Lesson4 Flashcards

(20 cards)

1
Q
  1. Which of the following are valid IPv4 network masks? (Choose TWO correct answers.)

A. 255.255.0.0
B. 255.255.255.65
C. 255.255.0.255
D. 0.0.0.1
E. 255.255.255.248

A

A. 255.255.0.0

E. 255.255.255.248

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Given the following routing table
    Kernel IP routing table
    Destination Gateway Genmask Flags Metric Ref Use Iface 192.168.178.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan0
    Why does the command route add default gw 192.168.1.1 fail?

A. Because there is no route to 192.168.1.1.
B. Because only one route can exist at a time.
C. Because there is already a default route.
D. Because default routes can not be set manually.
E. Because default routes must be set with ifconfig.

A

A. Because there is no route to 192.168.1.1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. In order to discover the link layer address of the device that owns a specific IPv4 or IPv6 address, which mechanism is used?
    Both IPv4 and IPv6 use ARP.

A. Both IPv4 and IPv6 use Neighbor Discovery.
B. IPv4 uses ARP while IPv6 uses Neighbor Discovery.
C. IPv4 uses Neighbor Discovery while IPv6 uses ARP.
D. Both IPv4 and IPv6 can use either ARP or Neighbor Discovery depending on the network.

A

C. IPv4 uses Neighbor Discovery while IPv6 uses ARP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. When issuing the command ifconfig eth0 192.168.1.20/24 up, which of the following happens? (Choose TWO correct answers.)

A. The address 192.168.1.20 is associated with the interface eth0.
B. A network route to 192.168.1.0 with the netmask 255.255.255.0 pointing directly to eth0 is created.
C. 192.168.1.1 is probed for router functionality and, in case of success, it is added to the list of default routers.
D. The addresses from 192.168.1.20 to 192.168.1.24 are activated on the interface eth0.
E. If eth0 was configured with a previous IP address, it is retained in addition to adding the new address.

A

A. The address 192.168.1.20 is associated with the interface eth0.

B. A network route to 192.168.1.0 with the netmask 255.255.255.0 pointing directly to eth0 is created.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing?
    (Choose THREE correct answers.)

A. 127.0.0.0/8
B. 10.0.0.0/8
C. 169.255.0.0/16
D. 172.16.0.0/12
E. 192.168.0.0/16

A

B. 10.0.0.0/8

D. 172.16.0.0/12

E. 192.168.0.0/16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following statements is valid in the file /etc/nsswitch.conf?

A. multi on
B. 192.168.168.4 dns-server
C. hosts: files dns
D. include /etc/nsswitch.

A

D. ??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. How does the ping command work by default?

A. It sends a UDP packet to port 0 of the remote host and waits to receive a UDP error response in return.
B. It sends an ARP request to a remote host and waits to receive an ARP response in return.
C. It sends a TCP SYN packet to a remote host and waits to receive an TCP ACK response in return.
D. It sends a broadcast packet to all hosts on the net and waits to receive, among others, a response from the target system.
E. It sends an ICMP Echo Request to a remote host and waits to receive an ICMP Echo Response in return.

A

E. It sends an ICMP Echo Request to a remote host and waits to receive an ICMP Echo Response in return.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following tools used for DNS debugging, reports not only the response from the name server but also details about the query?

A. dnsq
B. dig
C. hostname
D. dnslookup
E. zoneinfo

A

B. dig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. What of the following can be done by the command ifconfig? (Choose TWO correct answers.)

A. Set a network interface active or inactive.
B. Specify the kernel module to be used with a network interface.
C. Allow regular users to change the network configuration of a network interface.
D. Change the netmask used on a network interface.
E. Specify which network services are available on a network interface.

A

A. Set a network interface active or inactive.

D. Change the netmask used on a network interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Which of the following programs can be used to determine the routing path to a given destination?

A. dig
B. netstat
C. pingroute
D. traceroute

A

E. ??

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. On a regular users workstation the route command takes a long time before printing out the routing table. Which of the following errors does that indicate?

A. The local routing information may be corrupted and must be re-validated using a routing protocol.
B. One of the routers in the routing table is not available which causes the automatic router failure detection
mechanism (ARF-D) to wait for a timeout.
C. There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default.
D. DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.

A

D. DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Which of the following is a valid IPv6 address?

A. 2001:db8:3241::1
B. 2001::db8:4581::1
C. 2001:db8:0g41::1
D. 2001%db8%9990%%1
E. 2001.db8.819f..1

A

A. 2001:db8:3241::1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Which of the following keywords can be used in the file /etc/resolv.conf? (Choose TWO correct answers.)

A. substitute
B. nameserver
C. search
D. lookup
E. method

A

B. nameserver

C. search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Given the following routing table:
    Kernel IP routing table
    Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 192.168.178.1 0.0.0.0 UG 0 0 0 wlan0
    192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
    192.168.2.0
    192.168.1.1 255.255.255.0 U 0 0 0 eth0 192.168.178.0 0.0.0.0 255.255.255.0 U 9 0 0 wlan0
    How would an outgoing packet to the destination 192.168.2.150 be handled?

A. It would be passed to the default router 192.168.178.1 on wlan0.
B. It would be directly transmitted on the device eth0.
C. It would be passed to the default router 255.255.255.0 on eth0.
D. It would be directly transmitted on the device wlan0.
E. It would be passed to the router 192.168.1.1 on eth0.

A

E. It would be passed to the router 192.168.1.1 on eth0.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Which configuration file would be edited to change the default options for outbound SSH sessions?

A. /etc/ssh/sshd_config
B. /etc/ssh/ssh
C. /etc/ssh/client
D. /etc/ssh/ssh_config
E. /etc/ssh/ssh_client

A

D. /etc/ssh/ssh_config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Which of the following programs uses the hosts.allow file to perform its main task of checking for access control
    restrictions to system services?

A. tcpd
B. inetd
C. fingerd
D. mountd
E. xinetd

17
Q
  1. Which command is used to set restrictions on the size of a core file that is created for a user when a program
    crashes?

A. core
B. edquota
C. ulimit
D. quota

18
Q
  1. When trying to unmount a device it is reported as being busy. Which of the following commands could be used to
    determine which process is causing this?

A. debug
B. lsof
C. nessus
D. strace
E. traceroute

19
Q
  1. Which of the following commands can be used to associate open TCP ports with the processes that opened the
    ports?

A. ptrace
B. strace
C. debug
D. nessus
E. lsof

20
Q
  1. Which configuration file does sudo read when determining if a user is permitted to run applications with root privileges?

A. /etc/security.conf
B. /etc/supasswd
C. /etc/sudoers
D. /etc/sudo.conf

A

C. /etc/sudoers