Question

In: Computer Science

a.)Which of the following commands can be used to change the stateof a process,...

a.)

Which of the following commands can be used to change the state of a process, including to stop a process?


end


kill


stop


halt

b.)

Responding to ping requests can leave a system vulnerable to which of the following?


TCP wrappers


DoS attacks


Man-in-the-middle attacks


All of the above

c.)

Which of the following is the de facto standard name resolution solution for the majority of systems connected to the Internet?


DHCP


LDAP


DNS


NIS

d.)

DHCP stands for which of the following?


Dynamic Host Configuration Protocol


Domain Host Configuration Protocol


Domain Host Configuration Process


Dynamic Host Configuration Process

e.)

After installing the correct DHCP server package, you can configure the server by editing the __________ file.


dhcpd.leases


/etc/named.conf


ddns-update-style


/etc/dhcpd.conf

f.)

__________ devices are the most common network device on Linux systems.


Ethernet


Gateway


Persistent


Wireless

Solutions

Expert Solution

a) kill
Explanation: Kill is used to change state of process

b) DoS attacks
Explanation: Denial of service attack

c) DNS
Explanation: DNS is used for name resolution

d) Dynamic Host Configuration Protocol
Explanation: DHCP is Dynamic Host Configuration Protocol

E) /etc/dhcpd.conf

Explanation:
we need to edit the file dhcpd.conf

F) Ethernet

Ethernet devices are common


Related Solutions

Which of the following refers to a process in which a segment of DNA is used...
Which of the following refers to a process in which a segment of DNA is used to produce RNA? Replication Translation Derepression Condensation Transcription Nucleotides are composed of phosphoric acid, a hexose sugar, and a nitrogen-containing base. True False
2. Explain how the mesg, write, and wall commands can be used to allow users to...
2. Explain how the mesg, write, and wall commands can be used to allow users to talk to each other on UNIX
Q3.  Networking commands – ping, mount, hosts, netstat The ping command can be used to check the...
Q3.  Networking commands – ping, mount, hosts, netstat The ping command can be used to check the network working condition between two systems.  You may have to find the path name of the ping command file using which or whereis command and then type the full/absolute path name of the ping command.  Issue ping command with UNIX server IP address as argument.  If the command does not stop after displaying five packets transfer and receive information, terminate the command using ctrl-c.  Otherwise, the command may...
Discuss specific criteria which can be used to classify a given process as a living or...
Discuss specific criteria which can be used to classify a given process as a living or controlled process in living polymerization
1. Can emergent change be intentional? How can emergent change be used to bring about a...
1. Can emergent change be intentional? How can emergent change be used to bring about a specific end result? 2. How would Lewin’s three-step model compare to the first three steps in Kotter’s eight-step model of change? 3. Explain in what situations downsizing/restructuring is the best solution instead of utilizing other employee cutback strategies?
Run the commands used for following tasks and paste the screen shots here: a) Search/find a...
Run the commands used for following tasks and paste the screen shots here: a) Search/find a specified word in a file and display all the lines containing that word. b) List all the files and directories in the current directory (including the hidden files). c) Change to the root directory / and show a complete long listing of it. d) Append the output of file1 to file2. [1 Mark] e) Count how many lines, words and characters in file1. f)...
Which of the following can be used as an example of the "income effect" as a...
Which of the following can be used as an example of the "income effect" as a tool in explaining the downward slope of the demand curve for a normal product?
Use Kali Linux Commands to show me the following: 1. Who are you? 2. Change directory...
Use Kali Linux Commands to show me the following: 1. Who are you? 2. Change directory to Downloads 3. Make a new directory 4. Make a new text file under your name (Ghada.txt) 5. Write a paragraph about Cyber security (4 to 5 sentences) >>simply open the file and write inside it 6. Change the permission to be 764 7. Open the file but with a cyber security match Show me each and every step with figure b. Enter into...
Which of the following can change the frequency of a wave? a) interference b) the Doppler...
Which of the following can change the frequency of a wave? a) interference b) the Doppler Effect c) diffraction d) all of the above
1) Which of the following statements is true? A. A change in the market price can...
1) Which of the following statements is true? A. A change in the market price can only shift the demand curve. B. A decrease in supply causes equilibrium price to rise; the increase in price then results in a decrease in demand. C. If both demand and supply increase there must be an increase in equilibrium price; equilibrium quantity may either increase or decrease. D. If demand decreases and supply increases one cannot determine if equilibrium price will increase or...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT