1.
The ____ column output by the route command specifies the network or host to which the routing table entry applies.
Correct Answer
B. Destination
Explanation
The "Destination" column output by the route command specifies the network or host to which the routing table entry applies. This column shows the IP address or network address that the route is pointing to. It helps determine the destination for the packets being routed.
2.
The ____ option of the iwlist command lists the access points and ad hoc cells that are in range.
Correct Answer
C. Scanning
Explanation
The correct answer is "scanning". The scanning option of the iwlist command allows users to list the access points and ad hoc cells that are within range. This option is useful for identifying and connecting to available wireless networks.
3.
When you press Ctrl + ____ to end the ping program, it calculates the statistics that are printed at the end of the listing.
Correct Answer
C. C
Explanation
When you press Ctrl + C to end the ping program, it sends an interrupt signal to the program, causing it to terminate. Before terminating, the program calculates the statistics such as the number of packets sent, received, and lost, as well as the minimum, maximum, and average round-trip time. These statistics are then printed at the end of the listing.
4.
In a display generated by ifconfig, the ____ field indicates the I/O address of the interface hardware.
Correct Answer
A. Base address
Explanation
In a display generated by ifconfig, the "Base address" field indicates the I/O address of the interface hardware. This address is used to identify and communicate with the specific hardware device associated with the interface.
5.
If you work with NetWare, you can use Linux as a client to communicate with NetWare servers.
Correct Answer
A. True
Explanation
This statement is true because NetWare supports the use of Linux as a client to communicate with its servers. This means that Linux users can access and interact with NetWare servers, allowing for seamless integration and communication between the two systems.
6.
Webmin and Webmin modules are written primarily in ____.
Correct Answer
B. Perl
Explanation
Webmin and its modules are primarily written in Perl. Perl is a high-level, general-purpose programming language that is known for its flexibility and powerful text processing capabilities. It is widely used for web development, system administration, and network programming, making it a suitable choice for developing a web-based system like Webmin. The use of Perl allows for easy integration with various Unix/Linux systems and provides the necessary tools and libraries to manage and configure servers effectively.
7.
You can see which modules are loaded into a system with the ____ command.
Correct Answer
B. Lsmod
Explanation
The lsmod command is used to list the modules that are currently loaded into a system. It provides information about the kernel modules, such as their names, sizes, and dependencies. By running lsmod, you can view the modules that are actively being used by the system, which can be helpful for troubleshooting or monitoring purposes.
8.
Scripts that control individual network interfaces contain the actual configuration data.
Correct Answer
B. False
Explanation
The given statement is false. Scripts that control individual network interfaces do not contain the actual configuration data. Instead, the actual configuration data is stored in separate configuration files. The scripts are responsible for executing the configuration based on the data stored in these files.
9.
The ____ program is the primary tool for configuring wireless interfaces.
Correct Answer
B. Iwconfig
Explanation
The correct answer is "iwconfig" because it is the primary tool used for configuring wireless interfaces. This program allows users to view and modify wireless network settings such as SSID, encryption key, and channel. It is commonly used in Linux-based operating systems to manage wireless connections and troubleshoot network issues.
10.
By default, Telnet uses port ____ to connect to a remote host.
Correct Answer
C. 23
Explanation
Telnet is a network protocol used to establish a remote connection with a host. By default, Telnet uses port 23 to connect to a remote host. This port is specifically assigned for Telnet communication. Ports 20 and 21 are used for FTP (File Transfer Protocol), while port 80 is used for HTTP (Hypertext Transfer Protocol). Therefore, the correct answer is 23.
11.
When you load a kernel module, you do not need to specify the path to the module’s directory.
Correct Answer
A. True
Explanation
When you load a kernel module, you do not need to specify the path to the module's directory because the kernel is already aware of the default directories where the modules are located. The kernel is designed to search for the module in these default directories, so you only need to specify the module's name when loading it. This allows for easier and more convenient loading of kernel modules without the need to provide the full path every time.
12.
Ping ____ to check that the internal networking stacks are functioning and that networking is enabled in the Linux kernel.
Correct Answer
A. 127.0.0.1
Explanation
The correct answer is 127.0.0.1. This IP address is the loopback address, also known as localhost, which is used to test the network functionality on a local machine. When a device sends a ping request to 127.0.0.1, it is essentially testing its own network stack and verifying that networking is enabled in the Linux kernel.
13.
The ____ option of the ping command lists all of the intervening routers that your ping packet passed through to reach the destination host.
Correct Answer
D. -r
Explanation
The "-r" option of the ping command lists all of the intervening routers that your ping packet passed through to reach the destination host. This option can be used to trace the route that the packet takes, helping to identify any network connectivity issues or bottlenecks along the way.
14.
IP ____ enables you to assign more than one IP address to an interface.
Correct Answer
A. Aliasing
Explanation
The term "aliasing" in the context of IP addresses refers to the ability to assign multiple IP addresses to a single network interface. This can be useful in situations where a device needs to communicate with multiple networks or when multiple services need to be hosted on the same device. By assigning multiple IP addresses to a single interface, the device can effectively handle multiple network connections simultaneously.
15.
When the Network Configuration Tool starts, the ____ tab is selected.
Correct Answer
A. Devices
Explanation
When the Network Configuration Tool starts, the "Devices" tab is selected. This is because the Network Configuration Tool is used to manage and configure network devices. The "Devices" tab allows users to view and manage the network devices connected to the system, such as network interfaces, Ethernet adapters, wireless devices, etc. By selecting the "Devices" tab, users can easily access and configure the settings of these devices to ensure proper network connectivity and functionality.
16.
The MTU (maximum transmission unit) for Ethernet always defaults to ____.
Correct Answer
C. 1500
Explanation
The MTU (maximum transmission unit) for Ethernet always defaults to 1500. This is the standard value for Ethernet networks and represents the maximum size of the data packet that can be transmitted in a single frame without fragmentation. This default value ensures compatibility and efficient data transmission across Ethernet networks.
17.
The ____ column output by the route command specifies the number of hops this particular route represents.
Correct Answer
D. Metric
Explanation
The "Metric" column output by the route command specifies the number of hops this particular route represents. The metric is a value used by routing protocols to determine the best path for forwarding network traffic. It is typically based on factors such as the speed or reliability of the route. The lower the metric value, the more preferred the route is. Therefore, the metric column provides information about the number of hops or the quality of the route.
18.
Traceroute relies on the ____ field and ICMP “packet timed out”
messages to move step-by-step through the Internet to reach the host in
which you are interested.
Correct Answer
A. TTL
Explanation
Traceroute relies on the TTL (Time to Live) field and ICMP "packet timed out" messages to move step-by-step through the Internet to reach the host in which you are interested. The TTL field is used to limit the lifespan of a packet and prevent it from circulating indefinitely in the network. As the packet travels through routers, the TTL value is decremented by each hop. When the TTL reaches zero, the router discards the packet and sends an ICMP "packet timed out" message back to the source. Traceroute utilizes this mechanism to determine the path and measure the latency of packets to a specific destination.
19.
The loopback interface exists as a physical device.
Correct Answer
B. False
Explanation
The loopback interface does not exist as a physical device. It is a virtual network interface that allows a device to communicate with itself. It is often used for testing and troubleshooting purposes. Unlike physical interfaces, the loopback interface does not require any external connections or hardware. It is solely used for internal communication within the device itself.
20.
To use Telnet as a terminal emulator program, you must connect to a host running a Telnet ____.
Correct Answer
A. Server
Explanation
To use Telnet as a terminal emulator program, you must connect to a host running a Telnet server. The Telnet server is responsible for accepting incoming Telnet connections and providing access to the host's command line interface or other services. The server listens for incoming connections on a specific port and allows clients to establish a Telnet session, enabling them to remotely access and control the host system.
21.
The utility that you use to send ICMP echo packets is called ____.
Correct Answer
D. Ping
Explanation
The utility that is used to send ICMP echo packets is called "ping". This utility is commonly used to test the connectivity between two devices on a network by sending echo requests and waiting for echo replies. It helps to determine if a remote host is reachable and measure the round-trip time for the packets to travel. The "ping" command is available on most operating systems and is a fundamental tool for network troubleshooting and diagnostics.
22.
The command ____ displays information about an interface renamed to inside.
Correct Answer
A. Ifconfig inside
Explanation
The command "ifconfig inside" displays information about an interface that has been renamed to "inside".
23.
Protocol designed by Novell Inc. in the early 1980s for use in its NetWare server product.
Correct Answer
Internetwork Packet Exchange
IPX
ipx
internetwork packet exchange
Explanation
The correct answer is "Internetwork Packet Exchange" which is a protocol designed by Novell Inc. in the early 1980s for use in its NetWare server product. IPX and ipx are alternative ways of representing the same protocol, and "internetwork packet exchange" is a full form of the acronym IPX.
24.
Web browser-based configuration program.
Correct Answer
Webmin
webmin
Explanation
Webmin is a web browser-based configuration program that allows users to manage a Unix-like system through a web interface. It provides a graphical user interface (GUI) for system administration tasks such as setting up user accounts, managing disk quotas, configuring network settings, and more. With Webmin, users can easily access and configure their system settings from any device with a web browser, making it a convenient tool for system administrators.
25.
Starts the graphical Network Configuration Tool included in Fedora Core.
Correct Answer
neat command
Neat Command
Neat command
neat
Neat
Explanation
The correct answer is "neat command, Neat Command, Neat command, neat, Neat". The given options are all variations of the command used to start the graphical Network Configuration Tool included in Fedora Core.
26.
Table that contains a mapping of IP addresses to interface hardware addresses.
Correct Answer
ARP cache
ARP Cache
arp
ARP
Explanation
The table that contains a mapping of IP addresses to interface hardware addresses is called the ARP cache. ARP (Address Resolution Protocol) is used to map an IP address to a physical (MAC) address on a local network. The ARP cache stores these mappings temporarily to speed up future communication between devices.
27.
Traditional way of viewing and controlling network interfaces.
Correct Answer
ifconfig program, ifconfig, Ipconfig, ipconfig
Explanation
The correct answer includes three options: ifconfig program, Ipconfig, and ipconfig. These options refer to different commands or programs used to view and control network interfaces. "ifconfig" is a command used in Unix-like operating systems, while "Ipconfig" is a command used in Windows operating systems. "ipconfig" is another command that is similar to "Ipconfig" but is used in Linux and macOS. These commands provide information about network interfaces, such as IP addresses, subnet masks, and other network configuration details.
28.
Special type of telephone service providing 128- or 144-kb/s bandwidth.
Correct Answer
Integrated Services Digital Network (ISDN)
Integrated Services Digital Network
ISDN
isdn
Explanation
ISDN stands for Integrated Services Digital Network, which is a special type of telephone service that provides a bandwidth of either 128 or 144 kilobits per second (kb/s). It is a digital network that allows for the transmission of voice, video, and data over traditional telephone lines. ISDN offers faster data transfer rates compared to traditional analog telephone lines, making it suitable for applications that require higher bandwidth, such as video conferencing or large file transfers.
29.
Devices that may be inserted and removed anytime you want.
Correct Answer
A. Hot-pluggable interfaces
Explanation
Hot-pluggable interfaces refer to devices that can be inserted and removed from a system while it is still powered on. These devices are designed to be easily connected and disconnected without causing any damage or disruption to the system. Examples of hot-pluggable interfaces include USB devices, external hard drives, and certain types of expansion cards. This feature allows for convenient and flexible use of devices, as they can be added or removed as needed without the need for system shutdown or restart.
30.
Traditional way to view and configure the routing table.
Correct Answer
route program
route
Route
Explanation
The given answer options, "route program," "route," and "Route," all refer to the traditional way of viewing and configuring the routing table. These options likely represent different ways of specifying the command to access the routing table in a computer system. The question is asking for the correct options that are associated with the traditional method of viewing and configuring the routing table.
31.
Used to send status or error messages about an IP connection.
Correct Answer
ICMP protocol
ICMP Protocol
ICMP
icmp
Explanation
ICMP stands for Internet Control Message Protocol. It is a network protocol that is used to send status or error messages about an IP connection. ICMP is typically used by network devices to report issues such as unreachable hosts, network congestion, or errors in packet transmission. It is an integral part of the internet protocol suite and is used by network administrators for troubleshooting and diagnostic purposes.
32.
The ____ directory structure contains network-related settings that you can modify.
Correct Answer
D. /proc/sys/net
Explanation
The correct answer is /proc/sys/net. The /proc/sys/net directory structure contains network-related settings that can be modified.