1.3 Given a scenario, configure and verify network connection parameters Flashcards

1
Q

Five address classes

A

The five address classes are as follows:

Class A: From 1 to 126; each of these permits up to 16,777,216 host addresses. There can be 126 Class A networks.

Class B: From 128 to 191; each of these permits up to 65,536 host addresses. There can be 16,382 Class B networks.

Class C: From 192 to 223; each of these permits up to 254 host addresses. There can be 2,097,150 Class C networks.

Class D: From 224 to 239; this range is reserved for activities such as multicast and is not usually available for host addresses.

Class E: From 240 to 254; this range is reserved for future use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Address class ranges come with their own built-in default subnet masks; only one can be the default per range

A

Class A: 255.0.0.0 or /8 for the number of bits that represent the network mask

Class B: 255.255.0.0 or /16 for the number of bits that represent the network mask

Class C: 255.255.255.0 or /24 for the number of bits that represent the network mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ping

A

The ping command is used to verify that a remote host can respond to a network connection

By default, the ping command will continuously send “pings” to the remote system until the user cancels the command (Ctrl-C). The -c option specifies a count of how many ping requests to send

ping -c 4 google.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

netstat

A

The netstat command is useful for displaying a variety of network information. It is a key utility when troubleshooting network issues. The following table describes common options for the netstat command

the following command will display all active TCP connections:

netstat -ta

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

nslookup

A

The nslookup command is designed to perform simple queries on DNS servers

nslookup google.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

dig

A

The dig command is useful for performing DNS queries on specific DNS servers

dig google.com

-f file

Use the content of file to perform multiple lookups; the file should contain one hostname per line.

-4

Only perform IPv4 queries.

-6

Only perform IPv6 queries.

-x address

Perform a reverse lookup (return the hostname when provided an IP address).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

host

A

The host command is normally used to perform simple hostname-to-IP-address translation operations (also called DNS queries)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

route

A

the route command can be used to display the routing table

This information can also be displayed with the ip command:

ip route show

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What command can be used to modify the default router?

A

route add default gw 192.168.1.10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ip

A

The ip command is a newer command that is designed to replace a collection of commands related to network interfaces

ip [options] object command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ethtool

A

The ethtool command is used to display and configure network device settings, such as the transmission speed and duplex value. Typically these settings are automatically configured through a process called auto-negotiation. With auto-negotiation, two network devices determine the best speed and duplex value and use that value automatically; however, these settings can also be manually set. The ethtool command also displays or modifies other useful network device settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ss

A

The ss command is used to display socket information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

iwconfig

A

The iwconfig command is used to display or set information about wireless network interfaces

f no arguments are provided, this command displays all network interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

nmcli

A

The nmcli command is used to configure NetworkManager, a tool designed to detect and configure network connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

brctl

A

The brctl command is used to create, modify, or view an Ethernet bridge. An Ethernet bridge connects separate networks into a single network from the perspective of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

nmtui

A

The nmtui command provides a text-based interface to configure NetworkManager

17
Q

/etc/sysconfig/network-scripts/

A

This directory is found on Red Hat–based distributions, such as Red Hat Enterprise Linux, CentOS, and Fedora. It contains a collection of files that are used to configure network devices

18
Q

/etc/sysconfig/network

A

This file is found on Red Hat–based distributions, such as Red Hat Enterprise Linux, CentOS, and Fedora. It contains basic networking information:

19
Q

/etc/hosts

A

The /etc/hosts file is where hostname-to-IP-address translation is defined

In most cases, this file is only used for the local host itself or hosts on the local network. Normally hostname-to-IP-address translation is handled by a DNS server

20
Q

/etc/network

A

The /etc/network directory is the traditional location where Debian-based network files are stored. This include the Debian, Ubuntu, and MintOS distributions

Note that on some systems, such as Ubuntu, /etc/network/interfaces has been replaced by configuration files in the /etc/netplan directory

21
Q

/etc/nsswitch.conf

A

The Name Service Switch (NSS) configuration file, /etc/nsswitch.conf, is used by applications to determine the sources from which to obtain name service information, as well as in what order

22
Q

/etc/resolv.conf

A

The /etc/resolv.conf file contains a list of the DNS servers for the system. A typical file looks like the following

If you are using a utility such as NetworkManager to configure your network settings or are using a DHCP client, then this file is normally populated by those utilities. For servers, this file is typically manually defined

23
Q

/etc/netplan

A

The /etc/netplan directory is the new location where network configuration files are stored on Ubuntu and some other Debian-based distributions. The format of these files is YAML (YAML Ain’t Markup Language), a file format that is similar to JSON

24
Q

/etc/sysctl.conf

A

The /etc/sysctl.conf file is used to specify which kernel settings to enable at boot

25
Q

/etc/dhcpd.conf

A

The /etc/dhcpd.conf file is used to configure a DHCP server. After the DHCP server packages have been installed, a sample dhcpd.conf file will be placed in the /usr/share/doc directory structure (the /usr/share/doc/dhcp*/dhcpd.conf.sample file). Usually the administrator who configures the DHCP server copies this sample file to the /etc directory and modifies it to fit the local network

26
Q

Bonding

A

The purpose of bonding is to have the system treat multiple network interfaces as if they were a single network interface. This provides much greater bandwidth than a single network interface can manage. This section discusses the concept of bonding

27
Q

Aggregation

A

Aggregation is the core concept of bonding. To create a network bond, you need to put together two or more network interfaces into a single cluster. This is the very definition of aggregation.

Aggregation can be managed manually, by first creating a network bond and then adding devices to the bond

28
Q

Active/Passive

A

Network bonding supports several modes. One mode is referred to as “active-backup,” in which only one device is active and the other devices are backups in the event the active device goes down

29
Q

Load Balancing

A

There are several bonding modes that affect load balancing. Load balancing allows the system to share the traffic between different network devices based on some criteria (speed of device, round robin, and so on)

30
Q

mode=0

A

Balanced round robin: Packets are transmitted in a round-robin approach; each slave device gets the same number of packets

31
Q

mode=2

A

XOR: Transmit interface is based on an XOR operation using source and destination MAC addresses

32
Q

mode=3

A

Broadcast: All packets are broadcast on all salve devices

33
Q

mode=4

A

802.3ad: Creates network bonds for devices that share the same speed and duplex settings. Requires ethtool be installed to perform a probe of network devices

34
Q

mode=5

A

Adaptive transmit load balancing: Load balancing based on criteria such as the speed of the network slave devices

35
Q

mode=6

A

Adaptive load balancing: Similar to mode=5, but also performs MAC address rewriting in the network packets