Deck 12: Network Configuration

Full screen (f)
exit full mode
Question
The simplest method for mapping host names to IP addresses is by placing entries into the /etc/hosts file. _________________________
Use Space or
up arrow
down arrow
to flip the card.
Question
The ____ command sends a small TCP/IP packet to another IP address and awaits a response.

A) ping
B) ring
C) png
D) ipquery
Question
A route table is a list of TCP/IP networks that is stored in system memory.
Question
The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.

A) 1.1.1.1; 255.255.255.255
B) 0.0.0.0; 255.255.255.255
C) 0.0.0.0; 256.256.256.256
D) 1.1.1.1; 256.256.256.256
Question
Class D addresses are used for multicasting.
Question
Directed communication from one computer to another single computer using TCP/IP is referred to as a(n) unicast. _________________________
Question
SLIP is a newer technology than PPP.
Question
The subnet mask for a Class B IP address is ____.

A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
Question
The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

A) ipconfig
B) ifconf
C) ipconf
D) ifconfig
Question
The most common LAN protocol used today is ____.

A) UDP/IP
B) IPX/SPX
C) TCP/IP
D) DLC
Question
IPv6 IP addresses are delimited by the ____ character.

A) ;
B) :
C) .
D) ,
Question
IPv6 IP addresses are written using eight 16-bit ____ numbers.

A) hexadecimal
B) decimal
C) binary
D) octal
Question
The most common media access method used to send TCP/IP packets onto network media is called Token Ring. _________________________
Question
Home users can use a LAN, but not a WAN.
Question
The ssh command has traditionally been used to obtain a command-line shell on remote Linux servers. _________________________
Question
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets.
Question
In an IP address, the host ID represents the network on which the computer is located. _________________________
Question
Computer names are called ____.

A) host IDs
B) network names
C) host names
D) network IDs
Question
Each octet in an IP address represents a(n) ____ binary number.

A) 4-bit
B) 8-bit
C) 4-byte
D) 8-byte
Question
The subnet mask for a Class C IP address is ____.

A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
Question
The IP address of the network interface on the router to which you send packets is called the ____________________.
Question
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
The networks in which the computers are all in close physical proximity.
Question
A common utility used to troubleshoot routing is the ____ command.

A) route
B) ip
C) traceroute
D) route add
Question
The /etc/resolv.conf file can contain up to ____ DNS servers.

A) two
B) three
C) four
D) five
Question
____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.
Question
You can view or set the host name for a Linux computer using the ____________________ command.
Question
Remote computers can connect to a configured VNC server using the ____ command.

A) vncpasswd
B) vnc
C) vncviewer
D) vncconnect
Question
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A utility that can be used to run remote applications on a Linux computer.
Question
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A company that provides Internet access.
Question
A network ____________________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.
Question
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A host name that follows DNS convention.
Question
One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.

A) /etc/hosts.trusted
B) /etc/hosts.tr
C) /etc/hosts.eq
D) /etc/hosts.equiv
Question
____ is a remote administration tool that encrypts information that passes across the network.

A) Telnet
B) Virtual Network Computing (VNC)
C) Remote commands
D) Secure Shell (SSH)
Question
Two or more computers that are connected with media that can exchange information are called a(n) ____________________.
Question
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A utility that can be used to obtain graphical utilities from a remote Linux computer in order to perform system administration.
Question
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
Question
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A hierarchical namespace used for host names.
Question
The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.

A) ssh
B) slogin
C) telnet
D) rlogin
Question
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A notation that is often used to represent an IP address and its subnet mask.
Question
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
The networks in which computers are separated geographically by large distances.
Question
Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?
Question
Describe the telnet and SSH utilities. What is the difference between them?
Question
What is a subnet mask? What purpose does it serve? How is it used to determine the network ID of an IP address?
Question
How do you configure a NIC? What do you do if the NIC is not detected during installation?
Question
What is VNC? How does it transfer graphics across the network?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Network Configuration
1
The simplest method for mapping host names to IP addresses is by placing entries into the /etc/hosts file. _________________________
True
2
The ____ command sends a small TCP/IP packet to another IP address and awaits a response.

A) ping
B) ring
C) png
D) ipquery
A
3
A route table is a list of TCP/IP networks that is stored in system memory.
True
4
The IP addresses ____ and ____ are not allowed to be assigned to a host computer because they refer to all networks and all computers on all networks, respectively.

A) 1.1.1.1; 255.255.255.255
B) 0.0.0.0; 255.255.255.255
C) 0.0.0.0; 256.256.256.256
D) 1.1.1.1; 256.256.256.256
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Class D addresses are used for multicasting.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Directed communication from one computer to another single computer using TCP/IP is referred to as a(n) unicast. _________________________
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
SLIP is a newer technology than PPP.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
The subnet mask for a Class B IP address is ____.

A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
The ____ command can be used to assign a TCP/IP configuration to a NIC as well as view the configuration of all network interfaces in the computer.

A) ipconfig
B) ifconf
C) ipconf
D) ifconfig
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
The most common LAN protocol used today is ____.

A) UDP/IP
B) IPX/SPX
C) TCP/IP
D) DLC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
IPv6 IP addresses are delimited by the ____ character.

A) ;
B) :
C) .
D) ,
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
IPv6 IP addresses are written using eight 16-bit ____ numbers.

A) hexadecimal
B) decimal
C) binary
D) octal
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
The most common media access method used to send TCP/IP packets onto network media is called Token Ring. _________________________
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
Home users can use a LAN, but not a WAN.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
The ssh command has traditionally been used to obtain a command-line shell on remote Linux servers. _________________________
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
Passwords used by the PPP daemon are stored in two files: /etc/ppp/pap-secrets and /etc/ppp/chap-secrets.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
In an IP address, the host ID represents the network on which the computer is located. _________________________
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Computer names are called ____.

A) host IDs
B) network names
C) host names
D) network IDs
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
Each octet in an IP address represents a(n) ____ binary number.

A) 4-bit
B) 8-bit
C) 4-byte
D) 8-byte
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The subnet mask for a Class C IP address is ____.

A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
The IP address of the network interface on the router to which you send packets is called the ____________________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
The networks in which the computers are all in close physical proximity.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
A common utility used to troubleshoot routing is the ____ command.

A) route
B) ip
C) traceroute
D) route add
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
The /etc/resolv.conf file can contain up to ____ DNS servers.

A) two
B) three
C) four
D) five
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
____________________ is the process in which a single large network is subdivided into several smaller networks to control traffic flow and improve manageability.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
You can view or set the host name for a Linux computer using the ____________________ command.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
Remote computers can connect to a configured VNC server using the ____ command.

A) vncpasswd
B) vnc
C) vncviewer
D) vncconnect
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A utility that can be used to run remote applications on a Linux computer.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A company that provides Internet access.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
A network ____________________ breaks information down into packets that can be recognized by workstations, routers, and other devices on a network.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A host name that follows DNS convention.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
One method of setting up trusted access is to add the host names of computers to the ____ file on the remote computer.

A) /etc/hosts.trusted
B) /etc/hosts.tr
C) /etc/hosts.eq
D) /etc/hosts.equiv
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
____ is a remote administration tool that encrypts information that passes across the network.

A) Telnet
B) Virtual Network Computing (VNC)
C) Remote commands
D) Secure Shell (SSH)
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
Two or more computers that are connected with media that can exchange information are called a(n) ____________________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A utility that can be used to obtain graphical utilities from a remote Linux computer in order to perform system administration.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A utility that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A hierarchical namespace used for host names.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The ____ utility can be used to obtain a shell from a remote computer on the network without specifying a password.

A) ssh
B) slogin
C) telnet
D) rlogin
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
A notation that is often used to represent an IP address and its subnet mask.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
Match each term with the correct statement below.
a.SSH
f.CIDR
b.DNS
g.WANs
c.ISP
h.X Windows
d.FQDN
i.LANs
e.telnet
The networks in which computers are separated geographically by large distances.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
Discuss modems, ISDN, and DSL. What types of data transfer speeds are each of these capable of? How are they typically configured?
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
Describe the telnet and SSH utilities. What is the difference between them?
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
What is a subnet mask? What purpose does it serve? How is it used to determine the network ID of an IP address?
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
How do you configure a NIC? What do you do if the NIC is not detected during installation?
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
What is VNC? How does it transfer graphics across the network?
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.