Card Set Information

2012-02-07 01:54:48

Show Answers:

  1. IPv6 is considered the IPng (IP Next Generation protocol) with up to 2128 available addresses.
  2. Assuming your are logging into a computer at CGCC. That computer will keep its dynamic IP address during your single login session.
  3. User Datagram Protocol (UDP) is a connection-oriented protocol, also known as a stream-based protocol. UDP streams packets of data.
  4. IPv4 is limited to 264 IP addresses
  5. The difference between the Internet and an intranet is that the Internet transmits only one protocol suite: IP. In contrast, an intranet can be set up to use a number of protocols such as IP, IPX, AppleTalk, DECnet, XNS, or other protocols developed by vendors over the years.
  6. TCP is a datagram-oriented protocol, also known as a datagram-based protocol. Each datagram must carry its own address and port information.
  7. The IP and ISO model both use the seven-layer protocol model.
  8. A default route is normally defined at the same time Linux networking is configured on any host. This allows Linux to
    Send packets addressed to other segments to the "gateway" out of the local segment.
  9. Forwarding packets refers to:
    Transferring them from the segment on which they originate to a different segment to which they are addressed.
  10. If an IP stack does not have the MAC address of the system it needs to communicate with, it must
    Use arp to obtain the MAC address directly, caching it for future communications with the same remote system.
  11. In the Network Configuration window of system-config-network, you can use the New button while viewing the ___ tab to help you locate and configure the correct kernel module for any networking hardware you have added since you installed Linux.
  12. Networking devices differ from other Linux devices in that
    Networking devices are not directly visible in the /dev subdirectory but are created on the fly when a networking device module is loaded into the kernel.
  13. On Linux systems, the most common interface to the DNS is?
  14. The telnet utility uses which protocol?
  15. The purpose of a routing protocol is to
    Facilitate the exchange of routing table entries among routers.
  16. When configuring an Ethernet device using system-config-network, the ___ tab allows you to select whether to use DHCP or assign a static IP address.
    Hardware Device
  17. When using traceroute, how many timing values are shown for each router?
  18. When using anonymous FTP, what should be used as your password?
    your email address
  19. When using ftp, the ___ command is used to upload multiple files using a regular expression (such as *.html)
  20. When viewing traceroute output, if an asterisk (*) appears in the listing, the router did not respond with the default time limit of ____
    5 seconds
  21. Which information field is not part of the output of the route command?
    The MAC address of the interface used to transfer packets to the specified network
  22. Which of the following is not included in the output of the traceroute command?
    the size of the test packet sent by traceroute
  23. Which utility is more secure for transmitting data?
  24. _____ is a distributed service.
  25. _____ routing protocols route packets based on administration policies.
  26. _____Routing protocols route packets based on mathematical models.
  27. You can get the IP and/or hostname information from a DNS server. The DNS server has the ability to do a reverse look. _______ is the process of converting a domain name to an IP address, or vice versa.
  28. Each Ethernet card has a number assigned to it by the manufacturer: This is called the:
    Media Access Control address
  29. How would you refer to the first Ethernet card on a Linux system?
  30. I want to permanently enable IP forwarding. What file do I need to edit?
  31. IP Forwarding is enabled by which command:
    echo 1 > /proc/sys/net/ipv4/ip_forward
  32. Name services such as DNS are used to:
    Translate between human readable domain names and IP address.
  33. What is the name of the file in the directory /etc/sysconfig/network-scripts/ that is used to configure the first Ethernet device?
  34. Which command is used to start the Ethernet interface eth0?
    /etc/sysconfig/network-scripts/ifup eth0
  35. Which is not a valid ifconfig command?
    ifconfig eth0 ifup
  36. Which is not a valid configuration file mentioned in this chapter?
  37. Which of the following output fields from the route command is not used by the Linux kernel? Ref was one of two output fields not used by the Linux kernel.
    Metric - The number of hops (how many routers) needed to reach the specified network.
  38. Which statement is true about the following command:
    • route add -net netmask gw dev eth0
    • It is valid and defines the router that can reach network
  39. Where might I find the hostname of a system?
  40. Where might I find the IP address of the system?
  41. Internet
    The largest internet in the world. The Internet is a multilevel hierarchy composed of backbone networks, midlevel networks, and stub networks.
  42. intranet
    An in house network designed to server a group of people such as a corportation or school.
  43. LAN
    A network that connects computers within a localized area.
  44. WAN
    A network that interconnects LANs and MANs, spanning a large geographic area.
  45. MAN
    A network that connects computers and LANs at multiple sites in a small regional area, such as a city.
  46. The _____ layer of the IP protocol, called the physical layer, describes the physical medium and the data encoding used to transmit signals on that medium.
  47. The ______ layer, called the data link layer, covers media access by network devices and describes how to put data into packets, transmit the data, and check it for errors.
  48. The ______ layer, called the network layer, frequently uses IP and addresses and routes packets
  49. The ______ layer, called the transport layer, is where TCP and UDP exist. This layer provides a means for applications to communicate with each other. This layer is responsible for dividing data streams into packets. It also performs port addressing, which allows it to distinguish among different services using the same transport protocol.
  50. Anything above the transport layers is the domain of the application and is part of the ______ layer.
  51. The Transmission Control Protocal(TCP) is most frequently run beneath the IP layer in combination referred to as IP/TCP. This protocol does not provides error recovery nor guaranteed delivery of transmitted packets.
  52. In the route command output, the ________ field specifies the network mask used to identify the network ID portion of any IP address that is part of the destination network identified on that line.
  53. You can stop the Ethernet interface, eth0, using the command /etc/sysconfig/network-scripts/_____ eth0 rather than ifconfig and service network stop.
  54. A(n) ________ address identifies a special IP address that sends a packet of data to all computers on the local network.
  55. The output of _________ shows you the last router reached by the packet
  56. TCP is a datagram-oriented protocol, also known as a datagram-based protocol. Each ________ must carry its own address and port information.
  57. To exchange information over a network, computers must communicate using a common language, or _______
  58. A ____ IP address is one that always remains the same
  59. When you issue the command ifconfig eth0 you'll see the MAC address called what?
  60. A _____ is a unit of data that the network card transmits.
  61. What command allows you to configure the routing table?
  62. Which routing daemon supports OSPF for Linux?
  63. In the /etc/resolv.conf file, the ____ keyword causes the resolver to use each of the listed name servers in turn instead of always trying the first one listed.
  64. UDP runs at layer __ of the IP stack
  65. The configuration file controls how a process looks up various databases containing information regarding hosts, users (passwords), groups, etc. Each database comes from a source (such as local files, DNS, NIS, and cache), and the order to look up the sources is specified in
  66. When using traceroute, how many timing values are shown for each router?
  67. ping is used to test networking connections by:
    trying to contact systems that are progressively further from your host to see if any networking problems occur.
  68. traceroute is a useful troubleshooting tool because:
    It reports each router that a packet passes through to a remote computer, along with the time needed to reach that router.