Deck 14: Network Configuration

ملء الشاشة (f)
exit full mode
سؤال
The subnet mask for a Class B IP address is ____.

A)255.0.0.0
B)255.255.0.0
C)255.255.255.0
D)255.255.255.255
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.

A)/etc/hosts.trusted
B)/etc/hosts.tr
C)/etc/hosts.eq
D)/etc/hosts.equiv
سؤال
The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename .

A)upload filename
B)mput filename
C)put filename
D)get filename
سؤال
Class D addresses are used for multicasting.
سؤال
The use of NFS is less common than the use of FTP to transfer files among UNIX and Linux computers.
سؤال
The subnet mask for a Class C IP address is ____.

A)255.0.0.0
B)255.255.0.0
C)255.255.255.0
D)255.255.255.255
سؤال
The ____ command sends a small TCP/IP packet to another IP address and awaits a response.

A)ping
B)ring
C)png
D)ipquery
سؤال
The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.

A)ssh
B)slogin
C)telnet
D)rlogin
سؤال
To transfer information to and from a shared Windows directory, you can mount that directory to a local Linux directory using the ____ filesystem type.

A)nfs
B)ext2
C)ntfs
D)smbfs
سؤال
The /etc/resolv.conf file can contain up to ____ DNS servers.

A)2
B)3
C)4
D)5
سؤال
The ____ ftp utility command runs a shell on the local computer.

A)~
B)#
C)!
D)*
سؤال
Computer names are called ____.

A)host IDs
B)network names
C)host names
D)network IDs
سؤال
The most common LAN protocol used today is ____.

A)UDP/IP
B)IPX/SPX
C)TCP/IP
D)DLC
سؤال
The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

A)ipconfig
B)ifconf
C)ipconf
D)ifconfig
سؤال
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets .
سؤال
E-mail is typically downloaded from an e-mail server via ____ or ____.

A)SSH; FTP
B)POP; IMAP
C)POP; FTP
D)SSH; IMAP
سؤال
Each octet in an IP address represents a(n)____ binary number.

A)4-bit
B)8-bit
C)4-byte
D)8-byte
سؤال
The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.

A)1.1.1.1; 255.255.255.255
B)0.0.0.0; 255.255.255.255
C)0.0.0.0; 256.256.256.256
D)1.1.1.1; 256.256.256.256
سؤال
Home users can use a LAN, but not a WAN.
سؤال
SLIP is a newer technology than PPP.
سؤال
Match between columns
A hierarchical namespace used for host names.
WANs
A hierarchical namespace used for host names.
ISP
A hierarchical namespace used for host names.
ssh
A hierarchical namespace used for host names.
LANs
A hierarchical namespace used for host names.
FQDN
A hierarchical namespace used for host names.
CIDR
A hierarchical namespace used for host names.
telnet
A hierarchical namespace used for host names.
mutt
A hierarchical namespace used for host names.
DNS
The networks in which the computers are all in close physical proximity.
WANs
The networks in which the computers are all in close physical proximity.
ISP
The networks in which the computers are all in close physical proximity.
ssh
The networks in which the computers are all in close physical proximity.
LANs
The networks in which the computers are all in close physical proximity.
FQDN
The networks in which the computers are all in close physical proximity.
CIDR
The networks in which the computers are all in close physical proximity.
telnet
The networks in which the computers are all in close physical proximity.
mutt
The networks in which the computers are all in close physical proximity.
DNS
A company that provides Internet access.
WANs
A company that provides Internet access.
ISP
A company that provides Internet access.
ssh
A company that provides Internet access.
LANs
A company that provides Internet access.
FQDN
A company that provides Internet access.
CIDR
A company that provides Internet access.
telnet
A company that provides Internet access.
mutt
A company that provides Internet access.
DNS
A common Linux mail user agent.
WANs
A common Linux mail user agent.
ISP
A common Linux mail user agent.
ssh
A common Linux mail user agent.
LANs
A common Linux mail user agent.
FQDN
A common Linux mail user agent.
CIDR
A common Linux mail user agent.
telnet
A common Linux mail user agent.
mutt
A common Linux mail user agent.
DNS
The networks in which computers are separated geographically by large distances.
WANs
The networks in which computers are separated geographically by large distances.
ISP
The networks in which computers are separated geographically by large distances.
ssh
The networks in which computers are separated geographically by large distances.
LANs
The networks in which computers are separated geographically by large distances.
FQDN
The networks in which computers are separated geographically by large distances.
CIDR
The networks in which computers are separated geographically by large distances.
telnet
The networks in which computers are separated geographically by large distances.
mutt
The networks in which computers are separated geographically by large distances.
DNS
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
WANs
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
ISP
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
ssh
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
LANs
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
FQDN
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
CIDR
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
telnet
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
mutt
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
DNS
A host name that follows DNS convention.
WANs
A host name that follows DNS convention.
ISP
A host name that follows DNS convention.
ssh
A host name that follows DNS convention.
LANs
A host name that follows DNS convention.
FQDN
A host name that follows DNS convention.
CIDR
A host name that follows DNS convention.
telnet
A host name that follows DNS convention.
mutt
A host name that follows DNS convention.
DNS
A notation that is often used to represent an IP address and its subnet mask.
WANs
A notation that is often used to represent an IP address and its subnet mask.
ISP
A notation that is often used to represent an IP address and its subnet mask.
ssh
A notation that is often used to represent an IP address and its subnet mask.
LANs
A notation that is often used to represent an IP address and its subnet mask.
FQDN
A notation that is often used to represent an IP address and its subnet mask.
CIDR
A notation that is often used to represent an IP address and its subnet mask.
telnet
A notation that is often used to represent an IP address and its subnet mask.
mutt
A notation that is often used to represent an IP address and its subnet mask.
DNS
A utility that can be used to run remote applications on a Linux computer.
WANs
A utility that can be used to run remote applications on a Linux computer.
ISP
A utility that can be used to run remote applications on a Linux computer.
ssh
A utility that can be used to run remote applications on a Linux computer.
LANs
A utility that can be used to run remote applications on a Linux computer.
FQDN
A utility that can be used to run remote applications on a Linux computer.
CIDR
A utility that can be used to run remote applications on a Linux computer.
telnet
A utility that can be used to run remote applications on a Linux computer.
mutt
A utility that can be used to run remote applications on a Linux computer.
DNS
سؤال
Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?
سؤال
Two or more computers that are connected with media that can exchange information are called a(n)____________________.
سؤال
____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.
سؤال
The most common mail user agent used in Red Hat Fedora Linux is ____.

A)Mozilla
B)mail
C)mutt
D)Outlook
سؤال
What are POP, IMAP, and SMTP? What is the difference between POP and IMAP?
سؤال
The IP address of the network interface on the router to which you send packets is called the ____________________.
سؤال
How do you configure a NIC? What do you do if the NIC is not detected during installation?
سؤال
Computers that are connected via network media use a network ____________________ for sending and receiving information to and from other computers on the network.
سؤال
What is a subnet mask? What purpose does it serve? How is it used to determine the network ID of an IP address?
سؤال
You can view or set the host name for a Linux computer using the ____________________ command.
سؤال
Describe the telnet and SSH utilities. What is the difference between them?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Network Configuration
1
The subnet mask for a Class B IP address is ____.

A)255.0.0.0
B)255.255.0.0
C)255.255.255.0
D)255.255.255.255
B
2
One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.

A)/etc/hosts.trusted
B)/etc/hosts.tr
C)/etc/hosts.eq
D)/etc/hosts.equiv
D
3
The ____ ftp utility command uploads the filename from the current directory on the local computer to the current directory on the remote computer, and allows the use of wildcard metacharacters to specify the filename .

A)upload filename
B)mput filename
C)put filename
D)get filename
B
4
Class D addresses are used for multicasting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
5
The use of NFS is less common than the use of FTP to transfer files among UNIX and Linux computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
6
The subnet mask for a Class C IP address is ____.

A)255.0.0.0
B)255.255.0.0
C)255.255.255.0
D)255.255.255.255
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
7
The ____ command sends a small TCP/IP packet to another IP address and awaits a response.

A)ping
B)ring
C)png
D)ipquery
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
8
The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.

A)ssh
B)slogin
C)telnet
D)rlogin
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
9
To transfer information to and from a shared Windows directory, you can mount that directory to a local Linux directory using the ____ filesystem type.

A)nfs
B)ext2
C)ntfs
D)smbfs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
10
The /etc/resolv.conf file can contain up to ____ DNS servers.

A)2
B)3
C)4
D)5
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
11
The ____ ftp utility command runs a shell on the local computer.

A)~
B)#
C)!
D)*
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
12
Computer names are called ____.

A)host IDs
B)network names
C)host names
D)network IDs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
13
The most common LAN protocol used today is ____.

A)UDP/IP
B)IPX/SPX
C)TCP/IP
D)DLC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
14
The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

A)ipconfig
B)ifconf
C)ipconf
D)ifconfig
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
15
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
16
E-mail is typically downloaded from an e-mail server via ____ or ____.

A)SSH; FTP
B)POP; IMAP
C)POP; FTP
D)SSH; IMAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
17
Each octet in an IP address represents a(n)____ binary number.

A)4-bit
B)8-bit
C)4-byte
D)8-byte
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
18
The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.

A)1.1.1.1; 255.255.255.255
B)0.0.0.0; 255.255.255.255
C)0.0.0.0; 256.256.256.256
D)1.1.1.1; 256.256.256.256
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
19
Home users can use a LAN, but not a WAN.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
20
SLIP is a newer technology than PPP.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
21
Match between columns
A hierarchical namespace used for host names.
WANs
A hierarchical namespace used for host names.
ISP
A hierarchical namespace used for host names.
ssh
A hierarchical namespace used for host names.
LANs
A hierarchical namespace used for host names.
FQDN
A hierarchical namespace used for host names.
CIDR
A hierarchical namespace used for host names.
telnet
A hierarchical namespace used for host names.
mutt
A hierarchical namespace used for host names.
DNS
The networks in which the computers are all in close physical proximity.
WANs
The networks in which the computers are all in close physical proximity.
ISP
The networks in which the computers are all in close physical proximity.
ssh
The networks in which the computers are all in close physical proximity.
LANs
The networks in which the computers are all in close physical proximity.
FQDN
The networks in which the computers are all in close physical proximity.
CIDR
The networks in which the computers are all in close physical proximity.
telnet
The networks in which the computers are all in close physical proximity.
mutt
The networks in which the computers are all in close physical proximity.
DNS
A company that provides Internet access.
WANs
A company that provides Internet access.
ISP
A company that provides Internet access.
ssh
A company that provides Internet access.
LANs
A company that provides Internet access.
FQDN
A company that provides Internet access.
CIDR
A company that provides Internet access.
telnet
A company that provides Internet access.
mutt
A company that provides Internet access.
DNS
A common Linux mail user agent.
WANs
A common Linux mail user agent.
ISP
A common Linux mail user agent.
ssh
A common Linux mail user agent.
LANs
A common Linux mail user agent.
FQDN
A common Linux mail user agent.
CIDR
A common Linux mail user agent.
telnet
A common Linux mail user agent.
mutt
A common Linux mail user agent.
DNS
The networks in which computers are separated geographically by large distances.
WANs
The networks in which computers are separated geographically by large distances.
ISP
The networks in which computers are separated geographically by large distances.
ssh
The networks in which computers are separated geographically by large distances.
LANs
The networks in which computers are separated geographically by large distances.
FQDN
The networks in which computers are separated geographically by large distances.
CIDR
The networks in which computers are separated geographically by large distances.
telnet
The networks in which computers are separated geographically by large distances.
mutt
The networks in which computers are separated geographically by large distances.
DNS
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
WANs
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
ISP
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
ssh
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
LANs
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
FQDN
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
CIDR
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
telnet
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
mutt
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
DNS
A host name that follows DNS convention.
WANs
A host name that follows DNS convention.
ISP
A host name that follows DNS convention.
ssh
A host name that follows DNS convention.
LANs
A host name that follows DNS convention.
FQDN
A host name that follows DNS convention.
CIDR
A host name that follows DNS convention.
telnet
A host name that follows DNS convention.
mutt
A host name that follows DNS convention.
DNS
A notation that is often used to represent an IP address and its subnet mask.
WANs
A notation that is often used to represent an IP address and its subnet mask.
ISP
A notation that is often used to represent an IP address and its subnet mask.
ssh
A notation that is often used to represent an IP address and its subnet mask.
LANs
A notation that is often used to represent an IP address and its subnet mask.
FQDN
A notation that is often used to represent an IP address and its subnet mask.
CIDR
A notation that is often used to represent an IP address and its subnet mask.
telnet
A notation that is often used to represent an IP address and its subnet mask.
mutt
A notation that is often used to represent an IP address and its subnet mask.
DNS
A utility that can be used to run remote applications on a Linux computer.
WANs
A utility that can be used to run remote applications on a Linux computer.
ISP
A utility that can be used to run remote applications on a Linux computer.
ssh
A utility that can be used to run remote applications on a Linux computer.
LANs
A utility that can be used to run remote applications on a Linux computer.
FQDN
A utility that can be used to run remote applications on a Linux computer.
CIDR
A utility that can be used to run remote applications on a Linux computer.
telnet
A utility that can be used to run remote applications on a Linux computer.
mutt
A utility that can be used to run remote applications on a Linux computer.
DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
22
Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
23
Two or more computers that are connected with media that can exchange information are called a(n)____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
24
____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
25
The most common mail user agent used in Red Hat Fedora Linux is ____.

A)Mozilla
B)mail
C)mutt
D)Outlook
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
26
What are POP, IMAP, and SMTP? What is the difference between POP and IMAP?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
27
The IP address of the network interface on the router to which you send packets is called the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
28
How do you configure a NIC? What do you do if the NIC is not detected during installation?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
29
Computers that are connected via network media use a network ____________________ for sending and receiving information to and from other computers on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
30
What is a subnet mask? What purpose does it serve? How is it used to determine the network ID of an IP address?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
31
You can view or set the host name for a Linux computer using the ____________________ command.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
32
Describe the telnet and SSH utilities. What is the difference between them?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.