| 1 | Linux System Administration and IP Services |
|---|
| 2 | |
|---|
| 3 | |
|---|
| 4 | Final Exam |
|---|
| 5 | ---------- |
|---|
| 6 | |
|---|
| 7 | 1.) Which key should you apply a passphrase on? (Check one) |
|---|
| 8 | - Public key? [ ] |
|---|
| 9 | - Private key? [ ] |
|---|
| 10 | |
|---|
| 11 | 2.) In our classroom what was the IP address of the authoritative nameserver for |
|---|
| 12 | the ws.nsrc.org zone? |
|---|
| 13 | |
|---|
| 14 | |
|---|
| 15 | 3.) What is the best operating system to use to provide core Network services such as |
|---|
| 16 | email, web, DNS, etc� (Check one) |
|---|
| 17 | |
|---|
| 18 | - UNIX [ ] |
|---|
| 19 | - Linux [ ] |
|---|
| 20 | - Windows [ ] |
|---|
| 21 | - Other [ ] |
|---|
| 22 | |
|---|
| 23 | 4.) How many usable IP addresses are available in a /24 network? |
|---|
| 24 | |
|---|
| 25 | |
|---|
| 26 | 5.) If you have a subnet on your campus that contains 126 usable IP addresses what is |
|---|
| 27 | the netmask for that network? (Check one) |
|---|
| 28 | |
|---|
| 29 | - /24 (255.255.255.0) [ ] |
|---|
| 30 | - /23 (255.255.254.0 ) [ ] |
|---|
| 31 | - /25 (255.255.255.128) [ ] |
|---|
| 32 | |
|---|
| 33 | 6.) If you have two 100 Mbps circuits, which are: |
|---|
| 34 | a.) 1 km of optic fiber |
|---|
| 35 | b.) Via satellite with a distance of 30 km between the base and the satellite |
|---|
| 36 | |
|---|
| 37 | For two packets of the same size which will have the larger transmission delay? |
|---|
| 38 | |
|---|
| 39 | Circuit a [ ] |
|---|
| 40 | Circuit b [ ] |
|---|
| 41 | Neither [ ] |
|---|
| 42 | |
|---|
| 43 | Propagation delay? |
|---|
| 44 | |
|---|
| 45 | Circuit a [ ] |
|---|
| 46 | Circuit b [ ] |
|---|
| 47 | |
|---|
| 48 | 7.) What command can you use to find the name servers for a sub-domain? (Check one) |
|---|
| 49 | |
|---|
| 50 | dig [ ] |
|---|
| 51 | top [ ] |
|---|
| 52 | bind [ ] |
|---|
| 53 | |
|---|
| 54 | 8.) In order to connect and authenticate to a remote machine using SSH without using |
|---|
| 55 | passwords what type of cryptography are we using? |
|---|
| 56 | |
|---|
| 57 | public / private keys [ ] |
|---|
| 58 | symmetric ciphers [ ] |
|---|
| 59 | hybrid systems [ ] |
|---|