Errata to Linux+ 2005 In Depth
CHAPTER 15 REVIEW QUESTIONS
(Please note that the answer key in Appendix D of the printed book still correctly applies. The publisher apologizes for any inconvenience.)
-
Which port does the HTTP service normally use?
-
20
-
25
-
80
-
119
-
Which zone configuration file contains the list of DNS zones and their type (master/slave) that the name daemon will manage?
-
/var/named/zonename.zone
-
/etc/named.conf
-
/var/named/named.ca
-
/var/named/named.local
-
What FTP daemon is shipped with Red Hat Fedora Core 2?
-
ftpd
-
wu-ftpd
-
rhftpd
-
vsftpd
-
The ____ command is equivalent to the route command.
-
route -f
-
netstat –r
-
showrte
-
traceroute
-
Which of the following is an IDS that involves modifying the Linux kernel to increase process and file security as well as detect security breaches?
-
Linux Intrusion Detection System
-
Snort
-
Advanced Intrusion Detection Environment
-
PortSentry
-
True or false? Stand-alone daemons are typically started at boot time.
-
True or false? A Linux server cannot serve as a DHCP server.
-
True or false? Network File System (NFS) allows UNIX and Linux computers the capability to share files transparently.
-
True or false? By default, sshd uses Kerberos authentication.
-
True or false? Routers only know the networks to which they are directly connected.
-
Daemons identify which packets they should respond to by listening only for packets that have a certain ____ number.
-
When a DNS server resolves IP addresses to FQDNs, it is performing a(n) ____ lookup.
-
____ is the world’s most common Web server.
-
____ can be used to coordinate common configuration files, such as /etc/passwd and /etc/hosts, across several Linux computers within an organization.
-
You can use the ____ command to obtain root access only when you need to perform an administrative task.
Share with your friends: |