Guide to Linux+ (2nd Edition) ISBN 0-619-21621-2 End of Chapter Solutions Chapter 14 Solutions Review Questions 1. A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address. True or False? Answer: True 2. When logging in to an FTP server as the anonymous user, what password is usually used? a. the user’s normal network password b. the password stored in /etc/ftp/pap-secrets c. the password for the user account on the FTP server d. the user’s e-mail address Answer: d 3. Which networking service lets you mount directories from another Linux computer on the network to a mount point on your computer? a. NIS b. NFS c. SMB d. FTP Answer: b 4. The /etc/sysconfig/network-scripts directory holds files that contain configuration information about NICs, ISDN, and PPP connections. True or False? Answer: True 5. Which file stores the TCP/IP addresses of the DNS servers used to resolve host names? a. /etc/hosts b. /etc/host.conf c. /etc/resolve d. /etc/resolv.conf Answer: d 6. Which command do you type to exit the FTP utility? a. close b. exit c. bye d. done Answer: c 7. To test DNS configuration by resolving a host name to IP address, which command or commands can you use? (Choose all that apply.) a. nslookup hostname b. dig hostname c. host hostname d. resolve hostname Answer: a, b, c 8. Which file holds the methods to be used and the order in which they will be applied for host name resolution? a. /etc/nsswitch.conf b. /etc/resolve.conf c. /etc/hosts d. /etc/dns.conf Answer: a 1 9. What are two means available to resolve a host name to the appropriate TCP/IP address? (Choose two answers.) a. DHCP b. DNS c. /etc/hosts d. /etc/resolve.conf Answer: b, c 10. A WAN covers a greater geographic area than a LAN. True or False? Answer: True 11. What devices are used to transfer information from one network to another? a. routers b. LANs c. DNS servers d. DHCP servers Answer: a 12. Which command can you use to view the TCP/IP configuration on your computer? a. ipconfig b. insmod c. showip d. ifconfig Answer: d 13. What is the standard protocol used for communication on the Internet? a. TCP/IP b. IPX c. DLC d. AppleTalk Answer: a 14. Which utility allows a Linux computer to access shares on a Windows-based computer? a. nis b. nfsmount c. smb d. smbclient Answer: d 15. The TCP/IP address of 127.0.0.1 is also referred to as the __________. a. local address b. lookup address c. local host d. loopback address Answer: d 16. The line that configures the host name for the computer at boot time can be found in /etc/sysconfig/network. True or False? Answer: True 17. Which command would be used to activate the NIC aliased as eth0? a. ifup b. ifup eth0 c. ipup eth0 d. ifdown eth0 Answer: b 18. Which file would you modify to change the TCP/IP address of the first aliased NIC on the system the next time the system is booted or the card is brought up? a. /etc/sysconfig/network-scripts/ifcfg-eth1 b. /etc/sysconfig/network-scripts/ifcfg-eth0 c. /etc/sysconfig/network-scripts/ipcfg-eth0 d. /etc/sysconfig/network-scripts/ipcfg-eth1 Answer: b 19. Before a computer can use a router, it must be provided what configuration information? 2 a. routing table b. subnet mask c. default gateway d. default router Answer: c 20. Which of the following utilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.) a. ifconfig b. ipconfig c. ping d. netstat -i Answer: a, c, d Project 14-1 Step 1: Not available. Step 2: Not available. Step 3: It should be if installed. Step 4: First card will be eth0; access method might vary, but more than likely will be Ethernet. Step 5: At installation. Step 6: Not available. Step 7: Not available. Step 8: Not available. Step 9: Not available. Step 10: Yes. Step 11: The old one as the script has not been read since it was modified. Step 12: Not available. Step 13: The new one as the modified script was read at boot. Step 14: Not available. Step 15: Not available. Step 16: The modified configuration. Step 17: Not available. Project 14-2 Step 1: Not available. Step 2: server1, server1. Step 3: Yes (provided you configured it during installation). Step 4: Files then dns. Step 5: an entry for: 127.0.0.1 server1 localhost.localdomain Step 6: Yes. Step 7: Yes. Step 8: Yes it was resolved, but not available to contact. Step 9: Yes it was resolved, but not available to contact. Step 10: Not available. Project 14-3 Step 1: Not available. Step 2: 204.152.189.116, yes, zeus-pub.kernel.org. Step 3: nslookup lists the IP of your DNS server. Step 4: Detailed query information and statistics. Step 5: Not available. Project 14-4 3 localhost Step 1: Not available. Step 2: Yes. Step 3: / Step 4 Not available. Step 5: Answers will vary as Web content changes over time; one of the files will always be README. Step 6: Not available. Step 7: Not available. Step 8: Not available. Step 9: Yes. Step 10: Not available. Step 11: Not available. Project 14-5 Step 1: Not available. Step 2: Not available. Step 3: Not available. Step 4: Yes, as there is a virtual terminal connection listed. Step 5: Kill your ssh BASH shell. Step 6: Your virtual terminal connection is not listed. Step 7: Not available. Step 8: Answers will vary, yes. Step 9: Yes, as you are remotely logged in to his/her computer. Step 10: Not available. Step 11: Yes, as you are logged in to your computer locally. Step 12: Not available. Project 14-6 Step 1: Not available. Step 2: Answers will vary, daemons on the system. Step 3: Not available. Step 4: Message 2, no. Step 5: Not available. Step 6: Not available. Step 7: Not available. Step 8: Not available. Step 9: Not available. Step 10: Yes. Step 11: Not available. Step 12: Not available. Step 13: Not available. Step 14: Not available. Step 15: Yes. Step 16: Not available. Step 17: Not available. Step 18: Not available. Step 19: Not available. Step 20: Not available. Step 21: Not available. Step 22: Yes. Step 23: Not available. Discovery Exercises Discovery Exercise 1 4 Subnet mask = 255.240.0.0 Hosts per network = 220-2 First five ranges are: 100.0.0.1–100.15.255.254 100.16.0.1–100.31.255.254 100.32.0.1–100.47.255.254 100.48.0.1–100.63.255.254 100.64.0.1–100.79.255.254 Discovery Exercise 2 The cat command is run on the remote system; to display the results of a text file to the local terminal on your machine, you just save this to a file on the local machine instead using redirection. The cat command cannot be used to save a binary file in this manner as it only works on text files. Discovery Exercise 3 Answers will vary. Not available. Discovery Exercise 4 Answers will vary. Not available. Discovery Exercise 5 Answers will vary. Not available. 5