Deck 15: Configuring Network Services and Security

ملء الشاشة (f)
exit full mode
سؤال
The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.

A)DirectoryIndex index.html
B)DocumentRoot index.html
C)Index index.html
D)UseIndex index.html
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The ____ command displays all routers between the current computer and a remote computer.

A)route
B)maproute
C)findroute
D)traceroute
سؤال
By default, the smb.conf file shares all printers and home directories for recognized Windows users.
سؤال
Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.

A)continue
B)noshell
C)nokill
D)nohup
سؤال
The ____ zone configuration file contains a PTR record used to identify the loopback adapter.

A)/var/named/named.ca
B)/etc/named.conf
C)/var/named/named.local
D)/etc/named.loop
سؤال
To see what network services are running on your network, you can run the ____ command.

A)nmap
B)map
C)networkmap
D)nm
سؤال
All DNS servers contain a DNS cache file.
سؤال
Large network daemons that are not started by the Internet Super Daemon and called ____ daemons.

A)self-sufficient
B)independent
C)autonomous
D)stand-alone
سؤال
The ____ command can be used to switch your current user account to another.

A)swu
B)sudo
C)su
D)switchu
سؤال
The FTP Server network service is a stand-alone service.
سؤال
When configuring FTP, anonymous FTP access is granted by default.
سؤال
The ____ network service allows computers on a network the ability to share one connection to the Internet.

A)Squid Proxy Server
B)Samba Server
C)X Server
D)NIS Server
سؤال
HTTP uses port ____.

A)TCP 20
B)TCP 25
C)TCP 80
D)TCP 110
سؤال
The ____ network service resolves fully qualified domain names to IP addresses for a certain namespace on the Internet.

A)DHCP Server
B)Apache Web Server
C)BIND / DNS Server
D)NIS Server
سؤال
The ____ IDS is a PERL-based program that is designed to work with AIDE to check the integrity of Linux computers remotely across a network.

A)Snort
B)SWATCH
C)PortSentry
D)ICU
سؤال
If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
سؤال
DNS uses ports ____.

A)TCP 20, 21
B)TCP 53, UDP 53
C)TCP 80, 81
D)TCP 69, UDP 69
سؤال
A(n)____ is a program that can start a network daemon.

A)network bootstrapper
B)TCP wrapper
C)IP wrapper
D)daemon launcher
سؤال
The ____ option to the iptables command can be used to specify the default policy for a certain chain type.

A)-P
B)-C
C)-p
D)-c
سؤال
The ____ option to the iptables command can be used to specify the destination address of packets for a rule.

A)-D
B)-L
C)-F
D)-d
سؤال
What is NIS? What is a master and slave NIS server? Give examples of configuration files that NIS is commonly used to coordinate.
سؤال
The ____________________ is typically used to start and manage connections for smaller network daemons such as the telnet, rlogin, and FTP daemons.
سؤال
____ is an IDS that involves modifying the Linux kernel to increase process and file security as well as detect security breaches.

A)ICU
B)LIDS
C)SWATCH
D)PortSentry
سؤال
Match between columns
A program that can be used to detect unauthorized access to a Linux system.
tripwire
A program that can be used to detect unauthorized access to a Linux system.
recursive query
A program that can be used to detect unauthorized access to a Linux system.
IDS
A program that can be used to detect unauthorized access to a Linux system.
zone
A program that can be used to detect unauthorized access to a Linux system.
reverse lookup
A program that can be used to detect unauthorized access to a Linux system.
routing
A program that can be used to detect unauthorized access to a Linux system.
directive
A program that can be used to detect unauthorized access to a Linux system.
rules
A program that can be used to detect unauthorized access to a Linux system.
forward lookup
The act of forwarding data packets from one network to another.
tripwire
The act of forwarding data packets from one network to another.
recursive query
The act of forwarding data packets from one network to another.
IDS
The act of forwarding data packets from one network to another.
zone
The act of forwarding data packets from one network to another.
reverse lookup
The act of forwarding data packets from one network to another.
routing
The act of forwarding data packets from one network to another.
directive
The act of forwarding data packets from one network to another.
rules
The act of forwarding data packets from one network to another.
forward lookup
A common IDS for Linux that monitors files and directories.
tripwire
A common IDS for Linux that monitors files and directories.
recursive query
A common IDS for Linux that monitors files and directories.
IDS
A common IDS for Linux that monitors files and directories.
zone
A common IDS for Linux that monitors files and directories.
reverse lookup
A common IDS for Linux that monitors files and directories.
routing
A common IDS for Linux that monitors files and directories.
directive
A common IDS for Linux that monitors files and directories.
rules
A common IDS for Linux that monitors files and directories.
forward lookup
A portion of the Domain Name Space that is administered by one or more DNS servers.
tripwire
A portion of the Domain Name Space that is administered by one or more DNS servers.
recursive query
A portion of the Domain Name Space that is administered by one or more DNS servers.
IDS
A portion of the Domain Name Space that is administered by one or more DNS servers.
zone
A portion of the Domain Name Space that is administered by one or more DNS servers.
reverse lookup
A portion of the Domain Name Space that is administered by one or more DNS servers.
routing
A portion of the Domain Name Space that is administered by one or more DNS servers.
directive
A portion of the Domain Name Space that is administered by one or more DNS servers.
rules
A portion of the Domain Name Space that is administered by one or more DNS servers.
forward lookup
A line within a configuration file.
tripwire
A line within a configuration file.
recursive query
A line within a configuration file.
IDS
A line within a configuration file.
zone
A line within a configuration file.
reverse lookup
A line within a configuration file.
routing
A line within a configuration file.
directive
A line within a configuration file.
rules
A line within a configuration file.
forward lookup
A DNS name resolution request whereby an IP address is resolved to a FQDN.
tripwire
A DNS name resolution request whereby an IP address is resolved to a FQDN.
recursive query
A DNS name resolution request whereby an IP address is resolved to a FQDN.
IDS
A DNS name resolution request whereby an IP address is resolved to a FQDN.
zone
A DNS name resolution request whereby an IP address is resolved to a FQDN.
reverse lookup
A DNS name resolution request whereby an IP address is resolved to a FQDN.
routing
A DNS name resolution request whereby an IP address is resolved to a FQDN.
directive
A DNS name resolution request whereby an IP address is resolved to a FQDN.
rules
A DNS name resolution request whereby an IP address is resolved to a FQDN.
forward lookup
The components of a firewall that match specific network traffic that is to be allowed or dropped.
tripwire
The components of a firewall that match specific network traffic that is to be allowed or dropped.
recursive query
The components of a firewall that match specific network traffic that is to be allowed or dropped.
IDS
The components of a firewall that match specific network traffic that is to be allowed or dropped.
zone
The components of a firewall that match specific network traffic that is to be allowed or dropped.
reverse lookup
The components of a firewall that match specific network traffic that is to be allowed or dropped.
routing
The components of a firewall that match specific network traffic that is to be allowed or dropped.
directive
The components of a firewall that match specific network traffic that is to be allowed or dropped.
rules
The components of a firewall that match specific network traffic that is to be allowed or dropped.
forward lookup
A DNS resolution request that was resolved with the use of top-level DNS servers.
tripwire
A DNS resolution request that was resolved with the use of top-level DNS servers.
recursive query
A DNS resolution request that was resolved with the use of top-level DNS servers.
IDS
A DNS resolution request that was resolved with the use of top-level DNS servers.
zone
A DNS resolution request that was resolved with the use of top-level DNS servers.
reverse lookup
A DNS resolution request that was resolved with the use of top-level DNS servers.
routing
A DNS resolution request that was resolved with the use of top-level DNS servers.
directive
A DNS resolution request that was resolved with the use of top-level DNS servers.
rules
A DNS resolution request that was resolved with the use of top-level DNS servers.
forward lookup
A DNS name resolution request whereby a FQDN is resolved to an IP address.
tripwire
A DNS name resolution request whereby a FQDN is resolved to an IP address.
recursive query
A DNS name resolution request whereby a FQDN is resolved to an IP address.
IDS
A DNS name resolution request whereby a FQDN is resolved to an IP address.
zone
A DNS name resolution request whereby a FQDN is resolved to an IP address.
reverse lookup
A DNS name resolution request whereby a FQDN is resolved to an IP address.
routing
A DNS name resolution request whereby a FQDN is resolved to an IP address.
directive
A DNS name resolution request whereby a FQDN is resolved to an IP address.
rules
A DNS name resolution request whereby a FQDN is resolved to an IP address.
forward lookup
سؤال
A(n)____________________ number uniquely identifies a particular service.
سؤال
How does DHCP automatically configure IP addresses?
سؤال
What are the five main types of encryption supported by sshd?
سؤال
What methods can be used to physically secure local computers?
سؤال
The first DNS server in a zone is called the ____________________ DNS server.
سؤال
To share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.
سؤال
Computers that have more than one network interface are called ____________________ hosts.
سؤال
How can netfilter/iptables be used to create a firewall service?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/32
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 15: Configuring Network Services and Security
1
The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.

A)DirectoryIndex index.html
B)DocumentRoot index.html
C)Index index.html
D)UseIndex index.html
A
2
The ____ command displays all routers between the current computer and a remote computer.

A)route
B)maproute
C)findroute
D)traceroute
D
3
By default, the smb.conf file shares all printers and home directories for recognized Windows users.
True
4
Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.

A)continue
B)noshell
C)nokill
D)nohup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
5
The ____ zone configuration file contains a PTR record used to identify the loopback adapter.

A)/var/named/named.ca
B)/etc/named.conf
C)/var/named/named.local
D)/etc/named.loop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
6
To see what network services are running on your network, you can run the ____ command.

A)nmap
B)map
C)networkmap
D)nm
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
7
All DNS servers contain a DNS cache file.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
8
Large network daemons that are not started by the Internet Super Daemon and called ____ daemons.

A)self-sufficient
B)independent
C)autonomous
D)stand-alone
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
9
The ____ command can be used to switch your current user account to another.

A)swu
B)sudo
C)su
D)switchu
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
10
The FTP Server network service is a stand-alone service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
11
When configuring FTP, anonymous FTP access is granted by default.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
12
The ____ network service allows computers on a network the ability to share one connection to the Internet.

A)Squid Proxy Server
B)Samba Server
C)X Server
D)NIS Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
13
HTTP uses port ____.

A)TCP 20
B)TCP 25
C)TCP 80
D)TCP 110
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
14
The ____ network service resolves fully qualified domain names to IP addresses for a certain namespace on the Internet.

A)DHCP Server
B)Apache Web Server
C)BIND / DNS Server
D)NIS Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
15
The ____ IDS is a PERL-based program that is designed to work with AIDE to check the integrity of Linux computers remotely across a network.

A)Snort
B)SWATCH
C)PortSentry
D)ICU
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
16
If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
17
DNS uses ports ____.

A)TCP 20, 21
B)TCP 53, UDP 53
C)TCP 80, 81
D)TCP 69, UDP 69
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
18
A(n)____ is a program that can start a network daemon.

A)network bootstrapper
B)TCP wrapper
C)IP wrapper
D)daemon launcher
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
19
The ____ option to the iptables command can be used to specify the default policy for a certain chain type.

A)-P
B)-C
C)-p
D)-c
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
20
The ____ option to the iptables command can be used to specify the destination address of packets for a rule.

A)-D
B)-L
C)-F
D)-d
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
21
What is NIS? What is a master and slave NIS server? Give examples of configuration files that NIS is commonly used to coordinate.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
22
The ____________________ is typically used to start and manage connections for smaller network daemons such as the telnet, rlogin, and FTP daemons.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
23
____ is an IDS that involves modifying the Linux kernel to increase process and file security as well as detect security breaches.

A)ICU
B)LIDS
C)SWATCH
D)PortSentry
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match between columns
A program that can be used to detect unauthorized access to a Linux system.
tripwire
A program that can be used to detect unauthorized access to a Linux system.
recursive query
A program that can be used to detect unauthorized access to a Linux system.
IDS
A program that can be used to detect unauthorized access to a Linux system.
zone
A program that can be used to detect unauthorized access to a Linux system.
reverse lookup
A program that can be used to detect unauthorized access to a Linux system.
routing
A program that can be used to detect unauthorized access to a Linux system.
directive
A program that can be used to detect unauthorized access to a Linux system.
rules
A program that can be used to detect unauthorized access to a Linux system.
forward lookup
The act of forwarding data packets from one network to another.
tripwire
The act of forwarding data packets from one network to another.
recursive query
The act of forwarding data packets from one network to another.
IDS
The act of forwarding data packets from one network to another.
zone
The act of forwarding data packets from one network to another.
reverse lookup
The act of forwarding data packets from one network to another.
routing
The act of forwarding data packets from one network to another.
directive
The act of forwarding data packets from one network to another.
rules
The act of forwarding data packets from one network to another.
forward lookup
A common IDS for Linux that monitors files and directories.
tripwire
A common IDS for Linux that monitors files and directories.
recursive query
A common IDS for Linux that monitors files and directories.
IDS
A common IDS for Linux that monitors files and directories.
zone
A common IDS for Linux that monitors files and directories.
reverse lookup
A common IDS for Linux that monitors files and directories.
routing
A common IDS for Linux that monitors files and directories.
directive
A common IDS for Linux that monitors files and directories.
rules
A common IDS for Linux that monitors files and directories.
forward lookup
A portion of the Domain Name Space that is administered by one or more DNS servers.
tripwire
A portion of the Domain Name Space that is administered by one or more DNS servers.
recursive query
A portion of the Domain Name Space that is administered by one or more DNS servers.
IDS
A portion of the Domain Name Space that is administered by one or more DNS servers.
zone
A portion of the Domain Name Space that is administered by one or more DNS servers.
reverse lookup
A portion of the Domain Name Space that is administered by one or more DNS servers.
routing
A portion of the Domain Name Space that is administered by one or more DNS servers.
directive
A portion of the Domain Name Space that is administered by one or more DNS servers.
rules
A portion of the Domain Name Space that is administered by one or more DNS servers.
forward lookup
A line within a configuration file.
tripwire
A line within a configuration file.
recursive query
A line within a configuration file.
IDS
A line within a configuration file.
zone
A line within a configuration file.
reverse lookup
A line within a configuration file.
routing
A line within a configuration file.
directive
A line within a configuration file.
rules
A line within a configuration file.
forward lookup
A DNS name resolution request whereby an IP address is resolved to a FQDN.
tripwire
A DNS name resolution request whereby an IP address is resolved to a FQDN.
recursive query
A DNS name resolution request whereby an IP address is resolved to a FQDN.
IDS
A DNS name resolution request whereby an IP address is resolved to a FQDN.
zone
A DNS name resolution request whereby an IP address is resolved to a FQDN.
reverse lookup
A DNS name resolution request whereby an IP address is resolved to a FQDN.
routing
A DNS name resolution request whereby an IP address is resolved to a FQDN.
directive
A DNS name resolution request whereby an IP address is resolved to a FQDN.
rules
A DNS name resolution request whereby an IP address is resolved to a FQDN.
forward lookup
The components of a firewall that match specific network traffic that is to be allowed or dropped.
tripwire
The components of a firewall that match specific network traffic that is to be allowed or dropped.
recursive query
The components of a firewall that match specific network traffic that is to be allowed or dropped.
IDS
The components of a firewall that match specific network traffic that is to be allowed or dropped.
zone
The components of a firewall that match specific network traffic that is to be allowed or dropped.
reverse lookup
The components of a firewall that match specific network traffic that is to be allowed or dropped.
routing
The components of a firewall that match specific network traffic that is to be allowed or dropped.
directive
The components of a firewall that match specific network traffic that is to be allowed or dropped.
rules
The components of a firewall that match specific network traffic that is to be allowed or dropped.
forward lookup
A DNS resolution request that was resolved with the use of top-level DNS servers.
tripwire
A DNS resolution request that was resolved with the use of top-level DNS servers.
recursive query
A DNS resolution request that was resolved with the use of top-level DNS servers.
IDS
A DNS resolution request that was resolved with the use of top-level DNS servers.
zone
A DNS resolution request that was resolved with the use of top-level DNS servers.
reverse lookup
A DNS resolution request that was resolved with the use of top-level DNS servers.
routing
A DNS resolution request that was resolved with the use of top-level DNS servers.
directive
A DNS resolution request that was resolved with the use of top-level DNS servers.
rules
A DNS resolution request that was resolved with the use of top-level DNS servers.
forward lookup
A DNS name resolution request whereby a FQDN is resolved to an IP address.
tripwire
A DNS name resolution request whereby a FQDN is resolved to an IP address.
recursive query
A DNS name resolution request whereby a FQDN is resolved to an IP address.
IDS
A DNS name resolution request whereby a FQDN is resolved to an IP address.
zone
A DNS name resolution request whereby a FQDN is resolved to an IP address.
reverse lookup
A DNS name resolution request whereby a FQDN is resolved to an IP address.
routing
A DNS name resolution request whereby a FQDN is resolved to an IP address.
directive
A DNS name resolution request whereby a FQDN is resolved to an IP address.
rules
A DNS name resolution request whereby a FQDN is resolved to an IP address.
forward lookup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
25
A(n)____________________ number uniquely identifies a particular service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
26
How does DHCP automatically configure IP addresses?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
27
What are the five main types of encryption supported by sshd?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
28
What methods can be used to physically secure local computers?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
29
The first DNS server in a zone is called the ____________________ DNS server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
30
To share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
31
Computers that have more than one network interface are called ____________________ hosts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
32
How can netfilter/iptables be used to create a firewall service?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 32 في هذه المجموعة.