Linux+ Networking Chapter 15

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ajeff
A
Ajeff
Community Contributor
Quizzes Created: 39 | Total Attempts: 59,872
| Attempts: 230 | Questions: 19
Please wait...
Question 1 / 19
0 %
0/100
Score 0/100
1. A router must have a network interface on more than one network to transfer information between networks. True or False.

Explanation

A router is a networking device that connects multiple networks together. In order to transfer information between these networks, the router must have a network interface on each of the networks it is connecting. This allows the router to receive data from one network and then transmit it to another network. Therefore, the statement is true.

Submit
Please wait...
About This Quiz
Linux Plus Networking Quizzes & Trivia

This quiz covers key networking concepts in Linux, focusing on router interfaces, network services, ports, and routing configurations.

Personalize your quiz and earn a certificate with your name on it!
2. The daemons associated with network services listen for network traffic associated with a particular _________.

Explanation

The daemons associated with network services listen for network traffic associated with a particular port. A port is a communication endpoint in an operating system that allows different applications to send and receive data over a network. Each network service is assigned a specific port number, and the daemons associated with those services listen on that port for incoming network traffic. By monitoring the traffic on a specific port, the daemons can determine which network service the data is intended for and process it accordingly.

Submit
3. Which of the following port numbers is associated with DNS?

Explanation

Port number 53 is associated with DNS (Domain Name System). DNS is responsible for translating domain names into IP addresses. When a client wants to access a website, it sends a DNS query to a DNS server on port 53. The DNS server then responds with the corresponding IP address, allowing the client to establish a connection with the desired website.

Submit
4.

Explanation

not-available-via-ai

Submit
5. Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?

Explanation

Mary has made changes to the DHCP configuration file, but the DHCP daemon does not recognize the new changes. In order for the changes to take effect, Mary should restart the DHCP daemon. Restarting the daemon will reload the configuration file and apply the changes that Mary made.

Submit
6.

Explanation

not-available-via-ai

Submit
7. The document root directory contains files shared by the Samba daemon. True or False?

Explanation

The document root directory does not contain files shared by the Samba daemon. The correct answer is False.

Submit
8. Which of the following actions should you first take to secure your Linux computer against network attacks?

Explanation

To secure a Linux computer against network attacks, the first action you should take is to ensure that only necessary services are running. By disabling or removing unnecessary services, you reduce the potential attack surface and minimize the risk of vulnerabilities being exploited. This helps to limit the exposure of your system to potential threats and enhances its overall security posture. Changing permissions on key system files, running checksums for network service files, and configuring entries in the /etc/sudoers file can also contribute to securing the system, but they are not the first step to take in this scenario.

Submit
9.

Explanation

The correct answer is /etc/sudoers. This file is used by the sudo command in Unix-based systems to determine which users are allowed to run specific commands as the root user or other users. It contains a list of user and group permissions, specifying what commands they are allowed to run and with what privileges. The other options (/etc/sudo, /etc/su.cfg, /etc/sudo.cfg) do not exist or are not used for managing sudo permissions.

Submit
10. Before a computer can be used as a router, it must be provided what configuration information?

Explanation

In order for a computer to function as a router, it must be provided with a routing table. A routing table is a data table stored in a router or a computer that lists the routes to particular network destinations. It contains information about the network topology and determines the best path for forwarding network traffic. Without a routing table, the computer would not be able to properly direct network traffic between different networks.

Submit
11.

Explanation

The correct answer is /etc/httpd/conf/httpd.conf because this file is the main configuration file for the Apache HTTP server. It is located in the /etc/httpd/conf/ directory and contains all the settings and directives for the server. The other options listed (/etc/apache.conf and /etc/apache/httpd.conf) are not standard locations for the Apache configuration file and are therefore incorrect.

Submit
12.

Explanation

Nmap is the correct answer because it is a network scanning tool used to discover hosts and services on a computer network. It sends packets to the target host and analyzes the responses to determine which ports are open, what services are running, and gather other information about the target system. Traceroute and tracert are used to trace the route that packets take from the source to the destination, while sudo is a command used in Unix-like operating systems to run programs with the security privileges of another user.

Submit
13. Which file contains configuration information for the Samba daemons on Red Hat Fedora Core 2?

Explanation

The correct answer is /etc/samba/smb.conf. This file contains the configuration information for the Samba daemons on Red Hat Fedora Core 2. It is the main configuration file for Samba, where users can define various settings such as network shares, security options, and authentication methods. By editing this file, administrators can customize the behavior and functionality of Samba on the system.

Submit
14. Which of the following Linux Intrusion Detection Systems can be used to detect port scans? (Choose all that apply.)

Explanation

PortSentry and Snort are both Linux Intrusion Detection Systems that can be used to detect port scans. PortSentry is a host-based IDS that monitors and responds to suspicious activity on specific ports, while Snort is a network-based IDS that analyzes network traffic for signs of intrusion, including port scans. Both tools have the capability to detect and alert on port scans, making them suitable options for this purpose.

Submit
15.

Explanation

Locking the server in a server closet and setting a BIOS password on the server are both physical security measures that can help prevent unauthorized access to the server. Locking the server in a server closet ensures that only authorized personnel have physical access to the server. Setting a BIOS password adds an extra layer of protection by requiring a password to access the server's BIOS settings, preventing unauthorized configuration changes or access to the server's hardware. These measures help enhance the overall security of the server and protect against potential threats.

Submit
16. Which of the following are stand-alone daemons? (Choose all that apply.)

Explanation

The stand-alone daemons in this list are Apache (httpd) and DNS (named). A daemon is a background process that runs continuously and provides specific services. Apache (httpd) is a web server daemon that handles HTTP requests and serves web pages. DNS (named) is a domain name system daemon that translates domain names into IP addresses. FTP (in.ftpd) and telnet (in.telnetd) are not stand-alone daemons as they require additional software or protocols to function properly.

Submit
17.

Explanation

The given answer, 1020,50, could be a sequence of numbers. It is possible that these numbers are part of a larger sequence where each number is obtained by a specific rule or pattern. Without more information or context, it is difficult to determine the exact explanation for this sequence.

Submit
18. What must you do in order to become a DNS server? (Choose all that apply.)

Explanation

To become a DNS server, you must create zone files, which contain information about the domain names and IP addresses associated with that server. You also need to create resource records for DNS lookups, which provide additional information about the domain names, such as mail server addresses or aliases. Finally, you need to run the name daemon (named), which is the software responsible for handling DNS queries and responses. Creating NIS maps is not required to become a DNS server.

Submit
19. Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? (Choose all that apply.)

Explanation

AIDE and tripwire are both Linux Intrusion Detection Systems that can be used to detect altered files and directories. AIDE (Advanced Intrusion Detection Environment) is a file integrity checker that creates a database of files on the system and regularly checks for any changes or modifications. Tripwire is also a file integrity checker that monitors changes in specified files and directories by comparing them to a previously generated baseline. Both systems are effective in detecting any unauthorized modifications to files and directories on a Linux system.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 13, 2009
    Quiz Created by
    Ajeff
Cancel
  • All
    All (19)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
A ...
The ...
Which of the following port numbers is associated with DNS?
Mary ...
The document root ...
Which ...
Before ...
Which ...
Which ...
Which ...
What ...
Which ...
Alert!

Advertisement