Vous êtes sur la page 1sur 5

1.5. Which of the following commands should you use to add to host 192.168.0.10 a default gateway to 192.168.0.1? A.

route add default gw 192.168.0.10 192.168.0.1 B. route add default gw 192.168.0.1 C. route add 192.168.0.10 default 192.168.0.1 D. route 192.168.0.10 gw 192.168.0.1 R:B

2.8. What is the purpose of the - n option to route ? A. It causes no operation to be performed; route reports what it would do if - n were omitted. B. It precedes specification of a netmask when setting the route. C. It causes machines to be identified by IP address rather than hostname in output. D. It forces interpretation of a provided address as a network address rather than a host address.

R: C

3.12. You want to link four branch offices private networks to a company s central office s private network using OpenVPN. Which of the following conditions should you ensure is met to avoid problems? A. Each of the offices should use a different IP address range. B. Each of the offices should use a key from a different CA. C. Each of the offices should have approximately the same number of computers. D. Each of the offices should use DHCP on all its computers.

R: A

4.18. Your computer is in the example.com domain, but you want to be able to contact the neil .tranquility.luna.edu and buzz.tranquility.luna.edu servers by typing neil or buzz as the hostnames, respectively. How can you accomplish this goal? (Choose all that apply.)

A. Add the lines host neil neil.tranquility.luna.edu and host buzz buzz .tranquility.luna.edu to your bash startup script. B. Add entries for neil and buzz , linking them to their IP addresses, to /etc/hosts . C. Add the line search tranquility.luna.edu to your /etc/resolv.conf file. D. Add the line nameserver tranquility.luna.edu to your /etc/resolv.conf file.

R: B

5.-

20. Your computer has an IP address of 192.168.21.102, with a network mask of 255.255.255.0. You re able to ping 192.168.21.7 and 192.168.21.98, but not 192.168.27.3 or 10.78.21.102. If you know that all of these addresses are valid and the computers are turned on and connected to the network, which of the following is the most probable cause of this problem? A. The name server configuration is set incorrectly on 192.168.21.102. B. The default route is set incorrectly on 192.168.21.102. C. The DHCP servers must be activated on 192.168.27.3 and 10.78.21.102. D. The netmask is set incorrectly on 192.168.21.102. R:B

6.4. What is the effect of the following line, found within the options section of a /etc/ named.conf file? directory /home/sam/bind; A. It tells BIND to look in the /home/sam/bind directory for its zone files. B. It guarantees that the user sam will be able to edit the BIND configuration. C. It configures BIND to run as the user sam , thus improving the server s security. D. It locks BIND in a chroot jail located at /home/sam/bind . R: A

7.6. What is the effect of the following /etc/named.conf lines? listen-on port 53 { 127.0.0.1; }; listen-on-v6 port 53 { ::1; }; A. The server can be accessed only from the computer on which it s running. B. The server will run using a firewall on port 53. C. The server will be available to remote computers via both IPv4 and IPv6. D. The server will be available to remote computers via IPv6 only. R: A

8.12. You want to enable users to access the computer with the IP address of 192.168.17.198 as linus.example.com . What line would you place in the zone file for example.com to accomplish this task? A. linus IN A 192.168.17.198 B. linus IN MX 192.168.17.198 C. 198 IN TXT linus.example.com. D. 198 IN PTR linus.example.com. R: A

9.13. What is the effect of the following two DNS zone file entries? tycho.luna.edu. IN A 192.168.23.5 www IN CNAME tycho

A. The same computer (192.168.23.5) may be accessed as either tycho.luna.edu or www.tycho.luna.edu . B. The same computer (192.168.23.5) may be accessed as either tycho.luna.edu or www.luna.edu . C. Email sent to the www.luna.edu domain is delivered to tycho.luna.edu . D. The server will fail to start, since a stray dot ( . ) appears at the end of the hostname tycho.luna.edu . Review Questions 289 R: B

10.20. Assuming it s properly configured, what can you say about a BIND server that has the following line in its /etc/named.conf file? allow-transfer {10.23.98.102; 10.202.79.121;); A. It s a slave that transfers data from two other computers. B. It s a master or slave that allows zone transfers to two other computers. C. It s a slave that transfers data to two other computers. D. It s a master that transfers data on two Ethernet interfaces. R: B

11. A Samba server ( dance ) includes a [homes] share definition but no [sammy] share
definition. Assuming the relevant account exists, what will then happen when the user sammy on a client attempts to access \\dance\sammy ? A. An error message will appear because the [sammy] share doesn t exist. B. If the user enters the correct password, he ll be given access to the /home directory on the server. C. The user will be given access to the /tmp directory whether or not a correct password is entered. D. If the user enters the correct password, he ll be given access to his home directory s files on the server. D. The [homes] share in Samba is special; it gives access to users home directories, with each user being given access to his or her own home directory, as option D describes. Option A is incorrect because the point of the [homes] share is to enable access to home directories without having to explicitly defi ne a new share for each user. Option B is incorrect because the [homes] share gives access to users individual home directories, not to the Linux /home directory, which is typically the directory in which all users home directories reside. Option C is incorrect because a correct password is still normally required to access [homes] and because this share doesn t give access to /tmp unless options are set strangely. (The default directory for most Samba shares is /tmp , but this isn t true of [homes] .)

12. What does the following line in an smb.conf file mean?


name resolve order = lmhosts A. Samba uses the lmhosts file preferentially for name resolution but will use other methods if necessary. B. Samba uses the lmhosts file exclusively for name resolution and does not fall back on other methods. C. Samba uses the lmhosts file as source material when it functions as a NetBIOS name server.

D. Samba uses the lmhosts file s contents to determine the priority given to different clients name - resolution requests. 3. B. The name resolve order option in Samba determines what tools Samba uses to resolve hostnames into IP addresses. Since only one option ( lmhosts ) appears in this example, this is the only tool that s used, as stated by option B. Option A is incorrect because no other methods will be used. Options C and D are incorrect because the name resolve order option controls Samba s own name resolution, not how it functions as a NetBIOS name server or how it delivers names to clients.

13.2. Where does the ISC DHCP server store data on the leases it has issued? A. leases.conf , typically in /var/dhcp B. leases.log , typically in /var/log/dhcp C. dhcpd.log , typically in /var/dhcp/leases D. dhcpd.leases , typically in /var/lib/dhcp 2. D. DHCP lease information is stored in a fi le called dhcpd.leases . This fi le is often, but not always, stored in /var/lib/dhcp , making option D correct. Although the locations specifi ed in options A, B, and D are all theoretically plausible, they all specify incorrect fi lenames and so are incorrect.

14.- A firewall script includes the following two lines. What is their purpose?
iptables -A OUTPUT -d 127.0.0.1 -o lo -j ACCEPT iptables -A INPUT -s 127.0.0.1 -i lo -j ACCEPT
A. To set the default policy for all chains to ACCEPT ; subsequent rules will use DROP or REJECT B. To enable routing of localhost traffic on a computer configured as a router C. To enable communications over the localhost interface for local programs D. To set the default policy for the OUTPUT and INPUT chains to ACCEPT , leaving the FORWARD chain unaffected C. Linux uses the localhost (127.0.0.1) IP address for local communications; network enabled programs use this address for communications even on one system. If your default iptables policy is DROP or REJECT , this interface will be blocked, so it s necessary to unblock it using lines like those shown in the question, making option C correct. The default policy, referenced in options A and D, is set using the - P option, as in iptables - t filter - P FORWARD DROP , so these options are incorrect. Routing of localhost traffi c makes no logical sense localhost traffi c is, by defi nition, local and therefore is not routed so option B is incorrect.

15.- You want to modify some Apache settings for a single directory in your Web site s directory
tree. You enter the relevant changes in a file and save that file in the relevant directory. What name should you give this file?
A. .apache B. .httpd C. .htaccess D. .apache config C. The .htaccess fi le is a confi guration fi le for a single directory in a Web site s d irectory tree, so option C is correct. Although Apache s main confi guration fi le is normally called apache.conf or httpd.conf , neither option A nor B is correct for the single - directory confi guration fi le described. Option D is entirely fi ctitious.

16.7. You want to use the VirtualHost directive to define a limited number of virtual hosts on an Apache server. Furthermore, this server has two network interfaces, one for your local network ( eth0 , 172.24.21.78) and one for the Internet ( eth1 , 10.203.17.26). What directive can you include to ensure that your virtual hosts are defined only on your local network? A. VirtualHostOnly eth0 B. Bind eth0 C. NameVirtualHost 172.24.21.78 D. ExcludeVirtualHosts 10.203.17.26 7. C. The NameVirtualHost directive is required when using VirtualHost . It often takes an asterisk ( * ) as an option, but passing it an IP address instead causes virtual hosting to apply only to requests directed to the network interface associated with that IP address. Thus, option C is correct. The remaining options are all fi ctitious.