• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/68

Click to flip

68 Cards in this Set

  • Front
  • Back
IPv6 is considered the IPng (IP Next Generation protocol) with up to 2128 available addresses.
True
Assuming your are logging into a computer at CGCC. That computer will keep its dynamic IP address during your single login session.
True
User Datagram Protocol (UDP) is a connection-oriented protocol, also known as a stream-based protocol. UDP streams packets of data.
False
IPv4 is limited to 264 IP addresses
False
The difference between the Internet and an intranet is that the Internet transmits only one protocol suite: IP. In contrast, an intranet can be set up to use a number of protocols such as IP, IPX, AppleTalk, DECnet, XNS, or other protocols developed by vendors over the years.
True
TCP is a datagram-oriented protocol, also known as a datagram-based protocol. Each datagram must carry its own address and port information.
False
The IP and ISO model both use the seven-layer protocol model.
False
The Transmission Control Protocal(TCP) is most frequently run beneath the IP layer in combination referred to as IP/TCP. This protocol does not provides error recovery nor guaranteed delivery of transmitted packets.
False
In the route command output, the ________ field specifies the network mask used to identify the network ID portion of any IP address that is part of the destination network identified on that line.
Genmask
You can stop the Ethernet interface, eth0, using the command /etc/sysconfig/network-scripts/_____ eth0 rather than ifconfig and service network stop.
ifdown
A(n) ________ address identifies a special IP address that sends a packet of data to all computers on the local network.
broadcast
The output of _________ shows you the last router reached by the packet
traceroute
TCP is a datagram-oriented protocol, also known as a datagram-based protocol. Each ________ must carry its own address and port information.
packet
To exchange information over a network, computers must communicate using a common language, or _______
protocol
A ____ IP address is one that always remains the same
static
When you issue the command ifconfig eth0 you'll see the MAC address called what?
hwaddr
A _____ is a unit of data that the network card transmits.
packet
What command allows you to configure the routing table?
route
Which routing daemon supports OSPF for Linux?
gated
In the /etc/resolv.conf file, the ____ keyword causes the resolver to use each of the listed name servers in turn instead of always trying the first one listed.
rotate
UDP runs at layer __ of the IP stack
4
The configuration file controls how a process looks up various databases containing information regarding hosts, users (passwords), groups, etc. Each database comes from a source (such as local files, DNS, NIS, and cache), and the order to look up the sources is specified in
/etc/nsswitch.conf
When using traceroute, how many timing values are shown for each router?
3
ping is used to test networking connections by:
trying to contact systems that are progressively further from your host to see if any networking problems occur.
traceroute is a useful troubleshooting tool because:
It reports each router that a packet passes through to a remote computer, along with the time needed to reach that router.
A default route is normally defined at the same time Linux networking is configured on any host. This allows Linux to
Send packets addressed to other segments to the "gateway" out of the local segment.
Forwarding packets refers to:
Transferring them from the segment on which they originate to a different segment to which they are addressed.
If an IP stack does not have the MAC address of the system it needs to communicate with, it must
Use arp to obtain the MAC address directly, caching it for future communications with the same remote system.
In the Network Configuration window of system-config-network, you can use the New button while viewing the ___ tab to help you locate and configure the correct kernel module for any networking hardware you have added since you installed Linux.
Hardware
Networking devices differ from other Linux devices in that
Networking devices are not directly visible in the /dev subdirectory but are created on the fly when a networking device module is loaded into the kernel.
On Linux systems, the most common interface to the DNS is?
BIND
The telnet utility uses which protocol?
TCP
The purpose of a routing protocol is to
Facilitate the exchange of routing table entries among routers.
When configuring an Ethernet device using system-config-network, the ___ tab allows you to select whether to use DHCP or assign a static IP address.
Hardware Device
When using traceroute, how many timing values are shown for each router?
3
When using anonymous FTP, what should be used as your password?
your email address
When using ftp, the ___ command is used to upload multiple files using a regular expression (such as *.html)
mput
When viewing traceroute output, if an asterisk (*) appears in the listing, the router did not respond with the default time limit of ____
5 seconds
Which information field is not part of the output of the route command?
The MAC address of the interface used to transfer packets to the specified network
Which of the following is not included in the output of the traceroute command?
the size of the test packet sent by traceroute
Which utility is more secure for transmitting data?
ssh
_____ is a distributed service.
DNS
_____ routing protocols route packets based on administration policies.
Exterior
_____Routing protocols route packets based on mathematical models.
Interior
You can get the IP and/or hostname information from a DNS server. The DNS server has the ability to do a reverse look. _______ is the process of converting a domain name to an IP address, or vice versa.
Resolving
Each Ethernet card has a number assigned to it by the manufacturer: This is called the:
Media Access Control address
How would you refer to the first Ethernet card on a Linux system?
/dev/eth0
I want to permanently enable IP forwarding. What file do I need to edit?
/etc/sysctl.conf
IP Forwarding is enabled by which command:
echo 1 > /proc/sys/net/ipv4/ip_forward
Name services such as DNS are used to:
Translate between human readable domain names and IP address.
What is the name of the file in the directory /etc/sysconfig/network-scripts/ that is used to configure the first Ethernet device?
ifcfg-eth0
Which command is used to start the Ethernet interface eth0?
/etc/sysconfig/network-scripts/ifup eth0
Which is not a valid ifconfig command?
ifconfig eth0 ifup
Which is not a valid configuration file mentioned in this chapter?
/etc/resolver.conf
Which of the following output fields from the route command is not used by the Linux kernel? Ref was one of two output fields not used by the Linux kernel.
Metric - The number of hops (how many routers) needed to reach the specified network.
Which statement is true about the following command:
route add -net 192.168.20.0 netmask 255.255.255.0 gw 192.168.10.1 dev eth0
It is valid and defines the router that can reach network 192.168.20.0
Where might I find the hostname of a system?
/etc/hosts
Where might I find the IP address of the system?
/etc/sysconfig/network-scripts/ifcfg-eth0
Internet
The largest internet in the world. The Internet is a multilevel hierarchy composed of backbone networks, midlevel networks, and stub networks.
intranet
An in house network designed to server a group of people such as a corportation or school.
LAN
A network that connects computers within a localized area.
WAN
A network that interconnects LANs and MANs, spanning a large geographic area.
MAN
A network that connects computers and LANs at multiple sites in a small regional area, such as a city.
The _____ layer of the IP protocol, called the physical layer, describes the physical medium and the data encoding used to transmit signals on that medium.
first
The ______ layer, called the data link layer, covers media access by network devices and describes how to put data into packets, transmit the data, and check it for errors.
second
The ______ layer, called the network layer, frequently uses IP and addresses and routes packets
third
The ______ layer, called the transport layer, is where TCP and UDP exist. This layer provides a means for applications to communicate with each other. This layer is responsible for dividing data streams into packets. It also performs port addressing, which allows it to distinguish among different services using the same transport protocol.
fourth
Anything above the transport layers is the domain of the application and is part of the ______ layer.
fifth