Ch14

advertisement
Guide to Linux+ (2nd Edition)
ISBN 0-619-21621-2
End of Chapter Solutions
Chapter 14 Solutions
Review Questions
1.
A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP
address. True or False?
Answer: True
2. When logging in to an FTP server as the anonymous user, what password is usually used?
a. the user’s normal network password
b. the password stored in /etc/ftp/pap-secrets
c. the password for the user account on the FTP server
d. the user’s e-mail address
Answer: d
3. Which networking service lets you mount directories from another Linux computer on the network
to a mount point on your computer?
a. NIS
b. NFS
c. SMB
d. FTP
Answer: b
4. The /etc/sysconfig/network-scripts directory holds files that contain configuration information
about NICs, ISDN, and PPP connections. True or False?
Answer: True
5. Which file stores the TCP/IP addresses of the DNS servers used to resolve host names?
a. /etc/hosts
b. /etc/host.conf
c. /etc/resolve
d. /etc/resolv.conf
Answer: d
6. Which command do you type to exit the FTP utility?
a. close
b. exit
c. bye
d. done
Answer: c
7. To test DNS configuration by resolving a host name to IP address, which command or commands
can you use? (Choose all that apply.)
a. nslookup hostname
b. dig hostname
c. host hostname
d. resolve hostname
Answer: a, b, c
8. Which file holds the methods to be used and the order in which they will be applied for host name
resolution?
a. /etc/nsswitch.conf
b. /etc/resolve.conf
c. /etc/hosts
d. /etc/dns.conf
Answer: a
1
9.
What are two means available to resolve a host name to the appropriate TCP/IP address? (Choose
two answers.)
a. DHCP
b. DNS
c. /etc/hosts
d. /etc/resolve.conf
Answer: b, c
10. A WAN covers a greater geographic area than a LAN. True or False?
Answer: True
11. What devices are used to transfer information from one network to another?
a. routers
b. LANs
c. DNS servers
d. DHCP servers
Answer: a
12. Which command can you use to view the TCP/IP configuration on your computer?
a. ipconfig
b. insmod
c. showip
d. ifconfig
Answer: d
13. What is the standard protocol used for communication on the Internet?
a. TCP/IP
b. IPX
c. DLC
d. AppleTalk
Answer: a
14. Which utility allows a Linux computer to access shares on a Windows-based computer?
a. nis
b. nfsmount
c. smb
d. smbclient
Answer: d
15. The TCP/IP address of 127.0.0.1 is also referred to as the __________.
a. local address
b. lookup address
c. local host
d. loopback address
Answer: d
16. The line that configures the host name for the computer at boot time can be found in
/etc/sysconfig/network. True or False?
Answer: True
17. Which command would be used to activate the NIC aliased as eth0?
a. ifup
b. ifup eth0
c. ipup eth0
d. ifdown eth0
Answer: b
18. Which file would you modify to change the TCP/IP address of the first aliased NIC on the system
the next time the system is booted or the card is brought up?
a. /etc/sysconfig/network-scripts/ifcfg-eth1
b. /etc/sysconfig/network-scripts/ifcfg-eth0
c. /etc/sysconfig/network-scripts/ipcfg-eth0
d. /etc/sysconfig/network-scripts/ipcfg-eth1
Answer: b
19. Before a computer can use a router, it must be provided what configuration information?
2
a. routing table
b. subnet mask
c. default gateway
d. default router
Answer: c
20. Which of the following utilities can be used to check TCP/IP configuration and test network
connectivity? (Choose all that apply.)
a. ifconfig
b. ipconfig
c. ping
d. netstat -i
Answer: a, c, d
Project 14-1
Step 1: Not available.
Step 2: Not available.
Step 3: It should be if installed.
Step 4: First card will be eth0; access method might vary, but more than likely will be Ethernet.
Step 5: At installation.
Step 6: Not available.
Step 7: Not available.
Step 8: Not available.
Step 9: Not available.
Step 10: Yes.
Step 11: The old one as the script has not been read since it was modified.
Step 12: Not available.
Step 13: The new one as the modified script was read at boot.
Step 14: Not available.
Step 15: Not available.
Step 16: The modified configuration.
Step 17: Not available.
Project 14-2
Step 1: Not available.
Step 2: server1, server1.
Step 3: Yes (provided you configured it during installation).
Step 4: Files then dns.
Step 5: an entry for: 127.0.0.1 server1 localhost.localdomain
Step 6: Yes.
Step 7: Yes.
Step 8: Yes it was resolved, but not available to contact.
Step 9: Yes it was resolved, but not available to contact.
Step 10: Not available.
Project 14-3
Step 1: Not available.
Step 2: 204.152.189.116, yes, zeus-pub.kernel.org.
Step 3: nslookup lists the IP of your DNS server.
Step 4: Detailed query information and statistics.
Step 5: Not available.
Project 14-4
3
localhost
Step 1: Not available.
Step 2: Yes.
Step 3: /
Step 4 Not available.
Step 5: Answers will vary as Web content changes over time; one of the files will always be README.
Step 6: Not available.
Step 7: Not available.
Step 8: Not available.
Step 9: Yes.
Step 10: Not available.
Step 11: Not available.
Project 14-5
Step 1: Not available.
Step 2: Not available.
Step 3: Not available.
Step 4: Yes, as there is a virtual terminal connection listed.
Step 5: Kill your ssh BASH shell.
Step 6: Your virtual terminal connection is not listed.
Step 7: Not available.
Step 8: Answers will vary, yes.
Step 9: Yes, as you are remotely logged in to his/her computer.
Step 10: Not available.
Step 11: Yes, as you are logged in to your computer locally.
Step 12: Not available.
Project 14-6
Step 1: Not available.
Step 2: Answers will vary, daemons on the system.
Step 3: Not available.
Step 4: Message 2, no.
Step 5: Not available.
Step 6: Not available.
Step 7: Not available.
Step 8: Not available.
Step 9: Not available.
Step 10: Yes.
Step 11: Not available.
Step 12: Not available.
Step 13: Not available.
Step 14: Not available.
Step 15: Yes.
Step 16: Not available.
Step 17: Not available.
Step 18: Not available.
Step 19: Not available.
Step 20: Not available.
Step 21: Not available.
Step 22: Yes.
Step 23: Not available.
Discovery Exercises
Discovery Exercise 1
4
Subnet mask = 255.240.0.0
Hosts per network = 220-2
First five ranges are:
100.0.0.1–100.15.255.254
100.16.0.1–100.31.255.254
100.32.0.1–100.47.255.254
100.48.0.1–100.63.255.254
100.64.0.1–100.79.255.254
Discovery Exercise 2
The cat command is run on the remote system; to display the results of a text file to the local terminal on
your machine, you just save this to a file on the local machine instead using redirection. The cat command
cannot be used to save a binary file in this manner as it only works on text files.
Discovery Exercise 3
Answers will vary. Not available.
Discovery Exercise 4
Answers will vary. Not available.
Discovery Exercise 5
Answers will vary. Not available.
5
Download