Linux Final Exam

50 terms by moonshin3 

Create a new folder

Advertisement Upgrade to remove ads

A service running on a host that has a master table of IP addresses to hosts associations. The table can be queried for either from any network. This service is called?

DNS

When you type in a website into your browser you are probably using it's _____________, like www.google.com.

FQDN

To setup local host to IP translations on the Linux OS one would use the ____________ file.This is the original way we did DNS like operations.

/etc/hosts

One of the more popular programs to host DNS on a linux OS is ______________.

BIND

When checking a PCs name against a DNS server the tool to use is ________________________.

nslookup

The configuration file for the named daemon located here ______________, is only one part of the DNS system that needs to run on a Linux server.

/etc/named.conf

Your domain forward lookup zone file would be named _____________ if your domain name where linux.com.

db.linux.com

The primary DNS server in a network is called the __________________

Master DNS server

In DNS a(n) __________ record is probably the most common type of record found.

A

The _____________ record tells other sites about your mail server.

mx

A _______________ automatically configures clients on a network with an IP address, netmask, gateway and DNS, so they may communicate on that network.

DHCP server

When a client gets an IP address from a dynamic host configuration protocol server there is a time limit associated between the client and IP address. This is called a ____________________.

lease

Netfilter is a good example of a ____________________.

firewall

A tool used to configure the firewall in Ubuntu is _________________.

ufw

The Gufw gives us a __________________ tool we can use to manage the firewall.

graphical

Firestarter is another tool we can use to setup and configure the firewall. Which one of the following is false about Firestarter.

ufw and Firestarter can be used on the same firewall.

A Chain is simply a checklist for the ______________ . These ____________ specify what action to take on packets containing certain headers.

rules

ICMP packets are used with many tools like ping and traceroute. What does ICMP stand for?

internet control message protocol

_____________ is used for a way to change the source and destination of packets as they travel through a firewall, this is called IP masquerading.

NAT

A Drop Policy will _____________ any packets from ip spoofing attacks or any outside initiated connections.

reject

The protocol for Email servers to send email to another server is _________________.

smtp

One early protocol users would use to get their mail from an email server would be?

pop

What port is used for smtp?

25

One of the protocols for a user's email client to get email from an email server is _______________.

imap

What port does POP use?

110

Users get mail from a MDA or LDA for email.This stands for a mail delivery agent or local delivery agent. Which of the following is a common one?

dovecot

Out of the three distinct components of the mail service which does the user see and interact with?

MUA

Popular email server used on linux Os today.

postfix

In dealing with mail the location /var/mail/ or /var/spool/mail/ is used for _______________.

mailbox storage

One popular Linux Spam filter server an administrator might setup is ______________.

SpamAssassin

ftp stands for _________________

File Transfer Protocol

It is dangerous to allow __________________ access to a ftp server. The server should be locked down if you do.

anonymous

_____________ is a popular program to host a FTP site on the Linux OS.

VSFTPD

We start the VSFTPD using the ____________________ command.

service vsftpd start

To allow ftp traffic thru a firewall the main port that has to be open is _______________

21

In Ubuntu a popular website hosting program is ______________.

Apache2

The protocol for web traffic is _________________.

http

The default website in linux is located in the _________________________ folder.

/var/www/

The module for the webserver to serve encrypted websites is __________________

ssl.conf

Being able to have more than one webisite on a server is called ___________________

virtual hosting

One way we connect a share on another pc to make it look like a folder on the local pc, is to use _______________

nfs

NFS operates over a TCP/IP network using ______________________ to manage the file systems.

rpc

Access to the nfs server can be controlled by ______________________________

/etc/hosts.allow

The graphical tool used to setup a nfs share ________________________.

gnome-systems-tools

In a large scale Linux cluster system, Linux supports dfns. For our case we can use ______________________

gfs2

_____________ allows clients on a Windows network to connect to resources on a Linux server.

Samba

Microsoft developed ____________________ to connect PC's to large networks including Unix.

CIFS

To connect to a Windows share the Linux pc must use the _______________________ package.

smbclient

________________________ is an easy web interface to configure your smb.conf file on your Samba server.

swat

What is the following command performing:

allow 137:138/udp ufw

adding udp ports 137 and 138 to the allow acl in the firewall

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set