Deck 17: Networking in a Linux Environment

Full screen (f)
exit full mode
Question
A host can be the master server for more than one domain.
Use Space or
up arrow
down arrow
to flip the card.
Question
A host can be a slave server for only one domain.
Question
A client belongs to only one domain.
Question
The Broken server setting is considered to be a security risk.
Question
For security reasons, automatic login should be enabled when using NIS.
Question
Databases that store shared configuration information related to NIS networks are called ____.

A) domains
B) mirrors
C) maps
D) portmappers
Question
The NIS ____ server, at the center of the NIS network, contains the NIS maps and makes them available over the network.

A) master
B) client
C) primary
D) central
Question
NIS ____ servers distribute the NIS master server's load more evenly.

A) slave
B) client
C) secondary
D) mirror
Question
The NIS ____ determines which NIS server should process the client request.

A) queue
B) domain
C) portmapper
D) driver
Question
For NIS to operate correctly, the RPC ____ must run on both the NIS client and server.

A) client
B) map
C) domain
D) portmapper
Question
When the NIS server starts, it communicates with the listening ____ and the RPC program number it's intended to serve.

A) IP address
B) queue
C) port
D) domain
Question
The RPC ____ uniquely identifies an RPC service.

A) domain name
B) program number
C) runlevel
D) port number
Question
If you want to make any changes in NIS maps, you have to make them on the NIS ____ server.

A) local
B) client
C) master
D) primary
Question
To start the YaST NIS Server module, use the ____ command.

A) start yast2 nis-srvr
B) start yast2 nis-server
C) yast2 nis-srvr
D) yast2 nis-server
Question
If a user wants to switch to another shell, the shell must be in the ____ configuration file.

A) /etc/group
B) /etc/protocols
C) /etc/shells
D) /etc/temp/shells
Question
After the NIS server and client are installed, the ____ directory is created on the same computer to store all the NIS maps.

A) /nis/srv
B) /etc/srv
C) /var/yp/
D) /maps
Question
What is the extension for the NIS map data file?

A) .dat
B) .mpd
C) .pag
D) .dir
Question
To start the NIS Client module, you use the ____ command.

A) start yast2 nis-clnt
B) start yast2 nis-client
C) yast2 nis-clnt
D) yast2 nis-client
Question
By default, NIS configuration is handled by the ____.

A) CUPS software
B) DHCP server
C) netconfig script
D) portmapper
Question
Unprivileged ports are ____ and higher.

A) 128
B) 256
C) 512
D) 1024
Question
A printer ____ is software used to manage the printer device.

A) driver
B) subroutine
C) domain
D) cookie
Question
A print ____ is a directory file where the printer daemon can store print jobs so that multiple users can use the same printer device.

A) driver
B) queue
C) domain
D) map
Question
A(n) ____ printer queue is located on another host in the network, not on your local computer.

A) local
B) confined
C) remote
D) offline
Question
Typically, CUPS is used to print with ____ print queues.

A) offline
B) remote
C) local
D) confined
Question
____ is used to assign IP addresses automatically for each network host.

A) DHCP
B) UDP
C) SMTP
D) TCP
Question
To start the DHCP module, you use the ____ command.

A) yast2 dhcp-server
B) yast2 dhcp
C) start yast2 -dhcp
D) start -dhcp
Question
____________________ is a client/server protocol that centralizes user and group IDs by providing database access so that network computers can share configuration information.
Question
All hosts in an NIS-based network, including the master and slave servers, are called NIS ____________________.
Question
A(n) ____________________ is a set of NIS maps shared by the NIS master and slave servers.
Question
The ____________________ provides a printing interface on a local network.
Question
A printer ____________________ is the physical printer that transfers a print job from a computer to actual hard copy.
Question
Match each statement with an item

-An NIS map that contains group-related information.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Question
Match each statement with an item

-An NIS map that contains user attributes.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Question
Match each statement with an item

-An NIS map that contains encrypted passwords for users whose attributes are in the /etc/passwd file.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Question
Match each statement with an item

-An NIS map that is used with the mail service.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Question
Match each statement with an item

-An NIS map that contains hostnames and IP addresses of computers connected over a TCP/IP network.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Question
Match each statement with an item

-An NIS map that contains NIS network names.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Question
Match each statement with an item

-An NIS map that identifies the names and numbers assigned to network protocols.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Question
Match each statement with an item

-An NIS configuration file that is used to push updated maps to the NIS slave server.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Question
Match each statement with an item

-An NIS configuration file that specifies NIS clients' access rights to the NIS server.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Question
Explain how NIS uses Remote Procedure Calls (RPC) technology.
Question
Briefly explain how to obtain an NIS client and an NIS server.
Question
In the Master server Setup window, describe the "Allow changes to passwords" option.
Question
What is the purpose of the NIS Server Query Hosts Setup window?
Question
What file are contained in each NIS map?
Question
How do you modify the NIS configuration?
Question
Briefly describe the Netconfig tool.
Question
Explain why you would select the Broadcast check box when configuring an NIS client.
Question
Briefly describe how Common UNIX Printing System (CUPS) works.
Question
Summarize the settings you can make in the DHCP module windows.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 17: Networking in a Linux Environment
1
A host can be the master server for more than one domain.
False
2
A host can be a slave server for only one domain.
False
3
A client belongs to only one domain.
True
4
The Broken server setting is considered to be a security risk.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
For security reasons, automatic login should be enabled when using NIS.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Databases that store shared configuration information related to NIS networks are called ____.

A) domains
B) mirrors
C) maps
D) portmappers
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
The NIS ____ server, at the center of the NIS network, contains the NIS maps and makes them available over the network.

A) master
B) client
C) primary
D) central
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
NIS ____ servers distribute the NIS master server's load more evenly.

A) slave
B) client
C) secondary
D) mirror
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
The NIS ____ determines which NIS server should process the client request.

A) queue
B) domain
C) portmapper
D) driver
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
For NIS to operate correctly, the RPC ____ must run on both the NIS client and server.

A) client
B) map
C) domain
D) portmapper
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
When the NIS server starts, it communicates with the listening ____ and the RPC program number it's intended to serve.

A) IP address
B) queue
C) port
D) domain
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
The RPC ____ uniquely identifies an RPC service.

A) domain name
B) program number
C) runlevel
D) port number
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
If you want to make any changes in NIS maps, you have to make them on the NIS ____ server.

A) local
B) client
C) master
D) primary
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
To start the YaST NIS Server module, use the ____ command.

A) start yast2 nis-srvr
B) start yast2 nis-server
C) yast2 nis-srvr
D) yast2 nis-server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
If a user wants to switch to another shell, the shell must be in the ____ configuration file.

A) /etc/group
B) /etc/protocols
C) /etc/shells
D) /etc/temp/shells
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
After the NIS server and client are installed, the ____ directory is created on the same computer to store all the NIS maps.

A) /nis/srv
B) /etc/srv
C) /var/yp/
D) /maps
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
What is the extension for the NIS map data file?

A) .dat
B) .mpd
C) .pag
D) .dir
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
To start the NIS Client module, you use the ____ command.

A) start yast2 nis-clnt
B) start yast2 nis-client
C) yast2 nis-clnt
D) yast2 nis-client
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
By default, NIS configuration is handled by the ____.

A) CUPS software
B) DHCP server
C) netconfig script
D) portmapper
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
Unprivileged ports are ____ and higher.

A) 128
B) 256
C) 512
D) 1024
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
A printer ____ is software used to manage the printer device.

A) driver
B) subroutine
C) domain
D) cookie
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
A print ____ is a directory file where the printer daemon can store print jobs so that multiple users can use the same printer device.

A) driver
B) queue
C) domain
D) map
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ____ printer queue is located on another host in the network, not on your local computer.

A) local
B) confined
C) remote
D) offline
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Typically, CUPS is used to print with ____ print queues.

A) offline
B) remote
C) local
D) confined
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
____ is used to assign IP addresses automatically for each network host.

A) DHCP
B) UDP
C) SMTP
D) TCP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
To start the DHCP module, you use the ____ command.

A) yast2 dhcp-server
B) yast2 dhcp
C) start yast2 -dhcp
D) start -dhcp
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
____________________ is a client/server protocol that centralizes user and group IDs by providing database access so that network computers can share configuration information.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
All hosts in an NIS-based network, including the master and slave servers, are called NIS ____________________.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A(n) ____________________ is a set of NIS maps shared by the NIS master and slave servers.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The ____________________ provides a printing interface on a local network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
A printer ____________________ is the physical printer that transfers a print job from a computer to actual hard copy.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Match each statement with an item

-An NIS map that contains group-related information.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Match each statement with an item

-An NIS map that contains user attributes.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
Match each statement with an item

-An NIS map that contains encrypted passwords for users whose attributes are in the /etc/passwd file.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Match each statement with an item

-An NIS map that is used with the mail service.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match each statement with an item

-An NIS map that contains hostnames and IP addresses of computers connected over a TCP/IP network.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
Match each statement with an item

-An NIS map that contains NIS network names.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match each statement with an item

-An NIS map that identifies the names and numbers assigned to network protocols.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match each statement with an item

-An NIS configuration file that is used to push updated maps to the NIS slave server.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match each statement with an item

-An NIS configuration file that specifies NIS clients' access rights to the NIS server.

A) /etc/group
B) /etc/passwd
C) /etc/shadow
D) /etc/aliases
E) /etc/hosts
F) /etc/networks
G) /etc/protocols
H) /var/yp/Makefile
I) /var/yp/securenets
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Explain how NIS uses Remote Procedure Calls (RPC) technology.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Briefly explain how to obtain an NIS client and an NIS server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
In the Master server Setup window, describe the "Allow changes to passwords" option.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
What is the purpose of the NIS Server Query Hosts Setup window?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
What file are contained in each NIS map?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
How do you modify the NIS configuration?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Briefly describe the Netconfig tool.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Explain why you would select the Broadcast check box when configuring an NIS client.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Briefly describe how Common UNIX Printing System (CUPS) works.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Summarize the settings you can make in the DHCP module windows.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.