Linux Security Final Review

Category: Internet, Security
Last Updated: 23 Mar 2023
Essay type: Review
Pages: 4 Views: 199
  1. Allows the connection of hub to hub or switch without having to use a special cable
  2. Which data speed and maximum cable length is not used for Category e/6 cabling? Anything other than mezzo/mobcaps (Caste) and up to mezzo, class E/mobcaps, Gossips but at a distance less than 100 meters (Cat) both up to 100 meters.
  3. Order custom essay Linux Security Final Review with free plagiarism report

    feat icon 450+ experts on 30 subjects feat icon Starting from 3 hours delivery
    Get Essay Help
  4. What do the links lights on a hub or switch represent? That the transmit and receive pairs are properly aligned and the connected devices are communicating .
  5. What does the link light on a NICE present? Connectivity to the network.
  6. What is an echo request relative to computer networking? It Is part of the IGMP protocol that requests a reply from a computer.
  7. What Is the command used on a PC to display the MAC address? Upcoming/all
  8. What is the command used on a Linux machine to display the IP address? Facing
  9. What is the maximum length of a horizontal cable run that still allows for the length of the patch cables and extra cabling on each end? 90 meters
  10. A data problem is reported to the network administrator. The problem Is found to be tit the HTTP network connection. What would the network administrator do to isolate the problem. Test the link, perform a traceries command, depends on what type of problem is occurring with the cabling.
  11. Describes interconnection of Lana within a limited geographic area. MAN (Metropolitan Area Network)
  12. Which describes an Ethernet system operating at 100 Mbps? Fast Ethernet or Bassett
  13. What is another term for network congestion? Bottleneck
  14. . A network address of 192. 168. 6. 0 and a subnet mask of 255. 255. 254. 0 can be Ritter In CIDER as? 92. 168. 168. 0/3
  15. The three packets exchanged at the beginning of a TCP connection between two ports are: SYNC, SYNC*JACK, & JACK
  16. IP addresses are assigned by which of the following? ARIN (American Registry for Internet Numbers
  17. The connection to a router's console port input is typically which of the following? RSI-232 serial communications port using an RAJA-45 lack to connect to Its Interface
  18. What is the help command In the CISCO ISO? "? " is the universal help command
  19. AAU stands for: Attachment unit Interface
  20. The router interface most commonly used to Interconnect Lana to a campus network Is: Fast Ethernet
  21. Serial Interfaces on a router are typically used to: used to interface to other serial devices
  22. Clocking on the serial port of a router is set at the DATE end: False, it is DCE
  23. The purpose of a gateway is to allow data to enter and exit a LANA. True
  24. The command for saving the router's running-configuration to non-volatile memory Is: copy run start
  25. The administrative distance of a static route is 1
  26. EIGRP is classified as which of the following: link-state protocol
  27. What area ID should be used for the Network backbone?
  28.  What does OSPF use to verify that two router links are communicating? "Hello Packets"
  29. Which file allocation table system Is best for very large multi gigabit drives today? NETS (New Technology File System
  30. Which of the following bus types 1 OFF roving similar services including server functions identifies which type of network? Peer-to-peer
  31. Dynamically assigns IP addresses to machines as needed: DDCD Server
  32. A red "x" on a users account in Windows 2003/2000 indicates which of the following The user is locked out for having too many login attempt failures
  33. This server is used to service information requests from clients. Proxy Server
  34. Computer Viruses and Worms cause all of the following except: Virus causes annoyance, clogging up the mail server, denial of revive, data loss, open holes for others to access your machine. Worms attack computers and can deny service to networks, they establish a "back door" in the infected computer enabling an attacker to access someone's computer
  35. "War Driving" is a term used to describe: someone driving with an antenna out the door of a vehicle, connected to a mobile device running Windows or Linux
  36. . A true Firewall "Access Control List" is used to: Access list can be configured on a router, on a true dedicated firewall, or on the host computer
  37. An Intrusion Detection system is designed to look for: (Select 2) looks for signatures and probing
  38. Telephony identifies which of the following technologies? Poi (Voice over 'P)
  39. Which of the following have the greatest wireless data rate? 802. 1 In provides rates over 200+ Mbps
  40. What are the two North American and International optical standards? (Select two) SONNET (Synchronous Optical network and SAD (Synchronous Digital Hierarchy)
  41. What is the meaning of the "2-Deep" rule? That the distribution in a building should only have he main distribution and the intermediate distribution that feeds the horizontal distribution to the work area
  42. True or False: Voice Over IP and Telephony are synonymous with each other. True
  43. Which Poi protocol provides for end-to-end secure communications by requiring user authentication: SIP (Secure Session Initiation Protocol)
  44. The following are all So concerns for Poi except: These are concerns: Jitter, Network latency and packet loss, & Queuing
  45. . Using Linux, the command that lists the basic files in a rectory is: Is
  46. Using Linux, the command that deletes a files is: arm
  47. To display the previously entered commands stored in the Linux history buffer you would use: history
  48. Using Linux, the command that is similar to the find or search command in Windows is: Greg
  49. The three major differences between industrial and commercial networks are: Hierarchy, Redundancy, & Determinism
  50. . The Ethernet protocol developed for large industrial use is: Ethernet/IP or UDP or TCP

Cite this Page

Linux Security Final Review. (2018, Sep 12). Retrieved from https://phdessay.com/linux-security-final-review/

Don't let plagiarism ruin your grade

Run a free check or have your essay done for you

plagiarism ruin image

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Save time and let our verified experts help you.

Hire writer