1.
A subnet mask is used to differentiate the host
portion from the network portion in a TCP/IP address. True or False?
Correct Answer
A. True
Explanation
A subnet mask is indeed used to differentiate the host portion from the network portion in a TCP/IP address. It helps in identifying which part of the IP address belongs to the network and which part belongs to the individual host. By using the subnet mask, the network can determine the network address and perform routing accordingly.
2.
When logging in to an FTP server as the anonymous
user, what password is usually used?
Correct Answer
D. The user’s e-mail address
Explanation
When logging in to an FTP server as the anonymous user, the password that is usually used is the user's e-mail address.
3.
Which networking service lets you mount
directories from another Linux computer on the network to a mount point on
your computer?
Correct Answer
B. NFS
Explanation
NFS (Network File System) is the correct answer. NFS allows you to mount directories from another Linux computer on the network to a mount point on your computer. This enables you to access and use files and directories located on remote systems as if they were on your own computer.
4.
The /etc/sysconfig/network-scripts directory
holds files that contain configuration information about NICs, ISDN, and
PPP connections. True or False?
Correct Answer
A. True
Explanation
The /etc/sysconfig/network-scripts directory is indeed used to store configuration files for network interfaces, including NICs (Network Interface Cards), ISDN (Integrated Services Digital Network), and PPP (Point-to-Point Protocol) connections. Therefore, the statement "The /etc/sysconfig/network-scripts directory holds files that contain configuration information about NICs, ISDN, and PPP connections" is true.
5.
Which file stores the TCP/IP addresses of the DNS
servers used to resolve host names?
Correct Answer
D. /etc/resolv.conf
Explanation
The correct answer is /etc/resolv.conf. This file stores the TCP/IP addresses of the DNS servers used to resolve host names. This file is typically found in Unix-like operating systems, such as Linux, and contains the IP addresses of the DNS servers that the system should use for name resolution. By configuring the /etc/resolv.conf file, users can specify which DNS servers their system should use to resolve domain names to IP addresses.
6.
Which command do you type to exit the FTP
utility?
Correct Answer
C. Bye
Explanation
To exit the FTP utility, you would type "bye" as the command. This command is commonly used to terminate the FTP session and disconnect from the remote server. It is a short and simple command that indicates the intention to end the connection and close the FTP session.
7.
To test DNS configuration by resolving a host name
to IP address, which command or commands can you use? (Choose all that
apply.)
Correct Answer(s)
A. Nslookup hostname
B. Dig hostname
C. Host hostname
Explanation
To test DNS configuration by resolving a host name to IP address, you can use the commands nslookup, dig, and host followed by the hostname. These commands are used to query DNS servers and retrieve information about a specific hostname. By using any of these commands with the hostname as an argument, you can check if the DNS configuration is correctly mapping the hostname to its corresponding IP address.
8.
Which file holds the
methods to be used and the order in which they will be applied for host name
resolution?
Correct Answer
A. /etc/nsswitch.conf
Explanation
The correct answer is /etc/nsswitch.conf. This file holds the methods to be used and the order in which they will be applied for host name resolution. It determines the sources that the system uses to resolve host names, such as DNS, NIS, or the local /etc/hosts file. By configuring this file, administrators can control the priority and order of the different name resolution methods.
9.
What are two means available to resolve a host
name to the appropriate TCP/IP address? (Choose two answers.)
Correct Answer(s)
B. DNS
C. /etc/hosts
Explanation
Two means available to resolve a host name to the appropriate TCP/IP address are DNS and /etc/hosts. DNS (Domain Name System) is a distributed database system that translates domain names into IP addresses, allowing users to access websites using easy-to-remember names instead of numerical IP addresses. On the other hand, the /etc/hosts file is a local text file on a computer that maps hostnames to IP addresses, providing a manual way to resolve hostnames without relying on DNS.
10.
What devices are used to transfer information
from one network to another?
Correct Answer
A. Routers
Explanation
Routers are devices that are used to transfer information from one network to another. They act as the traffic directors of the internet, directing data packets to the correct destination. Routers determine the most efficient path for data to travel and make decisions based on network protocols and routing tables. Unlike LANs (Local Area Networks), which are networks themselves, routers are the devices that connect multiple networks together. DNS (Domain Name System) servers and DHCP (Dynamic Host Configuration Protocol) servers, on the other hand, are responsible for translating domain names to IP addresses and assigning IP addresses to devices on a network, respectively.
11.
Which command can you use to view the TCP/IP
configuration on your computer?
Correct Answer
D. Ifconfig
Explanation
The correct answer is ifconfig. Ifconfig is a command used to view and configure the TCP/IP network settings on a computer. It displays information such as the IP address, subnet mask, and network interface details. This command is commonly used in Unix-like operating systems, including Linux and macOS, to manage network configurations.
12.
What is the standard protocol used for
communication on the Internet?
Correct Answer
A. TCP/IP
Explanation
TCP/IP is the standard protocol used for communication on the Internet. It stands for Transmission Control Protocol/Internet Protocol and is a set of rules that governs how data is transmitted and received over the internet. TCP ensures that data packets are delivered reliably and in the correct order, while IP is responsible for addressing and routing the packets to their destination. TCP/IP is widely used and supported by all major operating systems and networking devices, making it the most common protocol for internet communication.
13.
Which utility allows a Linux computer to access
shares on a Windows-based computer?
Correct Answer
D. Smbclient
Explanation
Smbclient is the correct answer because it is a utility that allows a Linux computer to access shares on a Windows-based computer. Smbclient is a command-line tool that enables users to connect to Windows SMB/CIFS file servers, view shared files and folders, and perform file transfers. It provides a way for Linux users to interact with Windows shares and access files and resources on Windows machines.
14.
The TCP/IP address of 127.0.0.1 is also referred
to as the __________.
Correct Answer
D. Loopback address
Explanation
The TCP/IP address 127.0.0.1 is commonly known as the loopback address. This address is used to test network connectivity on a local machine without actually sending data to any external network. It allows a device to send and receive data internally, simulating a network connection. The loopback address is often used for troubleshooting purposes and for testing network applications on a local host.
15.
The line that configures the host name for the
computer at boot time can be found in /etc/sysconfig/network. True or False?
Correct Answer
A. True
Explanation
The correct answer is True. The line that configures the host name for the computer at boot time can be found in the /etc/sysconfig/network file.
16.
Which file would you modify to change the TCP/IP
address of the first aliased NIC on the system the next time the system is
booted or the card is brought up?
Correct Answer
B. /etc/sysconfig/network-scripts/ifcfg-eth0
Explanation
You would modify the file /etc/sysconfig/network-scripts/ifcfg-eth0 to change the TCP/IP address of the first aliased NIC on the system the next time the system is booted or the card is brought up.
17.
Before a computer can use a router, it must be
provided what configuration information?
Correct Answer
C. Default gateway
Explanation
Before a computer can use a router, it must be provided with the configuration information of the default gateway. The default gateway is the IP address of the router that the computer will use to send data to other networks. By specifying the default gateway, the computer knows where to send data that is not destined for the local network. This allows the computer to connect and communicate with devices on other networks through the router.
18.
Which of the following utilities can be used to
check TCP/IP configuration and test network connectivity? (Choose all that
apply.)
Correct Answer(s)
A. Ifconfig
C. Ping
D. Netstat -i
Explanation
The utilities ifconfig, ping, and netstat -i can be used to check TCP/IP configuration and test network connectivity. ifconfig is a command-line tool used to configure network interfaces and display their current settings. ping is used to send ICMP echo requests to a specific IP address or domain name to test network connectivity. netstat -i is used to display information about network interfaces, including their current status and statistics. These utilities provide useful information for troubleshooting network issues and ensuring proper TCP/IP configuration.