Midterm exam Flashcards
Typically, a network service is a running daemon (e.g., a thread/process). Such a daemon listens for network traffic on a particular _______, which is associated with the service.
Port number
The TCP/IP address of 127.0.0.1 is commonly referred to as the __________.
loopback address
Which of the following devices forwards data (IP) packets from an internal subnet to an external router?
Gateway
Which of the following commands can be used to modify the route table on a Linux computer?
IP
route
The line that configures the hostname for a Fedora Linux machine at boot time can be found in which of the following files?
/etc/hostname
Which of the following can be used to resolve a hostname to the IP address? (Choose all that apply.)
DNS service
/etc/hosts
Which file holds the methods to be used and the order in which they will be applied for host name resolution?
/etc/nsswitch.conf
Which of the following commands can be used to send data to a specific port on a server from a client.
netcat
Which of the following utilities can be used to download data/file from a web link?
wget
curl
Which of the following directories stores the connection profiles for NetworkManager?
/etc/NetworkManager/system-connections/
Which of the following can be used to change the hostname of a linux server
nmcli
hostnamectl
Which of the following can be used to store the DNS server’s IP address?
/etc/resolv.conf
Assume that each lab has 31 hosts. If each lab needs to have its own subnet, what is the minimum number of bits required for the subnet mask?
26
Suppose you have 360 hosts and want to have no more than 60 hosts per subnet. How many class C addresses would you need? How many subnets would you have left over from your allocation?
2,2
Which of the following can be a function of the DHCP service?
Provide the DNS server address to a DHCP client
Provide the gateway address to a DHCP client
Which of the following are optional in the DHCP lease process?
DHCPDISCOVER
DHCPOFFER
DHCP stands for Dynamic host configuration protocol as a result it only assigns dynamic IP address to clients but not static IP addresses
false
A DHCP starvation attack is type of attack where a malicious client exhausts the IP addresses in the DHCP scope preventing legitimate clients from obtaining an ip address, how can it be prevented.
I can be prevented by using MAC address filtering
Which of the following is the type of resource record that represents a DNS server
ns
It is required to have a reverse DNS zone for a forward DNS zone because forward resolving record needs a match reverse resolving record for security purposes
false
Which port number is used by DNS servers to listen for request?
53
Which of the following is the type of resource record for mail exchange server?
MX
Which of the following marks the authoritative nature of a DNS server?
SOA
Which of the following LInux commands can be used to find the IP address of a domain name such as example.com
nslookup
hostname
An authoritative DNS server should not perform iterative query because it may incur too much traffic.
False
All DNS records end with the period character(.) which represents _____
the root of the DNS hierarchy
Assume that TCU’s authoritative DNS server is ns01.tcu.edu. The CS department of TCU is allowed to manage its DNS sub-domain (cs.tcu.edu) with its name sever as ns101.cs.tcu.edu. The CS name server’s zone files do contain SOA records. Thus, ns101.cs.tcu.edu is an authoritative DNS server for cs.tcu.edu even if it is local to the CS department.
True
How does a secondary DNS server get zone records from the primary DNS server?
A zone transfer
You have added new resource records to a zone file and restarted the name service on a primary DNS server. However, the secondary DNS server did not sync its zone file after the refresh time. What may have happened( assuming that the network communications is fine between the two servers)
You did not increase the serial number
The default port for the SSH service is
22
In SSH, which of the following authentication methods are accepted?
Public Key
Password
Which of the following is the configuration file for SSH server on a Linux Machine
/etc/ssh/sshd_config
Where is a user’s SSH private key file located on Fedora by default
$HOME/.ssh
Which of the following commands can generate a key pair for SSH user/client
ssh-keygen
Where is a Linux host’s SSH private key file located on Fedora by default?
/etc/ssh/
Which of the following options specifies the private key file that will be used by a client to log onto a SSH server?
-i
Assume you want to connect to linkedin.com however, you cannot connect to linkedin directly from your current computer. Assume that you have access to a SSH server whose DNS name is cite.aws.com which has no restrictions on accessing linkedin which of the following command would you issue from your current computer?
ssh -L 8443:www.linkedin.com:443 username@cite.aws.com
Given the following ssh command:
ssh -L 8043:www.facebook.com:443 john@10.10.10.10
Assume you want to connect to facebook.com using nc command from the computer that issued the above ssh command. How would you issue the nc command utilizing the established SSH tunnel?
nc localhost 8043
Below is a ssh command on a computer named A:
ssh –R 8181:google.com:443 admin@student.aws.com
What users (not on computer A) need to enter in the address bar of a browser to use the tunnel to visit Google?
student.aws.com:8181
scp is a program for copying files between computers. It uses the SSH protocol. In scp, which character represents the remote side (i.e., the SSH server side).
:
To setup host based authentication, one of the host keys of the SSH server needs to be copied to the clients and placed in the right folder
False
What flag do you add to see the actions SSH takes
-v
Once an SSH key pair has been created, which command can be used to install it as an authorized key on the SSH server
ssh-copy-id
Which file contains host keys of SSH servers accessed by a user?
~/.ssh/known_hosts