric key at the beginning of an SSH session.

A

SSH host keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The most common network protocol used on the Internet. It provides for reliable communication.

A

Transmission Control Protocol/Internet Protocol (TCP/IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A graphical NetworkManager utility that can be used to configure additional network interfaces and related technologies, such as DSL.

A

Network Connections tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A technology that allows a router to obtain Internet resources on behalf of computers on the network.

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A package of data formatted by a network protocol.

A

packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Used to start a text version of the Network Connections tool that is part of NetworkManager.

A

nmtui command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Used to configure routing protocols, such as RIP and OSPF, on a Linux system. It is part of the optional Quagga package.

A

zebra command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A system that defines how computers on a network share access to the physical medium.

A

media access method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Used to trace the path an IPv4 packet takes through routers to a destination host.

A

traceroute command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Used to obtain a shell on a remote computer running a Telnet daemon.

A

telnet command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Used to set a VNC connection password for a user.

A

vncpasswd command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The most common version of IP used on the Internet. It uses a 32-bit addressing scheme organized into different classes

A

IP version 4 (IPv4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

IP communication that is destined for a single computer.

A

unicast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The portion of an IP address that denotes the host.

A

host ID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

A network daemon that is used to start other network daemons on demand.

A

Extended Internet Super Daemon (xinetd)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

A recent version of IP that is used by some hosts on the Internet. It uses a 128-bit addressing scheme

A

IP version 6 (IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Used to generate or regenerate SSH encryption keys.

A

ssh-keygen command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A graphical utility that can be used to configure modem settings on Linux systems.

A

Modem Manager utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Used to change the host name of a computer as well as ensure that the new host name is loaded at boot time.

A

hostnamectl command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A media access method commonly used by industrial networks.

A

Token Ring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The act of forwarding TCP/IP packets from one network to another

A

IP forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Used to obtain IP configuration for a network interface from a DHCP or BOOTP server on the network.

A

dhclient command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Used to start the SSH agent process.

A

ssh-agent command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A set of rules of communication used between computers on a network.

A

protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The process by which binary bits are compared to calculate the network and host IDs from an IP address and subnet mask

A

ANDing

40
Q

Used to resolve host names to IP addresses.

A

host command

41
Q

Of the 65,535 possible ports, the ports from 0 to 1023, which are used by common networking services.

A

well-known ports

42
Q

Used to display and configure network interfaces using NetworkManager.

A

nmcli command

43
Q

A daemon that is started without the use of xinetd.

A

stand-alone daemon

44
Q

The hardware address that uniquely identifies a network interface.

A

Media Access Control (MAC) address

45
Q

The process of merging two separate networks using the NICs on a server.

A

bridging

46
Q

Used to view and modify files stored under /proc/sys.

A

sysctl command

47
Q

The protocol used by DSL to send PPP information over an Ethernet connection.

A

PPP over Ethernet (PPPoE)

48
Q

Used to resolve host names to IP addresses

A

dig command

49
Q

A protocol used on the Internet to provide error messages and network-related information

A

Internet Control Message Protocol (ICMP)

50
Q

Used to configure a DSL connection on Fedora systems.

A

pppoe-setup command

51
Q

A program used to connect to a VNC server and obtain a graphical desktop.

A

VNC viewer

52
Q

A company that provides Internet access.

A

Internet service provider (ISP)

53
Q

A network in which computers are separated geographically by large distances.

A

wide area network (WAN)

54
Q

The process in which a single large network is subdivided into several smaller networks.

A

subnetting

55
Q

A term that refers to the worldwide collection of small Internet-connected devices

A

Internet of Things (IoT)

56
Q

Used to check connectivity on an IPv4 network.

A

ping (Packet Internet Groper) command

57
Q

A LAN technology that uses Ethernet to transmit data over the air.

A

Wireless-Fidelity (Wi-Fi)

58
Q

A number that uniquely identifies a network service.

A

port

59
Q

Used to display and modify the IP configuration information for a network interface.

A

ifconfig (interface configuration) command

60
Q

A process that responds to network requests.

A

network service

61
Q

The portion of an IP address that denotes the network.

A

network ID

62
Q

Used to check connectivity on an IPv6 network.

A

ping6 command

63
Q

A protocol used to encapsulate IPv6 packets within an IPv4 network.

A

Teredo

64
Q

The process of combining two NICs on the same network to provide fault tolerance or load balancing

A

bonding

65
Q

Used to trace the path an IPv4 packet takes through routers to a destination host.

A

tracepath command

66
Q

A network in which the computers are all in close physical proximity.

A

local area network (LAN)

67
Q

Used to copy SSH user keys to the home directory of a user on another computer to allow for simplified authentication.

A

ssh-copy-id command

68
Q

A data format based on JSON that is commonly used for configuration files.

A

YAML (YAML Ain’t Markup Language)

69
Q

A network testing utility. It is often used to test the functionality of services on the network.

A

ncat (net cat) command

70
Q

A user-friendly name assigned to a computer.

A

host name

71
Q

A technology used to allow hardware devices to communicate directly with each other without accessing the CPU of the system. It is often used by network technologies such as Infiniband.

A

Remote Direct Memory Access (RDMA)

72
Q

A technology that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.

A

Secure Shell (SSH)

73
Q

Used to display network information and active connections.

A

netstat command

74
Q

A notation that is often used to represent an IP address and its subnet mask.

A

classless interdomain routing (CIDR) notation

75
Q

Used to trace the path an IPv6 packet takes through routers to a destination host.

A

traceroute6 command

76
Q

Used to start the graphical Network Connections tool that is part of NetworkManager.

A

nm-connection-editor command

77
Q

Used to resolve host names to IP addresses.

A

nslookup command

78
Q

Used to configure and display NIC hardware settings.

A

ethtool command

79
Q

A TCP/IP communication destined for all computers on a network.

A

broadcast

80
Q

A virtual network that overlays an existing TCP/IP network. Any data sent on this virtual network is encrypted.

A

Virtual Private Network (VPN)

81
Q

Used to trace the path an IPv6 packet takes through routers to a destination host.

A

tracepath6 command

82
Q

IP communication destined for a certain group of computers.

A

multicast

83
Q

A cross-platform SSH client.

A

Putty

84
Q

Used to display network connections.

A

ss (socket statistics) command

85
Q

Used to obtain information about the organization that maintains a DNS domain.

A

whois command

86
Q

Used to display and change the host name of a computer.

A

hostname command

87
Q

A graphical utility in Fedora 28 that can be used to configure settings for the network interfaces on the system.

A

Network utility

88
Q

A software component that manages the configuration of network interfaces.

A

NetworkManager

89
Q

Used to trace the path an IPv4 or IPv6 packet takes through routers to a destination host.

A

mtr command

90
Q

Used to add SSH user keys to the SSH agent process.

A

ssh-add command

91
Q

The most common media access method used in networks today.

A

Ethernet

92
Q

Used to display and configure network interfaces using Systemd-networkd.

A

networkctl command

93
Q

Two or more computers joined together via network media and able to exchange information.

A

network

94
Q

A less-reliable, but faster version of the TCP/IP protocol.

A

User Datagram Protocol/Internet Protocol (UDP/IP)

95
Q

A feature that automatically configures a network interface using an IPv4 address on the 169.254.0.0 network, or an IPv6 address on the FE80 network.

A

Automatic Private IP Addressing (APIPA)

96
Q

The software component that configures NICs on modern Ubuntu systems.

A

NetPlan

97
Q

Used to perform a wide variety of IP management tasks on a Linux system, such as viewing and manipulating the route table. It is part of the optional iproute2 package.

A

ip command