Chapter 12 - Network Configuration Flashcards

1
Q

A portion of an IPv4 address that represents eight binary bits.

A

octet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A series of four 8-bit numbers that determine the network and host portions of an IP address.

A

subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Used to start the VNC server process for a user.

A

vncserver command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Used to connect to a SSH daemon on a remote computer.

A

ssh command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The act of forwarding data packets from one network to another.

A

routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A table of information used to indicate which networks are connected to network interfaces.

A

route table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Used to manipulate the route table.

A

route command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The IP address of the router on the network used to send packets to remote networks

A

default gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A protocol used by computers to obtain an IPv6 configuration from a router on the network.

A

Internet Control Message Protocol version 6 (ICMPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The computers that have more than one network interface.

A

multihomed hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Used to set and display the configuration of wireless network interfaces.

A

iwconfig command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Used to configure a DSL connection on Ubuntu systems.

A

pppoeconf command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A Systemd daemon that manages the configuration of network interfaces.

A

Systemd-networkd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The most common WAN protocol used to send TCP/IP packets across a telephone line.

A

Point-to-Point Protocol (PPP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The asymmetric public and private keys on a computer running sshd. They are used to negotiate the symmetric key at the beginning of an SSH session.

A

SSH host keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The most common network protocol used on the Internet. It provides for reliable communication.

A

Transmission Control Protocol/Internet Protocol (TCP/IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A graphical NetworkManager utility that can be used to configure additional network interfaces and related technologies, such as DSL.

A

Network Connections tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A technology that allows a router to obtain Internet resources on behalf of computers on the network.

A

Network Address Translation (NAT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A package of data formatted by a network protocol.

A

packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Used to start a text version of the Network Connections tool that is part of NetworkManager.

A

nmtui command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Used to configure routing protocols, such as RIP and OSPF, on a Linux system. It is part of the optional Quagga package.

A

zebra command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A system that defines how computers on a network share access to the physical medium.

A

media access method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Used to trace the path an IPv4 packet takes through routers to a destination host.

A

traceroute command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Used to obtain a shell on a remote computer running a Telnet daemon.

A

telnet command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Used to set a VNC connection password for a user.
vncpasswd command
26
The most common version of IP used on the Internet. It uses a 32-bit addressing scheme organized into different classes
IP version 4 (IPv4)
27
IP communication that is destined for a single computer.
unicast
28
The portion of an IP address that denotes the host.
host ID
29
A network daemon that is used to start other network daemons on demand.
Extended Internet Super Daemon (xinetd)
30
A recent version of IP that is used by some hosts on the Internet. It uses a 128-bit addressing scheme
IP version 6 (IPv6)
31
Used to generate or regenerate SSH encryption keys.
ssh-keygen command
32
A graphical utility that can be used to configure modem settings on Linux systems.
Modem Manager utility
33
Used to change the host name of a computer as well as ensure that the new host name is loaded at boot time.
hostnamectl command
34
A media access method commonly used by industrial networks.
Token Ring
35
The act of forwarding TCP/IP packets from one network to another
IP forwarding
36
Used to obtain IP configuration for a network interface from a DHCP or BOOTP server on the network.
dhclient command
37
Used to start the SSH agent process.
ssh-agent command
38
A set of rules of communication used between computers on a network.
protocol
39
The process by which binary bits are compared to calculate the network and host IDs from an IP address and subnet mask
ANDing
40
Used to resolve host names to IP addresses.
host command
41
Of the 65,535 possible ports, the ports from 0 to 1023, which are used by common networking services.
well-known ports
42
Used to display and configure network interfaces using NetworkManager.
nmcli command
43
A daemon that is started without the use of xinetd.
stand-alone daemon
44
The hardware address that uniquely identifies a network interface.
Media Access Control (MAC) address
45
The process of merging two separate networks using the NICs on a server.
bridging
46
Used to view and modify files stored under /proc/sys.
sysctl command
47
The protocol used by DSL to send PPP information over an Ethernet connection.
PPP over Ethernet (PPPoE)
48
Used to resolve host names to IP addresses
dig command
49
A protocol used on the Internet to provide error messages and network-related information
Internet Control Message Protocol (ICMP)
50
Used to configure a DSL connection on Fedora systems.
pppoe-setup command
51
A program used to connect to a VNC server and obtain a graphical desktop.
VNC viewer
52
A company that provides Internet access.
Internet service provider (ISP)
53
A network in which computers are separated geographically by large distances.
wide area network (WAN)
54
The process in which a single large network is subdivided into several smaller networks.
subnetting
55
A term that refers to the worldwide collection of small Internet-connected devices
Internet of Things (IoT)
56
Used to check connectivity on an IPv4 network.
ping (Packet Internet Groper) command
57
A LAN technology that uses Ethernet to transmit data over the air.
Wireless-Fidelity (Wi-Fi)
58
A number that uniquely identifies a network service.
port
59
Used to display and modify the IP configuration information for a network interface.
ifconfig (interface configuration) command
60
A process that responds to network requests.
network service
61
The portion of an IP address that denotes the network.
network ID
62
Used to check connectivity on an IPv6 network.
ping6 command
63
A protocol used to encapsulate IPv6 packets within an IPv4 network.
Teredo
64
The process of combining two NICs on the same network to provide fault tolerance or load balancing
bonding
65
Used to trace the path an IPv4 packet takes through routers to a destination host.
tracepath command
66
A network in which the computers are all in close physical proximity.
local area network (LAN)
67
Used to copy SSH user keys to the home directory of a user on another computer to allow for simplified authentication.
ssh-copy-id command
68
A data format based on JSON that is commonly used for configuration files.
YAML (YAML Ain’t Markup Language)
69
A network testing utility. It is often used to test the functionality of services on the network.
ncat (net cat) command
70
A user-friendly name assigned to a computer.
host name
71
A technology used to allow hardware devices to communicate directly with each other without accessing the CPU of the system. It is often used by network technologies such as Infiniband.
Remote Direct Memory Access (RDMA)
72
A technology that can be used to run remote applications on a Linux computer; it encrypts all client-server traffic.
Secure Shell (SSH)
73
Used to display network information and active connections.
netstat command
74
A notation that is often used to represent an IP address and its subnet mask.
classless interdomain routing (CIDR) notation
75
Used to trace the path an IPv6 packet takes through routers to a destination host.
traceroute6 command
76
Used to start the graphical Network Connections tool that is part of NetworkManager.
nm-connection-editor command
77
Used to resolve host names to IP addresses.
nslookup command
78
Used to configure and display NIC hardware settings.
ethtool command
79
A TCP/IP communication destined for all computers on a network.
broadcast
80
A virtual network that overlays an existing TCP/IP network. Any data sent on this virtual network is encrypted.
Virtual Private Network (VPN)
81
Used to trace the path an IPv6 packet takes through routers to a destination host.
tracepath6 command
82
IP communication destined for a certain group of computers.
multicast
83
A cross-platform SSH client.
Putty
84
Used to display network connections.
ss (socket statistics) command
85
Used to obtain information about the organization that maintains a DNS domain.
whois command
86
Used to display and change the host name of a computer.
hostname command
87
A graphical utility in Fedora 28 that can be used to configure settings for the network interfaces on the system.
Network utility
88
A software component that manages the configuration of network interfaces.
NetworkManager
89
Used to trace the path an IPv4 or IPv6 packet takes through routers to a destination host.
mtr command
90
Used to add SSH user keys to the SSH agent process.
ssh-add command
91
The most common media access method used in networks today.
Ethernet
92
Used to display and configure network interfaces using Systemd-networkd.
networkctl command
93
Two or more computers joined together via network media and able to exchange information.
network
94
A less-reliable, but faster version of the TCP/IP protocol.
User Datagram Protocol/Internet Protocol (UDP/IP)
95
A feature that automatically configures a network interface using an IPv4 address on the 169.254.0.0 network, or an IPv6 address on the FE80 network.
Automatic Private IP Addressing (APIPA)
96
The software component that configures NICs on modern Ubuntu systems.
NetPlan
97
Used to perform a wide variety of IP management tasks on a Linux system, such as viewing and manipulating the route table. It is part of the optional iproute2 package.
ip command