In: Computer Science
a.)
Which of the following commands can be used to change the state of a process, including to stop a process?
end | |
kill | |
stop | |
halt |
b.)
Responding to ping requests can leave a system vulnerable to which of the following?
TCP wrappers | |
DoS attacks | |
Man-in-the-middle attacks | |
All of the above |
c.)
Which of the following is the de facto standard name resolution solution for the majority of systems connected to the Internet?
DHCP | |
LDAP | |
DNS | |
NIS |
d.)
DHCP stands for which of the following?
Dynamic Host Configuration Protocol | |
Domain Host Configuration Protocol | |
Domain Host Configuration Process | |
Dynamic Host Configuration Process |
e.)
After installing the correct DHCP server package, you can configure the server by editing the __________ file.
dhcpd.leases | |
/etc/named.conf | |
ddns-update-style | |
/etc/dhcpd.conf |
f.)
__________ devices are the most common network device on Linux systems.
Ethernet | |
Gateway | |
Persistent | |
Wireless |
a) kill
Explanation: Kill is used to change state of
process
b) DoS attacks
Explanation: Denial of service attack
c) DNS
Explanation: DNS is used for name resolution
d) Dynamic Host Configuration Protocol
Explanation: DHCP is Dynamic Host Configuration
Protocol
E) /etc/dhcpd.conf
Explanation: we need to edit the file dhcpd.conf
F) Ethernet
Ethernet devices are common