Linux+ Networking Chapter 15

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Ajeff
A
Ajeff
Community Contributor
Quizzes Created: 39 | Total Attempts: 55,136
Questions: 19 | Attempts: 227

SettingsSettingsSettings
Linux Plus Networking Quizzes & Trivia

Linux+ Networking Chapter 15


Questions and Answers
  • 1. 

    • A.

      INPUT

    • B.

      ROUTE

    • C.

      FORWARD

    • D.

      OUTPUT

    Correct Answer
    A. INPUT
  • 2. 

    A router must have a network interface on more than one network to transfer information between networks. True or False.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A router is a networking device that connects multiple networks together. In order to transfer information between these networks, the router must have a network interface on each of the networks it is connecting. This allows the router to receive data from one network and then transmit it to another network. Therefore, the statement is true.

    Rate this question:

  • 3. 

    The daemons associated with network services listen for network traffic associated with a particular _________.

    • A.

      Station

    • B.

      Port

    • C.

      TCP/IP address

    • D.

      Allocation number

    Correct Answer
    B. Port
    Explanation
    The daemons associated with network services listen for network traffic associated with a particular port. A port is a communication endpoint in an operating system that allows different applications to send and receive data over a network. Each network service is assigned a specific port number, and the daemons associated with those services listen on that port for incoming network traffic. By monitoring the traffic on a specific port, the daemons can determine which network service the data is intended for and process it accordingly.

    Rate this question:

  • 4. 

    • A.

      20

    • B.

      137

    • C.

      49

    • D.

      23

    Correct Answer
    D. 23
  • 5. 

    The document root directory contains files shared by the Samba daemon. True or False?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The document root directory does not contain files shared by the Samba daemon. The correct answer is False.

    Rate this question:

  • 6. 

    Before a computer can be used as a router, it must be provided what configuration information?

    • A.

      Routing table

    • B.

      Subnet mask

    • C.

      Default gateway

    • D.

      Default router

    Correct Answer
    A. Routing table
    Explanation
    In order for a computer to function as a router, it must be provided with a routing table. A routing table is a data table stored in a router or a computer that lists the routes to particular network destinations. It contains information about the network topology and determines the best path for forwarding network traffic. Without a routing table, the computer would not be able to properly direct network traffic between different networks.

    Rate this question:

  • 7. 

    • A.

      1020

    • B.

      50

    • C.

      2048

    • D.

      60198

    Correct Answer(s)
    A. 1020
    B. 50
    Explanation
    The given answer, 1020,50, could be a sequence of numbers. It is possible that these numbers are part of a larger sequence where each number is obtained by a specific rule or pattern. Without more information or context, it is difficult to determine the exact explanation for this sequence.

    Rate this question:

  • 8. 

    What must you do in order to become a DNS server? (Choose all that apply.)

    • A.

      Create zone files.

    • B.

      Create resource records for DNS lookups.

    • C.

      Create NIS maps.

    • D.

      Run the name daemon (named).

    Correct Answer(s)
    A. Create zone files.
    B. Create resource records for DNS lookups.
    D. Run the name daemon (named).
    Explanation
    To become a DNS server, you must create zone files, which contain information about the domain names and IP addresses associated with that server. You also need to create resource records for DNS lookups, which provide additional information about the domain names, such as mail server addresses or aliases. Finally, you need to run the name daemon (named), which is the software responsible for handling DNS queries and responses. Creating NIS maps is not required to become a DNS server.

    Rate this question:

  • 9. 

    Which of the following Linux Intrusion Detection Systems can be used to detect port scans? (Choose all that apply.)

    • A.

      ICU

    • B.

      PortSentry

    • C.

      Tripwire

    • D.

      Snort

    Correct Answer(s)
    B. PortSentry
    D. Snort
    Explanation
    PortSentry and Snort are both Linux Intrusion Detection Systems that can be used to detect port scans. PortSentry is a host-based IDS that monitors and responds to suspicious activity on specific ports, while Snort is a network-based IDS that analyzes network traffic for signs of intrusion, including port scans. Both tools have the capability to detect and alert on port scans, making them suitable options for this purpose.

    Rate this question:

  • 10. 

    Which file contains configuration information for the Samba daemons on Red Hat Fedora Core 2?

    • A.

      /etc/samba/samba.cfg

    • B.

      /etc/samba.conf

    • C.

      /etc/samba/smb/smb.conf

    • D.

      /etc/samba/smb.conf

    Correct Answer
    D. /etc/samba/smb.conf
    Explanation
    The correct answer is /etc/samba/smb.conf. This file contains the configuration information for the Samba daemons on Red Hat Fedora Core 2. It is the main configuration file for Samba, where users can define various settings such as network shares, security options, and authentication methods. By editing this file, administrators can customize the behavior and functionality of Samba on the system.

    Rate this question:

  • 11. 

    Which of the following port numbers is associated with DNS?

    • A.

      29

    • B.

      21

    • C.

      53

    • D.

      111

    Correct Answer
    C. 53
    Explanation
    Port number 53 is associated with DNS (Domain Name System). DNS is responsible for translating domain names into IP addresses. When a client wants to access a website, it sends a DNS query to a DNS server on port 53. The DNS server then responds with the corresponding IP address, allowing the client to establish a connection with the desired website.

    Rate this question:

  • 12. 

    • A.

      /etc/sudo

    • B.

      /etc/su.cfg

    • C.

      /etc/sudo.cfg

    • D.

      /etc/sudoers

    Correct Answer
    D. /etc/sudoers
    Explanation
    The correct answer is /etc/sudoers. This file is used by the sudo command in Unix-based systems to determine which users are allowed to run specific commands as the root user or other users. It contains a list of user and group permissions, specifying what commands they are allowed to run and with what privileges. The other options (/etc/sudo, /etc/su.cfg, /etc/sudo.cfg) do not exist or are not used for managing sudo permissions.

    Rate this question:

  • 13. 

    Which of the following actions should you first take to secure your Linux computer against network attacks?

    • A.

      Change permissions on key system files.

    • B.

      Ensure that only necessary services are running.

    • C.

      Run a checksum for each file used by network services.

    • D.

      Configure entries in the /etc/sudoers file.

    Correct Answer
    B. Ensure that only necessary services are running.
    Explanation
    To secure a Linux computer against network attacks, the first action you should take is to ensure that only necessary services are running. By disabling or removing unnecessary services, you reduce the potential attack surface and minimize the risk of vulnerabilities being exploited. This helps to limit the exposure of your system to potential threats and enhances its overall security posture. Changing permissions on key system files, running checksums for network service files, and configuring entries in the /etc/sudoers file can also contribute to securing the system, but they are not the first step to take in this scenario.

    Rate this question:

  • 14. 

    • A.

      Traceroute

    • B.

      Tracert

    • C.

      Nmap

    • D.

      Sudo

    Correct Answer
    C. Nmap
    Explanation
    Nmap is the correct answer because it is a network scanning tool used to discover hosts and services on a computer network. It sends packets to the target host and analyzes the responses to determine which ports are open, what services are running, and gather other information about the target system. Traceroute and tracert are used to trace the route that packets take from the source to the destination, while sudo is a command used in Unix-like operating systems to run programs with the security privileges of another user.

    Rate this question:

  • 15. 

    Which of the following Linux Intrusion Detection Systems can be used to detect altered files and directories? (Choose all that apply.)

    • A.

      AIDE

    • B.

      SWATCH

    • C.

      Tripwire

    • D.

      Snort

    Correct Answer(s)
    A. AIDE
    C. Tripwire
    Explanation
    AIDE and tripwire are both Linux Intrusion Detection Systems that can be used to detect altered files and directories. AIDE (Advanced Intrusion Detection Environment) is a file integrity checker that creates a database of files on the system and regularly checks for any changes or modifications. Tripwire is also a file integrity checker that monitors changes in specified files and directories by comparing them to a previously generated baseline. Both systems are effective in detecting any unauthorized modifications to files and directories on a Linux system.

    Rate this question:

  • 16. 

    • A.

      /etc/httpd.conf

    • B.

      /etc/apache.conf

    • C.

      /etc/httpd/conf/httpd.conf

    • D.

      /etc/apache/httpd.conf

    Correct Answer
    C. /etc/httpd/conf/httpd.conf
    Explanation
    The correct answer is /etc/httpd/conf/httpd.conf because this file is the main configuration file for the Apache HTTP server. It is located in the /etc/httpd/conf/ directory and contains all the settings and directives for the server. The other options listed (/etc/apache.conf and /etc/apache/httpd.conf) are not standard locations for the Apache configuration file and are therefore incorrect.

    Rate this question:

  • 17. 

    Mary is a system administrator in your organization. She has recently made changes to the DHCP configuration file, but the DHCP daemon does not seem to recognize the new changes. What should she do?

    • A.

      Run the su command to switch to the root user and reedit the configuration file.

    • B.

      Run the sudo command to edit the configuration file.

    • C.

      Restart the DHCP daemon.

    • D.

      Restart the xinetd daemon.

    Correct Answer
    C. Restart the DHCP daemon.
    Explanation
    Mary has made changes to the DHCP configuration file, but the DHCP daemon does not recognize the new changes. In order for the changes to take effect, Mary should restart the DHCP daemon. Restarting the daemon will reload the configuration file and apply the changes that Mary made.

    Rate this question:

  • 18. 

    • A.

      Lock the server in a server closet.

    • B.

      Ensure that you are logged in as the root user to the server at all times.

    • C.

      Set a BIOS password on the server.

    • D.

      Set the default run level to 1 (Single User Mode).

    Correct Answer(s)
    A. Lock the server in a server closet.
    C. Set a BIOS password on the server.
    Explanation
    Locking the server in a server closet and setting a BIOS password on the server are both physical security measures that can help prevent unauthorized access to the server. Locking the server in a server closet ensures that only authorized personnel have physical access to the server. Setting a BIOS password adds an extra layer of protection by requiring a password to access the server's BIOS settings, preventing unauthorized configuration changes or access to the server's hardware. These measures help enhance the overall security of the server and protect against potential threats.

    Rate this question:

  • 19. 

    Which of the following are stand-alone daemons? (Choose all that apply.)

    • A.

      Apache (httpd)

    • B.

      FTP (in.ftpd)

    • C.

      Telnet (in.telnetd)

    • D.

      DNS (named)

    Correct Answer(s)
    A. Apache (httpd)
    D. DNS (named)
    Explanation
    The stand-alone daemons in this list are Apache (httpd) and DNS (named). A daemon is a background process that runs continuously and provides specific services. Apache (httpd) is a web server daemon that handles HTTP requests and serves web pages. DNS (named) is a domain name system daemon that translates domain names into IP addresses. FTP (in.ftpd) and telnet (in.telnetd) are not stand-alone daemons as they require additional software or protocols to function properly.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 13, 2009
    Quiz Created by
    Ajeff
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.