Filters
Question type

Study Flashcards

Large network daemons that are not started by the Internet Super Daemon and called ____ daemons.


A) self-sufficient
B) independent
C) autonomous
D) stand-alone

Correct Answer

verifed

verified

What is NIS? What is a master and slave NIS server? Give examples of configuration files that NIS is commonly used to coordinate.

Correct Answer

verifed

verified

Network Information Service (NIS)can be ...

View Answer

DNS uses ports ____.


A) TCP 20, 21
B) TCP 53, UDP 53
C) TCP 80, 81
D) TCP 69, UDP 69

Correct Answer

verifed

verified

A(n)____________________ number uniquely identifies a particular service.

Correct Answer

verifed

verified

port

The FTP Server network service is a stand-alone service.

Correct Answer

verifed

verified

False

The ____ option to the iptables command can be used to specify the default policy for a certain chain type.


A) -P
B) -C
C) -p
D) -c

Correct Answer

verifed

verified

The ____________________ is typically used to start and manage connections for smaller network daemons such as the telnet, rlogin, and FTP daemons.

Correct Answer

verifed

verified

Internet S...

View Answer

The ____ network service allows computers on a network the ability to share one connection to the Internet.


A) Squid Proxy Server
B) Samba Server
C) X Server
D) NIS Server

Correct Answer

verifed

verified

By default, the smb.conf file shares all printers and home directories for recognized Windows users.

Correct Answer

verifed

verified

All DNS servers contain a DNS cache file.

Correct Answer

verifed

verified

If some users, such as software developers, need to run certain commands as the root user in certain situations, it is best to allow them to log on to the root user account via the su command.

Correct Answer

verifed

verified

The ____ httpd.conf directive specifies that the index.html file in the document root directory will be sent to clients who request an HTML document.


A) DirectoryIndex index.html
B) DocumentRoot index.html
C) Index index.html
D) UseIndex index.html

Correct Answer

verifed

verified

A

To share information to Windows client computers, you can use the ____________________ daemon, which emulates the SMB protocol.

Correct Answer

verifed

verified

Match each term with the correct statement below.

Premises
A program that can be used to detect unauthorized access to a Linux system.
The act of forwarding data packets from one network to another.
A common IDS for Linux that monitors files and directories.
A portion of the Domain Name Space that is administered by one or more DNS servers.
A line within a configuration file.
A DNS name resolution request whereby an IP address is resolved to a FQDN.
The components of a firewall that match specific network traffic that is to be allowed or dropped.
A DNS resolution request that was resolved with the use of top-level DNS servers.
A DNS name resolution request whereby a FQDN is resolved to an IP address.
Responses
reverse lookup
recursive query
rules
routing
forward lookup
IDS
zone
directive
tripwire

Correct Answer

A program that can be used to detect unauthorized access to a Linux system.
The act of forwarding data packets from one network to another.
A common IDS for Linux that monitors files and directories.
A portion of the Domain Name Space that is administered by one or more DNS servers.
A line within a configuration file.
A DNS name resolution request whereby an IP address is resolved to a FQDN.
The components of a firewall that match specific network traffic that is to be allowed or dropped.
A DNS resolution request that was resolved with the use of top-level DNS servers.
A DNS name resolution request whereby a FQDN is resolved to an IP address.

What are the five main types of encryption supported by sshd?

Correct Answer

verifed

verified

The main types of encryption supported b...

View Answer

The ____ option to the iptables command can be used to specify the destination address of packets for a rule.


A) -D
B) -L
C) -F
D) -d

Correct Answer

verifed

verified

What methods can be used to physically secure local computers?

Correct Answer

verifed

verified

One of the most important security-relat...

View Answer

Running background processes using the ____ command allows you to exit your command-line shell without ending any background processes.


A) continue
B) noshell
C) nokill
D) nohup

Correct Answer

verifed

verified

To see what network services are running on your network, you can run the ____ command.


A) nmap
B) map
C) networkmap
D) nm

Correct Answer

verifed

verified

The ____ command can be used to switch your current user account to another.


A) swu
B) sudo
C) su
D) switchu

Correct Answer

verifed

verified

Showing 1 - 20 of 32

Related Exams

Show Answer