CITE 30133 Midterm Answers Flashcards

1
Q

IPv6 supports 128-bit addresses. 64 bits out of the 128 bits are allocated for the host portion of the IPv6 addresses. How many subnets would IPv6 support in Theory?

A

2^64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is the subnet mask(netmask) for subnet 137.138.25.0/12

A

255.240.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following contains the IP Addresses of DNS servers for a LINUX computer?

A

/etc/resolv.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following files sets the hostname of the fedora Linux used in our class?

A

/etc/hostname

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following files contains the information about a port number for its corresponding network service?

A

/etc/services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The configuration profiles created by the nmcli command are located in which of the following folders?

A

/etc/NetworkManager/system-connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following file holds the methods to be used, and the order in which these methods will be applied for hostname resolution

A

/etc/nsswitch.conf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following file contains the mapping of hostnames to their corresponding IP addresses on a Linux Computer

A

/etc/hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following folder contains the private SSH key of a regular user on a Linux computer by default?

A

~/.ssh/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following file contains the SSH host public keys of linux machines that are trusted by a local user

A

~/.ssh/known_hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which folder contains the SSH host private key of a linux computer?

A

/etc/ssh/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following devices forwards data packets from an internal subnet to an external router

A

Gateway

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which command tracks the data pack between two end points on the internet?

A

traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which command displays active TCP connection and ports on which a Linux computer is listening

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which command tests the connectivity and measures the network delay between two hosts?

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

on the internet the routing and delivery of TCP/ip data packets are based on ?

A

IP address

17
Q

which of the following commands can be used to view the log information from the SSH service?

A

journalctl

18
Q

which of the following commands can request an IP address from a DHCP server?

A

dhclient

19
Q

Which of the following is the localhost (or loopback) address?

A

127.0.0.1

20
Q

which of the following command-line tool is for transferring data using various network protocols( such as the http protocol)

A

curl

21
Q

which of the following commands can be used to change the IP address of a Linux computer?

A

ip
nmcli

22
Q

which of the following commands can be used to change the routing table on a linux computer?

A

route
traceroute

23
Q

which of the following are possible means to resolve a host’s name to an IP address

A

DNS Service
A local hostname to ip address file

24
Q

Which of the following commands can be used to resolve a DNS name to an IP address

A

host
dig

25
Q

which of the following commands can be used to scan /test network services

A

nmap
nc
curl

26
Q

Which of the following are legitimate types of Resource Records in DNS

A

MX
SOA
NS
PTR
A
CNAME

27
Q

Which of the following authentication methods are accepted in the SSH protocol

A

password
Host’s public/private key
User’s public/private key

28
Q

Which of the following utilities can be used as a packet sniffer

A

wireshark
tcpdump

29
Q

Which of the following can be provided by the DHCP service?

A

Provide an IP address to the client
Privde the DNS server address to the client
Provide the location of the kickstart file when the client uses PXE booting

30
Q

Which of the following is true about local DNS servers

A

They are used to resolve FQDNs into IP addresses.

31
Q

explain the meaning of the following command
nmcli con add con-name my-office-wired ipv4.address 10.11.12.203/24 ipv4.gateway 10.11.12.254 ipv4.method auto ifname ens 160

A

So, in summary, this nmcli command adds a new network connection named “my-office-wired”, configures it to obtain IPv4 configuration automatically using DHCP, sets the IPv4 address to “10.11.12.203”, sets the IPv4 gateway to “10.11.12.254”, and assigns it to the network interface “ens160”.

32
Q

You would like to host a web server on a home computer using port 8080 the computer’s public ip address is subject to change (currently it is 2.3.4.5) You have SSH access privileges to another server whose ip address (10.11.12.3) is permanent. What would you do to allow a regular web user to access you home web server without concerning possible ip changes? provide the SSH command that you would issue from your web server and the URL that a regular web user would enter in a browser to visit your web server.

A

ssh -R 8080:localhost:8080 user@10.11.12.3

33
Q

How does a local DNS server resolve a fully qualified domain name (FQDN to an IP address. Assume that the FQDN has not been queried previously. YOu will need to show the DNS hierarchical

A

A local DNS server resolves a fully qualified domain name (FQDN) to an IP address by querying root DNS servers, then TLD DNS servers, followed by authoritative DNS servers for the specific domain. Finally, it receives the IP address from the authoritative DNS server and caches it for future use.

34
Q

What is a DNS zone transfer? Give a scenario that a zone transfer is utilized. Can any user perform a zone transfer and why?

A

A DNS zone transfer is the process of copying DNS data from one DNS server to another. It’s utilized for ensuring all authoritative servers have consistent DNS information. Only authorized users should perform zone transfers to prevent unauthorized access to sensitive DNS data.

35
Q

Assume that you want to collect the IP address and MAC address of all the clients in you local subnet. WHich service/ command can help you collect such information?

A

arp -a