Linux Networking Quiz 2

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Svolore
S
Svolore
Community Contributor
Quizzes Created: 12 | Total Attempts: 11,100
Questions: 32 | Attempts: 779

SettingsSettingsSettings
Linux Networking Quiz 2 - Quiz

Quiz admin to me at school Chapter 2.


Questions and Answers
  • 1. 

    The ____ column output by the route command specifies the network or host to which the routing table entry applies.

    • A.

      Use

    • B.

      Destination

    • C.

      Gateway

    • D.

      Genmask

    Correct Answer
    B. Destination
    Explanation
    The "Destination" column output by the route command specifies the network or host to which the routing table entry applies. This column shows the IP address or network address that the route is pointing to. It helps determine the destination for the packets being routed.

    Rate this question:

  • 2. 

    The ____ option of the iwlist command lists the access points and ad hoc cells that are in range.

    • A.

      Event

    • B.

      Rate

    • C.

      Scanning

    • D.

      Key

    Correct Answer
    C. Scanning
    Explanation
    The correct answer is "scanning". The scanning option of the iwlist command allows users to list the access points and ad hoc cells that are within range. This option is useful for identifying and connecting to available wireless networks.

    Rate this question:

  • 3. 

    When you press Ctrl + ____ to end the ping program, it calculates the statistics that are printed at the end of the listing.

    • A.

      Alt + C

    • B.

      Alt + Del

    • C.

      C

    • D.

      Z

    Correct Answer
    C. C
    Explanation
    When you press Ctrl + C to end the ping program, it sends an interrupt signal to the program, causing it to terminate. Before terminating, the program calculates the statistics such as the number of packets sent, received, and lost, as well as the minimum, maximum, and average round-trip time. These statistics are then printed at the end of the listing.

    Rate this question:

  • 4. 

    In a display generated by ifconfig, the ____ field indicates the I/O address of the interface hardware.

    • A.

      Base address

    • B.

      HWaddr

    • C.

      Inet addr

    • D.

      Memory

    Correct Answer
    A. Base address
    Explanation
    In a display generated by ifconfig, the "Base address" field indicates the I/O address of the interface hardware. This address is used to identify and communicate with the specific hardware device associated with the interface.

    Rate this question:

  • 5. 

    If you work with NetWare, you can use Linux as a client to communicate with NetWare servers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    This statement is true because NetWare supports the use of Linux as a client to communicate with its servers. This means that Linux users can access and interact with NetWare servers, allowing for seamless integration and communication between the two systems.

    Rate this question:

  • 6. 

    Webmin and Webmin modules are written primarily in ____.

    • A.

      Java

    • B.

      Perl

    • C.

      C++

    • D.

      Python

    Correct Answer
    B. Perl
    Explanation
    Webmin and its modules are primarily written in Perl. Perl is a high-level, general-purpose programming language that is known for its flexibility and powerful text processing capabilities. It is widely used for web development, system administration, and network programming, making it a suitable choice for developing a web-based system like Webmin. The use of Perl allows for easy integration with various Unix/Linux systems and provides the necessary tools and libraries to manage and configure servers effectively.

    Rate this question:

  • 7. 

    You can see which modules are loaded into a system with the ____ command.

    • A.

      Modprobe

    • B.

      Lsmod

    • C.

      Cat

    • D.

      Ip

    Correct Answer
    B. Lsmod
    Explanation
    The lsmod command is used to list the modules that are currently loaded into a system. It provides information about the kernel modules, such as their names, sizes, and dependencies. By running lsmod, you can view the modules that are actively being used by the system, which can be helpful for troubleshooting or monitoring purposes.

    Rate this question:

  • 8. 

    Scripts that control individual network interfaces contain the actual configuration data.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. Scripts that control individual network interfaces do not contain the actual configuration data. Instead, the actual configuration data is stored in separate configuration files. The scripts are responsible for executing the configuration based on the data stored in these files.

    Rate this question:

  • 9. 

    The ____ program is the primary tool for configuring wireless interfaces.

    • A.

      Ipconfig

    • B.

      Iwconfig

    • C.

      Ifconfig

    • D.

      Ip

    Correct Answer
    B. Iwconfig
    Explanation
    The correct answer is "iwconfig" because it is the primary tool used for configuring wireless interfaces. This program allows users to view and modify wireless network settings such as SSID, encryption key, and channel. It is commonly used in Linux-based operating systems to manage wireless connections and troubleshoot network issues.

    Rate this question:

  • 10. 

    By default, Telnet uses port ____ to connect to a remote host.

    • A.

      20

    • B.

      21

    • C.

      23

    • D.

      80

    Correct Answer
    C. 23
    Explanation
    Telnet is a network protocol used to establish a remote connection with a host. By default, Telnet uses port 23 to connect to a remote host. This port is specifically assigned for Telnet communication. Ports 20 and 21 are used for FTP (File Transfer Protocol), while port 80 is used for HTTP (Hypertext Transfer Protocol). Therefore, the correct answer is 23.

    Rate this question:

  • 11. 

    When you load a kernel module, you do not need to specify the path to the module’s directory.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    When you load a kernel module, you do not need to specify the path to the module's directory because the kernel is already aware of the default directories where the modules are located. The kernel is designed to search for the module in these default directories, so you only need to specify the module's name when loading it. This allows for easier and more convenient loading of kernel modules without the need to provide the full path every time.

    Rate this question:

  • 12. 

    Ping ____ to check that the internal networking stacks are functioning and that networking is enabled in the Linux kernel.

    • A.

      127.0.0.1

    • B.

      128.0.0.1

    • C.

      128.0.0.254

    • D.

      128.0.1.255

    Correct Answer
    A. 127.0.0.1
    Explanation
    The correct answer is 127.0.0.1. This IP address is the loopback address, also known as localhost, which is used to test the network functionality on a local machine. When a device sends a ping request to 127.0.0.1, it is essentially testing its own network stack and verifying that networking is enabled in the Linux kernel.

    Rate this question:

  • 13. 

    The ____ option of the ping command lists all of the intervening routers that your ping packet passed through to reach the destination host.

    • A.

      -a

    • B.

      -f

    • C.

      -i

    • D.

      -r

    Correct Answer
    D. -r
    Explanation
    The "-r" option of the ping command lists all of the intervening routers that your ping packet passed through to reach the destination host. This option can be used to trace the route that the packet takes, helping to identify any network connectivity issues or bottlenecks along the way.

    Rate this question:

  • 14. 

    IP ____ enables you to assign more than one IP address to an interface.

    • A.

      Aliasing

    • B.

      Indexing

    • C.

      Masking

    • D.

      Tracing

    Correct Answer
    A. Aliasing
    Explanation
    The term "aliasing" in the context of IP addresses refers to the ability to assign multiple IP addresses to a single network interface. This can be useful in situations where a device needs to communicate with multiple networks or when multiple services need to be hosted on the same device. By assigning multiple IP addresses to a single interface, the device can effectively handle multiple network connections simultaneously.

    Rate this question:

  • 15. 

    When the Network Configuration Tool starts, the ____ tab is selected.

    • A.

      Devices

    • B.

      Hardware

    • C.

      DNS

    • D.

      Hosts

    Correct Answer
    A. Devices
    Explanation
    When the Network Configuration Tool starts, the "Devices" tab is selected. This is because the Network Configuration Tool is used to manage and configure network devices. The "Devices" tab allows users to view and manage the network devices connected to the system, such as network interfaces, Ethernet adapters, wireless devices, etc. By selecting the "Devices" tab, users can easily access and configure the settings of these devices to ensure proper network connectivity and functionality.

    Rate this question:

  • 16. 

    The MTU (maximum transmission unit) for Ethernet always defaults to ____.

    • A.

      250

    • B.

      1000

    • C.

      1500

    • D.

      2000

    Correct Answer
    C. 1500
    Explanation
    The MTU (maximum transmission unit) for Ethernet always defaults to 1500. This is the standard value for Ethernet networks and represents the maximum size of the data packet that can be transmitted in a single frame without fragmentation. This default value ensures compatibility and efficient data transmission across Ethernet networks.

    Rate this question:

  • 17. 

    The ____ column output by the route command specifies the number of hops this particular route represents.

    • A.

      Ref

    • B.

      Iface

    • C.

      Flags

    • D.

      Metric

    Correct Answer
    D. Metric
    Explanation
    The "Metric" column output by the route command specifies the number of hops this particular route represents. The metric is a value used by routing protocols to determine the best path for forwarding network traffic. It is typically based on factors such as the speed or reliability of the route. The lower the metric value, the more preferred the route is. Therefore, the metric column provides information about the number of hops or the quality of the route.

    Rate this question:

  • 18. 

    Traceroute relies on the ____ field and ICMP “packet timed out” messages to move step-by-step through the Internet to reach the host in which you are interested.

    • A.

      TTL

    • B.

      Identification

    • C.

      Protocol

    • D.

      Header Checksum

    Correct Answer
    A. TTL
    Explanation
    Traceroute relies on the TTL (Time to Live) field and ICMP "packet timed out" messages to move step-by-step through the Internet to reach the host in which you are interested. The TTL field is used to limit the lifespan of a packet and prevent it from circulating indefinitely in the network. As the packet travels through routers, the TTL value is decremented by each hop. When the TTL reaches zero, the router discards the packet and sends an ICMP "packet timed out" message back to the source. Traceroute utilizes this mechanism to determine the path and measure the latency of packets to a specific destination.

    Rate this question:

  • 19. 

    The loopback interface exists as a physical device.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The loopback interface does not exist as a physical device. It is a virtual network interface that allows a device to communicate with itself. It is often used for testing and troubleshooting purposes. Unlike physical interfaces, the loopback interface does not require any external connections or hardware. It is solely used for internal communication within the device itself.

    Rate this question:

  • 20. 

    To use Telnet as a terminal emulator program, you must connect to a host running a Telnet ____.

    • A.

      Server

    • B.

      Interface

    • C.

      Interpreter

    • D.

      Client

    Correct Answer
    A. Server
    Explanation
    To use Telnet as a terminal emulator program, you must connect to a host running a Telnet server. The Telnet server is responsible for accepting incoming Telnet connections and providing access to the host's command line interface or other services. The server listens for incoming connections on a specific port and allows clients to establish a Telnet session, enabling them to remotely access and control the host system.

    Rate this question:

  • 21. 

    The utility that you use to send ICMP echo packets is called ____.

    • A.

      Ip

    • B.

      Ifconfig

    • C.

      Route

    • D.

      Ping

    Correct Answer
    D. Ping
    Explanation
    The utility that is used to send ICMP echo packets is called "ping". This utility is commonly used to test the connectivity between two devices on a network by sending echo requests and waiting for echo replies. It helps to determine if a remote host is reachable and measure the round-trip time for the packets to travel. The "ping" command is available on most operating systems and is a fundamental tool for network troubleshooting and diagnostics.

    Rate this question:

  • 22. 

    The command ____ displays information about an interface renamed to inside.

    • A.

      Ifconfig inside

    • B.

      Ifconfig show inside

    • C.

      Ip inside

    • D.

      Ip show inside

    Correct Answer
    A. Ifconfig inside
    Explanation
    The command "ifconfig inside" displays information about an interface that has been renamed to "inside".

    Rate this question:

  • 23. 

    Protocol designed by Novell Inc. in the early 1980s for use in its NetWare server product.

    Correct Answer
    Internetwork Packet Exchange
    IPX
    ipx
    internetwork packet exchange
    Explanation
    The correct answer is "Internetwork Packet Exchange" which is a protocol designed by Novell Inc. in the early 1980s for use in its NetWare server product. IPX and ipx are alternative ways of representing the same protocol, and "internetwork packet exchange" is a full form of the acronym IPX.

    Rate this question:

  • 24. 

    Web browser-based configuration program.

    Correct Answer
    Webmin
    webmin
    Explanation
    Webmin is a web browser-based configuration program that allows users to manage a Unix-like system through a web interface. It provides a graphical user interface (GUI) for system administration tasks such as setting up user accounts, managing disk quotas, configuring network settings, and more. With Webmin, users can easily access and configure their system settings from any device with a web browser, making it a convenient tool for system administrators.

    Rate this question:

  • 25. 

    Starts the graphical Network Configuration Tool included in Fedora Core.

    Correct Answer
    neat command
    Neat Command
    Neat command
    neat
    Neat
    Explanation
    The correct answer is "neat command, Neat Command, Neat command, neat, Neat". The given options are all variations of the command used to start the graphical Network Configuration Tool included in Fedora Core.

    Rate this question:

  • 26. 

    Table that contains a mapping of IP addresses to interface hardware addresses.

    Correct Answer
    ARP cache
    ARP Cache
    arp
    ARP
    Explanation
    The table that contains a mapping of IP addresses to interface hardware addresses is called the ARP cache. ARP (Address Resolution Protocol) is used to map an IP address to a physical (MAC) address on a local network. The ARP cache stores these mappings temporarily to speed up future communication between devices.

    Rate this question:

  • 27. 

    Traditional way of viewing and controlling network interfaces.

    Correct Answer
    ifconfig program, ifconfig, Ipconfig, ipconfig
    Explanation
    The correct answer includes three options: ifconfig program, Ipconfig, and ipconfig. These options refer to different commands or programs used to view and control network interfaces. "ifconfig" is a command used in Unix-like operating systems, while "Ipconfig" is a command used in Windows operating systems. "ipconfig" is another command that is similar to "Ipconfig" but is used in Linux and macOS. These commands provide information about network interfaces, such as IP addresses, subnet masks, and other network configuration details.

    Rate this question:

  • 28. 

    Special type of telephone service providing 128- or 144-kb/s bandwidth.

    Correct Answer
    Integrated Services Digital Network (ISDN)
    Integrated Services Digital Network
    ISDN
    isdn
    Explanation
    ISDN stands for Integrated Services Digital Network, which is a special type of telephone service that provides a bandwidth of either 128 or 144 kilobits per second (kb/s). It is a digital network that allows for the transmission of voice, video, and data over traditional telephone lines. ISDN offers faster data transfer rates compared to traditional analog telephone lines, making it suitable for applications that require higher bandwidth, such as video conferencing or large file transfers.

    Rate this question:

  • 29. 

    Devices that may be inserted and removed anytime you want.

    • A.

      Hot-pluggable interfaces

    • B.

      SCSI

    • C.

      PnP

    • D.

      SIM

    Correct Answer
    A. Hot-pluggable interfaces
    Explanation
    Hot-pluggable interfaces refer to devices that can be inserted and removed from a system while it is still powered on. These devices are designed to be easily connected and disconnected without causing any damage or disruption to the system. Examples of hot-pluggable interfaces include USB devices, external hard drives, and certain types of expansion cards. This feature allows for convenient and flexible use of devices, as they can be added or removed as needed without the need for system shutdown or restart.

    Rate this question:

  • 30. 

    Traditional way to view and configure the routing table.

    Correct Answer
    route program
    route
    Route
    Explanation
    The given answer options, "route program," "route," and "Route," all refer to the traditional way of viewing and configuring the routing table. These options likely represent different ways of specifying the command to access the routing table in a computer system. The question is asking for the correct options that are associated with the traditional method of viewing and configuring the routing table.

    Rate this question:

  • 31. 

    Used to send status or error messages about an IP connection.

    Correct Answer
    ICMP protocol
    ICMP Protocol
    ICMP
    icmp
    Explanation
    ICMP stands for Internet Control Message Protocol. It is a network protocol that is used to send status or error messages about an IP connection. ICMP is typically used by network devices to report issues such as unreachable hosts, network congestion, or errors in packet transmission. It is an integral part of the internet protocol suite and is used by network administrators for troubleshooting and diagnostic purposes.

    Rate this question:

  • 32. 

    The ____ directory structure contains network-related settings that you can modify.

    • A.

      /proc

    • B.

      /proc/sys

    • C.

      /proc/net

    • D.

      /proc/sys/net

    Correct Answer
    D. /proc/sys/net
    Explanation
    The correct answer is /proc/sys/net. The /proc/sys/net directory structure contains network-related settings that can be modified.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 15, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 08, 2009
    Quiz Created by
    Svolore
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.