In: Computer Science
a.)
Which of the following commands can be used to change the state of a process, including to stop a process?
end  | |
kill  | |
stop  | |
halt  | 
b.)
Responding to ping requests can leave a system vulnerable to which of the following?
TCP wrappers  | |
DoS attacks  | |
Man-in-the-middle attacks  | |
All of the above  | 
c.)
Which of the following is the de facto standard name resolution solution for the majority of systems connected to the Internet?
DHCP  | |
LDAP  | |
DNS  | |
NIS  | 
d.)
DHCP stands for which of the following?
Dynamic Host Configuration Protocol  | |
Domain Host Configuration Protocol  | |
Domain Host Configuration Process  | |
Dynamic Host Configuration Process  | 
e.)
After installing the correct DHCP server package, you can configure the server by editing the __________ file.
dhcpd.leases  | |
/etc/named.conf  | |
ddns-update-style  | |
/etc/dhcpd.conf  | 
f.)
__________ devices are the most common network device on Linux systems.
Ethernet  | |
Gateway  | |
Persistent  | |
Wireless  | 
a) kill
Explanation: Kill is used to change state of
process
b) DoS attacks
Explanation: Denial of service attack
c) DNS
Explanation: DNS is used for name resolution
d) Dynamic Host Configuration Protocol
Explanation: DHCP is Dynamic Host Configuration
Protocol
E) /etc/dhcpd.conf
Explanation: we need to edit the file dhcpd.conf
F) Ethernet
Ethernet devices are common