Guide to Linux+ (2nd Edition)

ISBN 0-619-21621-2

End of Chapter Solutions

Chapter 14 Solutions

Review Questions

  1. A subnet mask is used to differentiate the host portion from the network portion in a TCP/IP address. True or False?

Answer: True

  1. When logging in to an FTP server as the anonymous user, what password is usually used?
  2. the user’s normal network password
  3. the password stored in /etc/ftp/pap-secrets
  4. the password for the user account on the FTP server
  5. the user’s e-mail address

Answer: d

  1. Which networking service lets you mount directories from another Linux computer on the network to a mount point on your computer?
  2. NIS
  3. NFS
  4. SMB
  5. FTP

Answer: b

  1. The /etc/sysconfig/network-scripts directory holds files that contain configuration information about NICs, ISDN, and PPP connections. True or False?

Answer: True

  1. Whichfile stores the TCP/IP addresses of the DNS servers used to resolve hostnames?
  2. /etc/hosts
  3. /etc/host.conf
  4. /etc/resolve
  5. /etc/resolv.conf

Answer: d

  1. Whichcommand do you type to exit the FTP utility?
  2. close
  3. exit
  4. bye
  5. done

Answer: c

  1. To test DNS configuration by resolving a hostname to IP address, whichcommand or commands can you use? (Choose all that apply.)
  2. nslookup hostname
  3. dig hostname
  4. host hostname
  5. resolve hostname

Answer: a,b,c

  1. Whichfile holds the methods to be used and the order in which they will be applied for hostname resolution?
  2. /etc/nsswitch.conf
  3. /etc/resolve.conf
  4. /etc/hosts
  5. /etc/dns.conf

Answer: a

  1. What are two means available to resolve a host name to the appropriate TCP/IP address? (Choose two answers.)
  2. DHCP
  3. DNS
  4. /etc/hosts
  5. /etc/resolve.conf

Answer: b,c

  1. A WAN covers a greater geographic area than a LAN. True or False?

Answer: True

  1. What devices are used to transfer information from one network to another?
  2. routers
  3. LANs
  4. DNS servers
  5. DHCP servers

Answer: a

  1. Whichcommand can you use to view the TCP/IP configuration on your computer?
  2. ipconfig
  3. insmod
  4. showip
  5. ifconfig

Answer: d

  1. What is the standard protocol used for communication on the Internet?
  2. TCP/IP
  3. IPX
  4. DLC
  5. AppleTalk

Answer: a

  1. Whichutility allows a Linux computer to access shares on a Windows-based computer?
  2. nis
  3. nfsmount
  4. smb
  5. smbclient

Answer: d

  1. The TCP/IP address of 127.0.0.1 is also referred to as the ______.
  2. local address
  3. lookup address
  4. local host
  5. loopback address

Answer: d

  1. The line that configures the hostname for the computer at boot time can be found in /etc/sysconfig/network.True or False?

Answer: True

  1. Whichcommand would be used to activate the NIC aliased as eth0?
  2. ifup
  3. ifup eth0
  4. ipup eth0
  5. ifdown eth0

Answer: b

  1. Whichfile would you modify to change the TCP/IP address of the first aliased NIC on the system the next time the system is booted or the card is brought up?
  2. /etc/sysconfig/network-scripts/ifcfg-eth1
  3. /etc/sysconfig/network-scripts/ifcfg-eth0
  4. /etc/sysconfig/network-scripts/ipcfg-eth0
  5. /etc/sysconfig/network-scripts/ipcfg-eth1

Answer: b

  1. Before a computer can use a router, it must be provided what configuration information?
  2. routing table
  3. subnet mask
  4. default gateway
  5. default router

Answer: c

  1. Which of the followingutilities can be used to check TCP/IP configuration and test network connectivity? (Choose all that apply.)
  2. ifconfig
  3. ipconfig
  4. ping
  5. netstat -i

Answer: a,c,d

Project 14-1

Step 1: Not available.

Step 2: Not available.

Step 3: It should be if installed.

Step 4: First card will be eth0; access method might vary, but more than likely will be Ethernet.

Step 5: At installation.

Step 6: Not available.

Step 7: Not available.

Step 8: Not available.

Step 9: Not available.

Step 10: Yes.

Step 11: The old one as the script has not been read since it was modified.

Step 12: Not available.

Step 13: The new one as the modified script was read at boot.

Step 14: Not available.

Step 15: Not available.

Step 16: The modified configuration.

Step 17: Not available.

Project 14-2

Step 1: Not available.

Step 2: server1, server1.

Step 3: Yes (provided you configured it during installation).

Step 4: Files then dns.

Step 5: an entry for: 127.0.0.1 server1 localhost.localdomain localhost

Step 6: Yes.

Step 7: Yes.

Step 8: Yes it was resolved, but not available to contact.

Step 9: Yes it was resolved, but not available to contact.

Step 10: Not available.

Project 14-3

Step 1: Not available.

Step 2: 204.152.189.116, yes, zeus-pub.kernel.org.

Step 3: nslookup lists the IP of your DNS server.

Step 4: Detailed query information and statistics.

Step 5: Not available.

Project 14-4

Step 1: Not available.

Step 2: Yes.

Step 3: /

Step 4 Not available.

Step 5: Answers will vary as Web content changes over time; one of the files will always be README.

Step 6: Not available.

Step 7: Not available.

Step 8: Not available.

Step 9: Yes.

Step 10: Not available.

Step 11: Not available.

Project 14-5

Step 1: Not available.

Step 2: Not available.

Step 3: Not available.

Step 4: Yes, as there is a virtual terminal connection listed.

Step 5: Kill your ssh BASH shell.

Step 6: Your virtual terminal connection is not listed.

Step 7: Not available.

Step 8: Answers will vary, yes.

Step 9: Yes, as you are remotely logged into his/her computer.

Step 10: Not available.

Step 11: Yes, as you are logged into your computer locally.

Step 12: Not available.

Project 14-6

Step 1: Not available.

Step 2: Answers will vary, daemons on the system.

Step 3: Not available.

Step 4: Message 2, no.

Step 5: Not available.

Step 6: Not available.

Step 7: Not available.

Step 8: Not available.

Step 9: Not available.

Step 10: Yes.

Step 11: Not available.

Step 12: Not available.

Step 13: Not available.

Step 14: Not available.

Step 15: Yes.

Step 16: Not available.

Step 17: Not available.

Step 18: Not available.

Step 19: Not available.

Step 20: Not available.

Step 21: Not available.

Step 22: Yes.

Step 23: Not available.

Discovery Exercises

Discovery Exercise 1

Subnet mask = 255.240.0.0

Hosts per network = 220-2

First five ranges are:

100.0.0.1–100.15.255.254

100.16.0.1–100.31.255.254

100.32.0.1–100.47.255.254

100.48.0.1–100.63.255.254

100.64.0.1–100.79.255.254

Discovery Exercise 2

The cat command is run on the remote system; to display the results of a text file to the local terminal on your machine, you just save this to a file on the local machine instead using redirection. The cat command cannot be used to save a binary file in this manner as it only works on text files.

Discovery Exercise 3

Answers will vary. Not available.

Discovery Exercise 4

Answers will vary. Not available.

Discovery Exercise 5

Answers will vary. Not available.

1