CIS 290 – UNIX System Administration



CIS 238 UNIX Network Administration Final

Name: ________________________________

1) When you view all system processes, you notice there are over 35 HTTP daemons running. You thought you configured 10, what has happened?

2) This command can be used to mount a Windows drive from a LINUX Samba client:

A. smbmount

B. smbfs

C. smbclient

D. smb

E. mount –t cifs

3) How can you test a Website without using a graphical interface client? (Select all that apply)

A. SWAT

B. lynx

C. telnet 80

D. netscape -text

E. netcat

F. nmap

4) This sysctl.conf statement makes a multihomed LINUX machine act as a router: ________________________.

5) A user tries to logs into an FTP server; the message is that she is not authorized. What file(s) affect this access? _______________________.

6) You made a couple of quick changes to your Samba configuration file and you need to test it quickly for syntax errors. Which utility should you run?

A. smbmount

B. smbclient

C. smbfs

D. testparm

7) The sales department wants to combine it’s Web site with the HR department hardware to save money. What is the easiest way to do this?

A. Virtual Host

B. .htaccess

C. new DocumentRoot

D. memory

8) Which of the following TCP/IP network utilities is BEST used to determine the hardware ethernet address of the card(s) installed in the current machine?

A. netstat

B. ifconfig

C. ethers

D. arpwatch

9) Which of the following TCP/IP network utilities is the BEST tool to use in identifying bottlenecks between remote machines on the network?

A. route

B. netstat

C. ping

D. traceroute

E. pathping

CIS 238 UNIX Network Administration Final

10) You notice no ftpd service running when you randomly check your system, but no complaints have been made about FTP being unavailable. Why is there no FTP daemon?

A. Running as an xinetd application

B. Runs at designated intervals of day via cron

C. Nobody uses it, system cleans house regularly

D. vsftpd ran of memory and abended

11) How would you determine if ftpd service is running without actually trying an FTP LOGIN? Select all that apply.

A. telnet 21

B. lynx

C. telnet 80

D. SWAT

E. netcat

F. nmap

12) Show the nmap command to test for all open reserved IANA ports on subnet 192.168.1.0 / 255.255.255.0 : ________________.

13) You copy over the Windows-based Web site to your site, set up the virtual host, and try to hit the homepage, but it fails. Which of these could be the problem if this was a straightforward Web site copy of existing files that worked?

A. Wrong DocumentRoot

B. Wrong Port Number

C. Wrong directory index file

D. Wrong browser settings

14) The sales department wants to know if it can selectively give access to certain users via FTP. Which FTP options could be used?

A. .htaccess

B. ftpaccess

C. rpm

D. hosts.allow

15) What program(s) are started on a Samba server?

A. /smbd

B. /nmbd

C. /smbclient

D. /smb.conf

16) You successsfully login to an FTP server, then issue an “ls” command and get no response. What’s the probable reason for this?

A. Your ID has no permissions in the default directory.

B. FTP is not allowed thru the firewall

C. Firewall not configured for active FTP.

D. Wrong FTP client.

17) The sales department wants to know if it can selectively give access to certain users on the webserver. Which httpd options could be used?

A. .htaccess

B. ftpaccess

C. rpm

D. hosts.allow

CIS 238 UNIX Network Administration Final

18) This file contains the service name and port #’s for all defined services on this system: _______________________.

This file contains the service name and port #’s for all defined protocols on this system: _______________________.

19) Which command sequence would you use to add “Bob” with password “password” as an allowed WEB (browser via the network, not a local) user to your virtual server document root: /var/www/html? Describe all steps,

20) Which program checks the DNS setup? Check all that apply.

A. dnscheck

B. BIND

C. nslookup

D. resolve

E. dig

F. hosts

G host

21) DHCP has been installed and configured properly. The network is responding. There are no firewalls or extraneous server processes. Clients are not getting their network information, though. What could be the cause?

A. Not enough disk space.

B. The dhcpd.leases file was not created.

C. DHCP is in loopback mode.

D. DHCP has phased the multicast server array.

E. dhcpd was not started

22) Show an example of a properly formatted DNS MX record for server “instructor” as primary for zone “p156.oakton.edu”:

_________________________.

23) In the /etc/exports file, if we want to export /data as read-only, but grant write permission to the supervisor, the proper line is:

A. /data (rw) superv.(ro)

B. /data (ro) superv.(rw)

C. /data (ro) *.(rw)

D. /data superv.(rw)

24) You start getting complaints about Internet performance after performing maintenance on one of the DNS servers. Circuit and firewall utilization are low and PING response times are good. What’s a possible explanation?

A. Speed / duplex setting change on the router

B. ISP forwarder is down

C. DNS server is down

D. recursive lookups removed

E. Packet errors on the network

25) Your company has just suffered an external security breach. As a result, the security department has tightened the screws on all the servers, routers and firewalls. Up until this point, all user data had been mounted over NFS, but now, nothing works. What happened?

A. The hackers erased the NFS data, and they got the backups too.

B. The NFS ports are no longer allowed through the necessary firewalls.

C. The two are unrelated, check your disk space.

D. The file system is no longer shared from the server.

CIS 238 UNIX Network Administration Final

Name: ________________________________

26) On bootup, the system will check what file for NFS shares to mount?

A. /etc/exports

B. /etc/nfs.conf

C. /etc/fstab

D. /nfs/conf

27) The /proc directory contains information about: _______________________

28) Which of the following is the primary directory for Linux system configuration information:

/A. usr

/B. etc

/C. home

/D. var

29) This file determines the order in which TCP/IP names are resolved:

/A. /etc/resolv.conf

/B. etc/hosts

/C. etc/host.conf

/D. etc/nsswitch.conf

30) Which of the following directories is the primary location for system level runtime files:

/A. usr

/B. etc

/C. home

/D. var

31) Which of the following directories is the primary location for temporary user files:

A. /tmp

B. /etc

C. /home

D. /var

32) A Windows user complains she can’t access the network even though her has an IP address 169.254.13.48 on her workstation as shown by “ipconfig /all”. Why can’t she access the network? What is this feature called?

33) Which of the following utilities most likely be used to display the ports for which the local server is currently listening? What flags are used __________________________?

A.. ifconfig

B. netlst

C. ipchains

D. nc

E. netstat

CIS 238 UNIX Network Administration Final

Name: ________________________________

34) How many hosts are possible in the subnet with the netmask of 255.255.0.0?

A. 63 E. 32768

B. 64 F. 65534

C. 254 G. 32766

D. 256 H. 0

35) The three pieces of information to required to properly configure a TCP/IP network connection are the:

___________________, __________________ and _____________________.

32) The command for configuring TCP/IP info on a LINUX network interface is: ______________________________.

33) The general TCP/IP stack program that restricts service by IP address is called: _________________________.

34) The two files that implement the program in the previous question are: ______________________ and _________________. Which one is examined first?.

35) Suppose that the 'sendmail' application is used on the current system as a mail transport agent. What file is modified to cause local user 'jdoe 'mail forwarded “joesmanager” on the same system while on vacation. What files is modified to forward the email to jdoe@?

36) SSH keys are stored in this hidden directory in the user’s HOME directory. __________________________.

37) This command will show all active LINUX firewall rules: ______________________.

38) This statement must be commented out in sendmail.mc order to receive E-Mail from the outside using SENDMAIL.

39) The NIST time server in Boulder CO is referred to as a _______________________ time server. .

40) You've set up a gateway LINUX system for your company's Internet connection. The server is connected to the network so that all may share the connection. You can see the Internet from the server, and you can see your internal network as well. However, the users are unable to access the Internet. What's wrong?

A. The users each need their own Internet IP address

B. Be sure routed or gated is running on the dialup server.

C. Check to see that the inside network card knows about the outside network card.

D. Make sure IP forwarding is turned on.

E. DNS isn’t working

41) The function of “xhosts” under XWindows is to: __________________________________

42) PKI uses _______________________ keys meaning one key encrypts and one key decrypts. However, either key can encrypt or decrypt. The encryption of the other users public key with the local user’s private ket is referred to as a ____________________.

43) True/False: SSH uses symmetric keys.

44) True/False: Under XWindows, the host running the GUI is the client.

45) This command is used to display/set network interface card (NIC) physical settings (e.g. speed/duplex) _______________________.

CIS 238 UNIX Network Administration Final

Name: ________________________________

46) What command, including options, will take the system time and store in it in the hardware clock? ___________________.

47) Show the command(s) to

a) create a named pipe file /tmp/pipe1

b) copy the current “ls –al” file listing into it

c) copy the results into file files.txt

48) RFC 1918 specifies what private IP address ranges?

49) What is the name of the command used to generate the ssh keys for the openssh server?

50) Internet research: fill out the below matrix to determine the use (function) of the below network service daemons and the latest RPM release of the product.

Daemon name Description (function) Latest release RPM for LINUX

vsftpd

in_telnetd

ipop3d

imapd

httpd

xntpd

nntpd

named

gated

routed

httpd

sendmail

tcpd

nfsd

rpcd

sshd

samba

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download