linux ch12 Flashcards

1
Q

Home users can use a LAN, but not a WAN.

A

f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Class D addresses are used for multicasting.

A

t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SLIP is a newer technology than PPP.

A

f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets.

A

t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A route table is a list of TCP/IP networks that is stored in system memory.

A

t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The most common media access method used to send TCP/IP packets onto network media is called Token Ring.

A

f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Directed communication from one computer to another single computer using TCP/IP is referred to as a(n) unicast.

A

t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In an IP address, the host ID represents the network on which the computer is located.

A

f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The simplest method for mapping host names to IP addresses is by placing entries into the /etc/hosts file.

A

t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ssh command has traditionally been used to obtain a command-line shell on remote Linux servers.

A

f

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The most common LAN protocol used today is ____.

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Each octet in an IP address represents a(n) ____ binary number.

A

8-bit (not byte)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.

A

0.0.0.0; 255.255.255.255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The subnet mask for a Class B IP address is ____.

A

255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The subnet mask for a Class C IP address is ____.

A

255.255.255.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IPv6 IP addresses are delimited by the ____ character.

A

:

17
Q

IPv6 IP addresses are written using eight 16-bit ____ numbers.

A

hexadecimal

18
Q

The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

A

ifconfig

19
Q

The ____ command sends a small TCP/IP packet to another IP address and awaits a response.

A

ping

20
Q

Computer names are called ____.

A

host names

21
Q

The /etc/resolv.conf file can contain up to ____ DNS servers.

A

3

22
Q

A common utility used to troubleshoot routing is the ____ command.

A

traceroute

23
Q

The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.

A

rlogin

24
Q

One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.

A

/etc/hosts.equiv

25
Q

____ is a remote administration tool that encrypts information that passes across the network.

A

Secure Shell (SSH)

26
Q

Remote computers can connect to a configured VNC server using the ____ command.

A

vncviewer

27
Q

Are all computers on a LAN typically configured with the same host ID?

A

no

28
Q

Can you receive a TCP/IP configuration from a server on the network?

A

yes

29
Q

Can TCP/IP use host names to identify computers?

A

no

30
Q

Can you configure your system to resolve names to IP addresses by contacting a DNS server?

A

yes

31
Q

Do stand-alone daemons provide network services directly to utilities that connect to them?

A

yes