Create an account
A service running on a host that has a master table of IP addresses to hosts associations. The table can be queried for either from any network. This service is called?
When you type in a website into your browser you are probably using it's _____________, like www.google.com.
To setup local host to IP translations on the Linux OS one would use the ____________ file.This is the original way we did DNS like operations.
The configuration file for the named daemon located here ______________, is only one part of the DNS system that needs to run on a Linux server.
Your domain forward lookup zone file would be named _____________ if your domain name where linux.com.
A _______________ automatically configures clients on a network with an IP address, netmask, gateway and DNS, so they may communicate on that network.
When a client gets an IP address from a dynamic host configuration protocol server there is a time limit associated between the client and IP address. This is called a ____________________.
Firestarter is another tool we can use to setup and configure the firewall. Which one of the following is false about Firestarter.
ufw and Firestarter can be used on the same firewall.
A Chain is simply a checklist for the ______________ . These ____________ specify what action to take on packets containing certain headers.
ICMP packets are used with many tools like ping and traceroute. What does ICMP stand for?
internet control message protocol
_____________ is used for a way to change the source and destination of packets as they travel through a firewall, this is called IP masquerading.
A Drop Policy will _____________ any packets from ip spoofing attacks or any outside initiated connections.
One of the protocols for a user's email client to get email from an email server is _______________.
Users get mail from a MDA or LDA for email.This stands for a mail delivery agent or local delivery agent. Which of the following is a common one?
Out of the three distinct components of the mail service which does the user see and interact with?
In dealing with mail the location /var/mail/ or /var/spool/mail/ is used for _______________.
It is dangerous to allow __________________ access to a ftp server. The server should be locked down if you do.
One way we connect a share on another pc to make it look like a folder on the local pc, is to use _______________
In a large scale Linux cluster system, Linux supports dfns. For our case we can use ______________________
________________________ is an easy web interface to configure your smb.conf file on your Samba server.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together