Title and Description Writing Quiz
445 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

True or false: The instructor for the Linux II course is named Ellie Bodzay.

True

What is the role of DHCP in a network?

  • Managing network security
  • Assigning network configurations to devices automatically (correct)
  • Creating virtual networks
  • Providing internet access to devices
  • What is the purpose of adding the Listen directive to ports.conf?

  • To change the content displayed on the virtual host
  • To create a new virtual host configuration file
  • To modify the existing virtual host configuration file
  • To enable Apache to listen on a new port (correct)
  • How can Wireshark be used to analyze network traffic?

    <p>Wireshark can be used to analyze HTTP and HTTPS packets.</p> Signup and view all the answers

    What port does Apache listen on by default for http?

    <p>Apache listens on port 80 by default for http.</p> Signup and view all the answers

    What is the course code for Linux II?

    <p>The course code for Linux II is 420-440-01/02.</p> Signup and view all the answers

    What can Wireshark be used to analyze?

    <p>HTTP and HTTPS packets</p> Signup and view all the answers

    What is SSH?

    <p>A remote shell with full end-to-end encryption using public key cryptography.</p> Signup and view all the answers

    What is SSH and what is its purpose?

    <p>SSH stands for Secure Shell and it is a network protocol used for secure remote access over an unsecured network.</p> Signup and view all the answers

    What does TTL stand for?

    <p>Time-to-Live</p> Signup and view all the answers

    What is tcpdump and how is it used in network troubleshooting?

    <p>Tcpdump is a tool for capturing and analyzing network traffic. It can be used in network troubleshooting to identify and diagnose network issues.</p> Signup and view all the answers

    What is the command used to generate key pairs for both remote and local machines in SSH?

    <p>ssh-keygen</p> Signup and view all the answers

    True or false: The text covers various lab exercises related to networking and server administration.

    <p>True</p> Signup and view all the answers

    What is SSL Strip and how does it work?

    <p>SSL Strip is a protocol used in attacks where the attacker intercepts unencrypted HTTP requests and adds their own headers to trick the website into thinking there is a secure connection.</p> Signup and view all the answers

    What is tcpdump used for?

    <p>Capturing and analyzing network traffic</p> Signup and view all the answers

    What is the Round Trip Time (RTT)?

    <p>The time it takes for a message to be sent and received</p> Signup and view all the answers

    What is the role of the Registration Authority in the certificate issuance process?

    <p>To ensure rightful ownership of the domain</p> Signup and view all the answers

    What is the first step to changing your hostname file?

    <p>Make a backup of your hostname file before changing it.</p> Signup and view all the answers

    What are the requirements to work inside an IPv4 network?

    <p>The requirements to work inside an IPv4 network include a unique IP address, subnet mask, route to a default gateway, and access to a Domain Name Server.</p> Signup and view all the answers

    What is the recommendation before changing the hostname file?

    <p>Make a backup of the hostname file before changing it.</p> Signup and view all the answers

    What does the command "a2enmod userdir" do?

    <p>Enables the user directory module in Apache</p> Signup and view all the answers

    True or false: SSH uses the same key-pair for encryption and user authentication.

    <p>False</p> Signup and view all the answers

    What is TOR routing?

    <p>A method of wrapping messages in multiple layers of encryption</p> Signup and view all the answers

    True or false: Recursive resolvers need the Start of Authority (SOA) record to start their process.

    <p>False</p> Signup and view all the answers

    What are the requirements to work inside an IPv4 network?

    <p>The requirements to work inside an IPv4 network include a unique IP address, subnet mask, route to a default gateway, and access to a Domain Name Server.</p> Signup and view all the answers

    Which tool is NOT mentioned in the text for monitoring servers?

    <p>top</p> Signup and view all the answers

    What is the purpose of the "-p" option in the netstat command, and what does it print?

    <p>The &quot;-p&quot; option in the netstat command prints the PID (process ID) of the socket owner.</p> Signup and view all the answers

    What is the command used to show listening and established sockets?

    <p>&quot;netstat&quot;</p> Signup and view all the answers

    What is the focus of the lab exercise mentioned in the text?

    <p>Configuring Apache to work with a new port</p> Signup and view all the answers

    What is the purpose of the Python code provided in the text?

    <p>The Python code provided in the text is for a simple echo server.</p> Signup and view all the answers

    What is the purpose of the link layer protocols?

    <p>The purpose of the link layer protocols is to dictate how data is transferred between directly connected nodes.</p> Signup and view all the answers

    What is the focus of the lab discussed in the text?

    <p>The lab focuses on exploring DNS zone files in a Docker Network.</p> Signup and view all the answers

    What is tcpdump and what is its purpose?

    <p>Tcpdump is a tool used for capturing and analyzing network traffic. Its purpose is for network troubleshooting and debugging.</p> Signup and view all the answers

    What is the course code for Linux II?

    <p>420-440-01/02</p> Signup and view all the answers

    True or false: The maximum MTU for Ethernet v2 is 1400 bytes.

    <p>False</p> Signup and view all the answers

    What is the purpose of the docker-compose.yml file in setting up a Docker Network?

    <p>To set up the network</p> Signup and view all the answers

    What is the purpose of the link layer protocols in data transmission?

    <p>The link layer protocols dictate how data is transferred between directly connected nodes.</p> Signup and view all the answers

    What is the main purpose of the Registration Authority (RA) in the certificate issuance process?

    <p>To ensure rightful ownership of the domain</p> Signup and view all the answers

    What are the two types of sockets determined by the protocol?

    <p>The two types of sockets determined by the protocol are UDP and TCP.</p> Signup and view all the answers

    What type of relays does TOR have?

    <p>Middle, Exit, and Bridge</p> Signup and view all the answers

    What is the role of the Verification Authority (VA) in the certificate issuance process?

    <p>To act as a third party verifier of certificates</p> Signup and view all the answers

    What is the purpose of creating a new virtual host configuration file in sites-available?

    <p>To set up virtual host configurations for each port</p> Signup and view all the answers

    Which details are contained in a certificate?

    <p>Subject and public key details</p> Signup and view all the answers

    True or false: Local DNS is responsible for managing IP addresses and domain names.

    <p>False</p> Signup and view all the answers

    What is the name of the git repo that has a server.py file that can be run in the background?

    <p>&quot;sockets-lab&quot;</p> Signup and view all the answers

    What does the command "a2disconf apache2-doc" do?

    <p>Disables the Apache documentation configuration</p> Signup and view all the answers

    True or false: The link layer is responsible for packet forwarding and routing.

    <p>False</p> Signup and view all the answers

    True or false: The second web content exercise involves modifying an existing file in sites-available.

    <p>False</p> Signup and view all the answers

    Which transport protocol does DHCP use?

    <p>UDP over port 67 (server side) and port 68 (client side</p> Signup and view all the answers

    Which key is the private key in SSH?

    <p>id_rsa</p> Signup and view all the answers

    What determines the duration of TTL?

    <p>The domain and how often it changes IPs</p> Signup and view all the answers

    What is the purpose of using public/private key remote login in SSH?

    <p>The purpose of using public/private key remote login in SSH is to provide a more secure and convenient way of logging in remotely without having to enter a password each time.</p> Signup and view all the answers

    What are the two purposes of keys in SSH?

    <p>Encrypting traffic and authenticating users.</p> Signup and view all the answers

    How can Wireshark be filtered?

    <p>To show certain traffic</p> Signup and view all the answers

    Is Linux II a continuation of a previous Linux course?

    <p>Yes, Linux II is a continuation of a previous Linux course.</p> Signup and view all the answers

    Where is the Listen directive added to listen to new ports?

    <p>The Listen directive needs to be added in ports.conf to listen to new ports.</p> Signup and view all the answers

    How can Wireshark be filtered to show specific traffic?

    <p>Wireshark can be filtered to show certain traffic.</p> Signup and view all the answers

    How do Docker Networks work in comparison to physical networks?

    <p>They are virtualized</p> Signup and view all the answers

    What are MAC addresses used for in the link layer?

    <p>MAC addresses are used in the link layer to send frames/packets between devices.</p> Signup and view all the answers

    What is the purpose of the docker-compose.yml file?

    <p>The docker-compose.yml file is needed to set up the network.</p> Signup and view all the answers

    What are MAC addresses used for in the link layer?

    <p>MAC addresses are used in the link layer to send frames/packets between devices.</p> Signup and view all the answers

    True or false: Multiple users can share the same private key for authentication on an SSH server.

    <p>False</p> Signup and view all the answers

    What are some of the tools introduced in the text for monitoring servers?

    <p>Some of the tools introduced in the text for monitoring servers are ss, netcat, netstat, nethogs, du, df, and tcpdump.</p> Signup and view all the answers

    What does the "netstat -tul" command show?

    <p>The &quot;netstat -tul&quot; command shows listening TCP and UDP sockets.</p> Signup and view all the answers

    What is the purpose of the Python code provided in the text?

    <p>To provide a simple echo server</p> Signup and view all the answers

    What are the two types of sockets determined by the protocol?

    <p>The two types of sockets determined by the protocol are UDP and TCP.</p> Signup and view all the answers

    How can you edit your hostname and add the domain?

    <p>You can use hostnamectl to edit your hostname and add the domain.</p> Signup and view all the answers

    Which command should you use to edit your hostname and add the domain?

    <p>hostnamectl</p> Signup and view all the answers

    True or false: The exercises include setting up Wireshark, creating an HTTP server with Python, and exploring a zone in a Docker network.

    <p>True</p> Signup and view all the answers

    How can an attacker act as a man-in-the-middle to perform SSL Stripping?

    <p>One way to act as an attacker is to open a hotspot and intercept traffic to perform SSL Stripping.</p> Signup and view all the answers

    What are broadcast messages and how are they used in networking?

    <p>Broadcast messages are messages sent to all devices on a network. They are used to distribute information, such as network announcements, to multiple devices at once.</p> Signup and view all the answers

    Who is the instructor for the class and lab?

    <p>Ellie Bodzay</p> Signup and view all the answers

    What are broadcast messages and how do they work?

    <p>Broadcast messages are messages sent to all devices on a network. They work by being sent to a special IP address that is recognized as a broadcast address.</p> Signup and view all the answers

    What is the name of the instructor for the Linux II course?

    <p>Ellie Bodzay</p> Signup and view all the answers

    What are broadcast messages?

    <p>Messages sent to all devices on a network</p> Signup and view all the answers

    What is the major improvement from HTTP/1 to HTTP/1.1?

    <p>TCP connections can be left open for multiple requests.</p> Signup and view all the answers

    What is the focus of Linux II?

    <p>The focus of Linux II is advanced Linux concepts.</p> Signup and view all the answers

    What module is mentioned in the text for implementing an HTTP server?

    <p>The Python http.server module is mentioned in the text for implementing an HTTP server.</p> Signup and view all the answers

    What tool is used to find IP addresses of hosts in the network?

    <p>Dig</p> Signup and view all the answers

    What tool can be used to determine which socket the server has bound to?

    <p>&quot;netstat&quot;</p> Signup and view all the answers

    True or false: The text covers topics such as HTTP vs HTTPS traffic and setting up SSH keys.

    <p>True</p> Signup and view all the answers

    True or false: MAC addresses are used to identify networked computers.

    <p>True</p> Signup and view all the answers

    What needs to be modified in the virtual host configuration file to work with the desired port?

    <p>The Listen directive</p> Signup and view all the answers

    What is the difference between unicast, multicast, and broadcast transmission?

    <p>Unicast transmission is one-to-one, multicast transmission is one-to-many, and broadcast transmission is one-to-many undirected.</p> Signup and view all the answers

    What kind of tree is immediately affected by modifications in its content?

    <p>sites-tree</p> Signup and view all the answers

    Which module is mentioned in the text for implementing an HTTP server?

    <p>Python http.server</p> Signup and view all the answers

    What is the three-step handshake?

    <p>The three-step handshake is the process of establishing a TCP connection.</p> Signup and view all the answers

    How is ssh-keygen used in generating key pairs?

    <p>ssh-keygen is used to generate key pairs by creating a private key and a corresponding public key on both the remote and local machines.</p> Signup and view all the answers

    How can a user check for broadcast messages specifically for their device using tcpdump?

    <p>Use the &quot;ip address&quot; command to determine their MAC address and include it in the filter</p> Signup and view all the answers

    What needs to be done to set up a port-based VHost?

    <p>A new file needs to be created in sites-available to set up a port-based VHost.</p> Signup and view all the answers

    What should you do after adding 2 subdirectories to /var/www/html?

    <p>Add content to the subdirectories.</p> Signup and view all the answers

    What should you do after adding subdirectories to /var/www/html?

    <p>After adding subdirectories to /var/www/html, you should add content to them.</p> Signup and view all the answers

    What is the three-step handshake in a TCP connection?

    <p>The three-step handshake in a TCP connection is a process where the client sends a SYN message to the server, the server responds with a SYN-ACK message, and the client sends an ACK message to the server to confirm.</p> Signup and view all the answers

    True or false: The duration and schedule of the class and lab are provided in the text.

    <p>False</p> Signup and view all the answers

    True or false: The TTL duration is the same for all domains.

    <p>False</p> Signup and view all the answers

    What is a MAC address and why is it important?

    <p>A MAC address is a unique identifier for network devices. It is important because it allows devices to communicate with each other on a network.</p> Signup and view all the answers

    What is the responsibility of the Internet layer in data transmission?

    <p>The Internet layer is responsible for packet forwarding and routing.</p> Signup and view all the answers

    What are the two ways to use Wireshark?

    <p>Wireshark requires either opening the Graphical Interface for your VM or using an X-Forwarding client.</p> Signup and view all the answers

    What do recursive resolvers need to start their process?

    <p>Root hints file</p> Signup and view all the answers

    True or false: Public key cryptography is used for data encryption in SSH.

    <p>False</p> Signup and view all the answers

    What information is contained in certificates?

    <p>Public key details</p> Signup and view all the answers

    What is the purpose of ssh-copy-id?

    <p>To copy the public key to a remote server.</p> Signup and view all the answers

    What is the focus of the lab exercise?

    <p>Adding more content and Vhosts</p> Signup and view all the answers

    How do Docker Networks work?

    <p>Docker Networks work similarly to physical networks but are virtualized.</p> Signup and view all the answers

    What is required to use Wireshark?

    <p>A Graphical Interface for your VM or using an X-Forwarding client</p> Signup and view all the answers

    How can tcpdump be used to check for broadcast messages?

    <p>Tcpdump can be used to filter network traffic and search for broadcast messages using specific commands and filters.</p> Signup and view all the answers

    Are the keys exchanged in SSH specific to the client and server machine, as well as the user?

    <p>Yes</p> Signup and view all the answers

    What does DNS do?

    <p>Translates hostnames into IP addresses</p> Signup and view all the answers

    What is the responsibility of the internet layer?

    <p>The responsibility of the internet layer is packet forwarding and routing.</p> Signup and view all the answers

    What is the motivation behind using VPNs?

    <p>Accessing private networks and increased privacy and internet safety</p> Signup and view all the answers

    What are some ways to prevent SSL Stripping attacks?

    <p>Preventing SSL Stripping attacks can be done by ensuring every site on the server uses HTTPS, using HTTPS Strict Transport Security (HSTS), and enforcing it using a header field in the HTTP response from the server.</p> Signup and view all the answers

    Which type of relay only handles encrypted packets and increases obscurity?

    <p>Middle relays</p> Signup and view all the answers

    What does a message include in HTTP?

    <p>A method and a path.</p> Signup and view all the answers

    What tool is used to find IP addresses of hosts in the network?

    <p>Dig is used to find IP addresses of hosts in the network.</p> Signup and view all the answers

    Who is the target audience for Linux II?

    <p>Linux II is designed for students with prior Linux knowledge.</p> Signup and view all the answers

    What type of system is DNS?

    <p>A hierarchical naming system</p> Signup and view all the answers

    How is the config changed to work over a specific port and display specific content?

    <p>Config needs to be changed to work over a specific port and display specific content.</p> Signup and view all the answers

    What is examined in the lab exploring DNS zone files in a Docker Network?

    <p>The zone file on the nameserver part of the network</p> Signup and view all the answers

    How do you check for broadcast messages using tcpdump?

    <p>You can use the command &quot;tcpdump -nn -v -i eth0 broadcast&quot; to check for broadcast messages meant for any device.</p> Signup and view all the answers

    True or false: SSH can only be used on Unix-based operating systems.

    <p>False</p> Signup and view all the answers

    What layer in data transmission is responsible for node-to-node transfer and error correction?

    <p>The data link/physical layer is responsible for node-to-node transfer and error correction.</p> Signup and view all the answers

    What is the second web content exercise about?

    <p>Completing the last cl</p> Signup and view all the answers

    What is the purpose of Bridge relays in TOR routing?

    <p>To circumvent censorship</p> Signup and view all the answers

    What tool can be used to connect to the socket and run commands?

    <p>&quot;netcat&quot;</p> Signup and view all the answers

    How do VPN client and server encrypt information?

    <p>Using a key exchange process (TLS</p> Signup and view all the answers

    What is the role of routers in the internet layer, and what identifier is used in this layer?

    <p>Routers operate in the internet layer, and IP addresses are used in this layer.</p> Signup and view all the answers

    What is the purpose of the exercises provided in the text?

    <p>The exercises provided in the text are for testing connectivity to the echo server using different ports and IP addresses.</p> Signup and view all the answers

    What is Wireshark used for?

    <p>Capturing and analyzing network traffic</p> Signup and view all the answers

    What do the exercises in the text involve?

    <p>Testing connectivity from different machines</p> Signup and view all the answers

    True or false: Packet switching involves transmitting messages as a whole.

    <p>False</p> Signup and view all the answers

    How can you direct traffic over port 8123 to your first JavaScript project?

    <p>You can set up a port-based VHost to direct traffic over port 8123 to your first JavaScript project.</p> Signup and view all the answers

    What is DHCP and what does it do?

    <p>DHCP is a protocol that automatically assigns network configuration to devices on your network.</p> Signup and view all the answers

    How should you direct traffic over port 8123 to your first JavaScript project?

    <p>Set up a port-based VHost.</p> Signup and view all the answers

    What command is used to allow traffic on specified ports in the firewall?

    <p>ufw allow</p> Signup and view all the answers

    What is the first step in DHCP?

    <p>The client sends a broadcast to 255.255.255.255.</p> Signup and view all the answers

    What is DHCP and what does it do?

    <p>DHCP is a protocol that automatically assigns network configuration to devices on a network.</p> Signup and view all the answers

    True or false: Broadcast messages are messages sent to a specific device on a network.

    <p>False</p> Signup and view all the answers

    What is the purpose of VPNs and how can they be used to protect internet activity?

    <p>VPNs are used to access private networks that only allow internal traffic. They can also be used to hide internet activity from internet service providers and government surveillance.</p> Signup and view all the answers

    True or false: The Root hints file provides information on how to find authoritative name servers.

    <p>False</p> Signup and view all the answers

    What does the term "Subject" refer to in certificates?

    <p>The organization and domain name</p> Signup and view all the answers

    What is a MAC address and how is it used in networking?

    <p>A MAC address is a unique identifier assigned to network devices. It is used to identify devices on a network and to route network traffic.</p> Signup and view all the answers

    What does the root hints file provide information on?

    <p>How to find root servers</p> Signup and view all the answers

    What is the purpose of the "a2enmod" command?

    <p>To enable Apache modules</p> Signup and view all the answers

    What is the difference between id_rsa and id_rsa.pub?

    <p>id_rsa is the private key and id_rsa.pub is the public key. The private key is kept secret and used for authentication, while the public key is shared with servers to allow access.</p> Signup and view all the answers

    How can SSH keys be used in relation to a gitlab remote repo?

    <p>To authenticate to a remote repository.</p> Signup and view all the answers

    How can a TLS certificate be created?

    <p>Using OpenSSL</p> Signup and view all the answers

    How can users authenticate themselves with an SSH server?

    <p>By sharing their own public key.</p> Signup and view all the answers

    What tool can be used to create a TLS certificate?

    <p>A TLS certificate can be created using OpenSSL.</p> Signup and view all the answers

    What are TCP and UDP, and what type of communication are they used for?

    <p>TCP and UDP are transport protocols used for directed and streaming communication.</p> Signup and view all the answers

    Does the text ask to change the port and IP address of the server code?

    <p>Yes, the text asks to change the port and IP address of the server code and test connectivity.</p> Signup and view all the answers

    How are certificates generated?

    <p>With specific details</p> Signup and view all the answers

    What is the Python HTTP server capable of serving?

    <p>Only files in the specified directory</p> Signup and view all the answers

    What is the responsibility of the data link/physical layer?

    <p>The responsibility of the data link/physical layer is node-to-node transfer and error correction.</p> Signup and view all the answers

    What is SSH?

    <p>A type of remote shell protocol</p> Signup and view all the answers

    What is TOR and how does it work?

    <p>TOR is a network that allows users to browse the internet anonymously. TOR uses a series of nodes to route internet traffic, making it difficult to trace back to the user.</p> Signup and view all the answers

    How do you check for broadcast messages specifically for your device using tcpdump?

    <p>You can use the command &quot;tcpdump -nn -v -i eth0 ether host [MAC address]&quot; to check for broadcast messages specifically for your device.</p> Signup and view all the answers

    What will students learn in Linux II?

    <p>Students will learn about networking, security, and system administration in Linux II.</p> Signup and view all the answers

    How can a user determine their MAC address using the "ip address" command?

    <p>The &quot;ip address&quot; command can be used to display network interface information, including the MAC address of the device.</p> Signup and view all the answers

    How many key-pairs does a server and client use for encryption in SSH?

    <p>One</p> Signup and view all the answers

    What may be different in netstat output when using netcat?

    <p>The port number</p> Signup and view all the answers

    How does Apache handle VHosts?

    <p>It handles them one config file at a time</p> Signup and view all the answers

    How is ssh-copy-id used to copy the public key to a remote server?

    <p>ssh-copy-id is used to copy the public key to a remote server by connecting to the server and appending the public key to the authorized_keys file on the remote machine.</p> Signup and view all the answers

    What part of the network is examined when exploring the DNS zone files?

    <p>The zone file on the nameserver part of the network is examined.</p> Signup and view all the answers

    True or false: The exercise involves changing the Apache config to work over port 8123 instead of port 80.

    <p>True</p> Signup and view all the answers

    What is the purpose of subnet masks in IP addresses?

    <p>Subnet masks define which part of the IP address is the network ID and which part is the host ID.</p> Signup and view all the answers

    What is the purpose of the "a2disconf" command?

    <p>To disable Apache configurations</p> Signup and view all the answers

    What do authoritative name servers provide to the web client?

    <p>The final answer</p> Signup and view all the answers

    True or false: SSH tunneling can be used to forward data over an unencrypted connection.

    <p>False</p> Signup and view all the answers

    What needs to be added to ports.conf to listen on a specific port number?

    <p>Listen directive with the specific port number needs to be added to ports.conf.</p> Signup and view all the answers

    Can you give examples of protocols that use TCP/UDP?

    <p>Examples of protocols that use TCP/UDP include HTTP, SMTP, and DHCP.</p> Signup and view all the answers

    What transport protocol does DHCP use and over which ports?

    <p>DHCP uses UDP as a transport protocol over port 67 (server side) and port 68 (client side).</p> Signup and view all the answers

    What is the base unit of information that can be sent over a network?

    <p>Packet</p> Signup and view all the answers

    What information do name servers supply?

    <p>Data about the zones for which they are authoritative</p> Signup and view all the answers

    What is the purpose of configuring the firewall to allow traffic on desired ports for specific applications or services?

    <p>To enable Apache to listen on a new port</p> Signup and view all the answers

    What is the purpose of the SOA line in the zone file?

    <p>To specify the Start of Authority</p> Signup and view all the answers

    True or false: The physical layer handles error correction.

    <p>True</p> Signup and view all the answers

    How does Apache handle VHosts?

    <p>Apache handles VHosts one config file at a time and does not make a preference of specific over general.</p> Signup and view all the answers

    What needs to be done to make Apache listen over a new port?

    <p>Add Listen [port number] to ports.conf</p> Signup and view all the answers

    What should be verified for the certificate signing request (CSR) information?

    <p>The CSR's authenticity</p> Signup and view all the answers

    What does the DHCP server listen on for broadcasts?

    <p>Port 67</p> Signup and view all the answers

    Why is it important to verify the CSR information when creating a certificate signing request?

    <p>The certificate signing request (CSR) information should be verified.</p> Signup and view all the answers

    What transport protocol does DHCP use and what are the port numbers for server and client side?

    <p>DHCP uses UDP as a transport protocol over port 67 (server side) and port 68 (client side).</p> Signup and view all the answers

    True or false: Authoritative name servers provide the final answer returned to the web client.

    <p>True</p> Signup and view all the answers

    What is the goal of TOR routing?

    <p>To have as much of the path encrypted as possible</p> Signup and view all the answers

    True or false: When trying to connect to a device not in your ARP table, your system sends an ICMP request to resolve the MAC address.

    <p>False</p> Signup and view all the answers

    What is SSH tunneling?

    <p>A way of sending data using an SSH connection between a client and server.</p> Signup and view all the answers

    What is the bonus exercise in the text?

    <p>Running multiple servers with the same port and IP address</p> Signup and view all the answers

    Why is proper configuration of the firewall important in the exercise?

    <p>To ensure the new port(s) are accessible and secure</p> Signup and view all the answers

    Which module is being enabled by the command "a2enmod userdir"?

    <p>User directory module</p> Signup and view all the answers

    What is a well-defined port mentioned in the text?

    <p>Port 80</p> Signup and view all the answers

    What is transmission?

    <p>The act of sending packets on a link</p> Signup and view all the answers

    What type of data do root name servers supply?

    <p>Data about all the top-level domains</p> Signup and view all the answers

    What do authoritative servers need to be registered with?

    <p>A higher level server</p> Signup and view all the answers

    Can a server and client use many key-pairs to authenticate users in SSH?

    <p>Yes</p> Signup and view all the answers

    What needs to be done to the firewall to allow traffic on a new port?

    <p>Firewall needs to be configured to allow traffic on the new port.</p> Signup and view all the answers

    What is the difference between TCP and UDP?

    <p>TCP is a reliable, connection-oriented protocol, while UDP is an unreliable, connectionless protocol.</p> Signup and view all the answers

    Why can't MAC addresses be organized into subnets?

    <p>MAC addresses cannot be organized into subnets and would make routing tables too large.</p> Signup and view all the answers

    What is the purpose of network hardware?

    <p>The purpose of network hardware is to send and receive signals.</p> Signup and view all the answers

    What is DNS and what does it do?

    <p>DNS (Domain Name System) translates hostnames into IP addresses and uses name servers.</p> Signup and view all the answers

    What is DNS and what does it do?

    <p>DNS is a protocol that translates hostnames into IP addresses and uses name servers.</p> Signup and view all the answers

    How can VPNs and TOR be used to secure routing and protect internet activity from surveillance and tracking?

    <p>VPNs and TOR can both be used to secure routing and protect internet activity from surveillance and tracking.</p> Signup and view all the answers

    What is the purpose of switches in a network?

    <p>To direct incoming packets to the destination device in the local network</p> Signup and view all the answers

    What type of message does the client send back to the server in DHCP?

    <p>A unicast</p> Signup and view all the answers

    Which parties are involved in the certificate issuance process?

    <p>RA and VA</p> Signup and view all the answers

    What is the purpose of SSH key generation?

    <p>To create a private and public key</p> Signup and view all the answers

    What is Telnet?

    <p>A type of remote shell protocol</p> Signup and view all the answers

    How can multiple instances of server code be run in the background?

    <p>By using different IP addresses and port numbers for each instance</p> Signup and view all the answers

    What is Wireshark and what is its purpose?

    <p>Wireshark is a tool used for capturing and filtering network packets. Its purpose is for network troubleshooting and debugging.</p> Signup and view all the answers

    What is Wireshark and how is it used in network troubleshooting?

    <p>Wireshark is a tool for capturing and filtering network packets. It can be used to analyze network traffic and diagnose network issues.</p> Signup and view all the answers

    True or false: Wireshark is a tool for capturing and filtering network packets.

    <p>True</p> Signup and view all the answers

    What happens if the ServerName is not set in the VHost?

    <p>It will accept any name</p> Signup and view all the answers

    What happens if the ServerName is not set in the VHost?

    <p>If the ServerName is not set in the VHost, it will accept any name.</p> Signup and view all the answers

    What does the text emphasize for connectivity testing?

    <p>Using command-line tools</p> Signup and view all the answers

    What is the bonus exercise in the text about?

    <p>The bonus exercise in the text is about running multiple servers with the same port and IP address.</p> Signup and view all the answers

    What is identified when examining the zone file?

    <p>The lines that tell the NameServer where to find hosts are identified.</p> Signup and view all the answers

    What needs to be done to add a new host to the zone file?

    <p>Update the zone file</p> Signup and view all the answers

    How can the CSR be signed?

    <p>The CSR can be signed using a command.</p> Signup and view all the answers

    How can the CSR be signed?

    <p>Using a command</p> Signup and view all the answers

    How can SSH keys be used to authenticate to a gitlab remote repo?

    <p>SSH keys can be added to a user's GitLab account and used to authenticate to a remote repository, allowing users to push and pull code without having to enter a password each time.</p> Signup and view all the answers

    Which options are used for port forwarding using SSH?

    <p>-N and -L</p> Signup and view all the answers

    True or false: The content to be displayed is changed by altering the ServerRoot.

    <p>False</p> Signup and view all the answers

    True or false: Subnet mask is used to identify the physical address of a networked computer.

    <p>False</p> Signup and view all the answers

    True or false: Local DNS is a type of recursive DNS.

    <p>False</p> Signup and view all the answers

    True or false: Port forwarding can redirect traffic from any socket to any other socket.

    <p>True</p> Signup and view all the answers

    What is unicast?

    <p>One-to-one transmission</p> Signup and view all the answers

    What is the vulnerability of SSL Strip?

    <p>It allows attackers to intercept HTTP traffic and add their own encryption before sending to the server</p> Signup and view all the answers

    What is an ARP request and how is it used in networking?

    <p>An ARP request is a network message sent to resolve the MAC address of a device. It is used when trying to connect to a device not in your ARP table.</p> Signup and view all the answers

    What is the purpose of DHCP leases?

    <p>To determine how long a client can use a particular IP address.</p> Signup and view all the answers

    Can the Verification Authority (VA) be replaced by the Certification Authority (CA) directly?

    <p>Yes</p> Signup and view all the answers

    What can name servers request from a root name server?

    <p>Data about all the top-level domains</p> Signup and view all the answers

    How can you create a fallback option to fix the issue of VHost accepting any name?

    <p>To fix this, you can create a fallback option by making a copy of 000-default.conf called 999-fallback.conf.</p> Signup and view all the answers

    What are well-defined ports?

    <p>Ports that do not require specifying port numbers or a range</p> Signup and view all the answers

    How can VPNs be used to bypass internet censorship in certain countries?

    <p>VPNs can be used to bypass internet censorship in certain countries by allowing users to access the internet through a server located outside of the censored area.</p> Signup and view all the answers

    What is SSH tunneling and how does it work?

    <p>SSH tunneling is a way of sending data using an SSH connection between a client and server. It works by forwarding traffic through an encrypted tunnel, providing a secure way to access services on a remote machine.</p> Signup and view all the answers

    True or false: DEs provide window managers for SSH connections.

    <p>False</p> Signup and view all the answers

    What does local DNS protect from external access?

    <p>Certain hostnames</p> Signup and view all the answers

    What port does RSH operate over?

    <p>23 or 2323</p> Signup and view all the answers

    What does the SOA line at the top of the zone file specify?

    <p>The SOA line at the top specifies the Start of Authority.</p> Signup and view all the answers

    True or false: The Python HTTP server only serves files in the specified directory.

    <p>True</p> Signup and view all the answers

    What is required to allow external access to the computer?

    <p>Opening the port on the firewall</p> Signup and view all the answers

    What is an ARP request and when is it sent?

    <p>An ARP request is sent when trying to connect to a device not in your ARP table. It is sent to resolve the MAC address of the device.</p> Signup and view all the answers

    What does the text emphasize for connectivity testing?

    <p>The text emphasizes using command-line tools for connectivity testing.</p> Signup and view all the answers

    Where must the signed certificate and key file be copied to?

    <p>The Apache server</p> Signup and view all the answers

    What is the server protocol in SSH?

    <p>SSHD</p> Signup and view all the answers

    What tools can be used to query DNS?

    <p>Tools to query DNS include host, dig, and nslookup.</p> Signup and view all the answers

    What is the purpose of DNS lookup tools like dig?

    <p>Resolving hostnames and IP addresses</p> Signup and view all the answers

    True or false: IANA is responsible for managing both IP addresses and domain names.

    <p>True</p> Signup and view all the answers

    What should be done with the signed certificate and key file?

    <p>The signed certificate and key file must be copied to the Apache server.</p> Signup and view all the answers

    What is the purpose of updating firewall rules if new ports are added or removed?

    <p>To improve network security by blocking unwanted traffic</p> Signup and view all the answers

    How can you create a fallback option for a VHost that does not have a ServerName set?

    <p>Make a copy of 000-default.conf called 999-fallback.conf.</p> Signup and view all the answers

    What is routing in data transmission?

    <p>Routing is the process of finding a path of hops between two IP addresses on different networks.</p> Signup and view all the answers

    What is the difference between hosts and domains?

    <p>Hosts are identified by IP addresses while domains are identified by domain names</p> Signup and view all the answers

    How do you check the config and enable the site, and do a graceful restart?

    <p>To check the config, enable the site, and do a graceful restart, use the command apachectl graceful.</p> Signup and view all the answers

    True or false: Apache needs to be set up to listen over the new port by adding Listen 8123 to ports.conf.

    <p>True</p> Signup and view all the answers

    What is a status line in the context of HTTP, and what information does it provide?

    <p>In the context of HTTP, a status line gives a response code and a short message.</p> Signup and view all the answers

    What can tunnels be set up to access?

    <p>HTTPS on a server or SSH on a VM.</p> Signup and view all the answers

    What is the purpose of IP addresses?

    <p>The purpose of IP addresses is to identify networked computers.</p> Signup and view all the answers

    What tools can be used to query DNS?

    <p>Host, dig, and nslookup can be used to query DNS.</p> Signup and view all the answers

    What is a CNAME record used for in the context of the Docker Network?

    <p>To have <a href="http://www.knuckles.ca">www.knuckles.ca</a> resolve to host1.knuckles.ca</p> Signup and view all the answers

    Which configuration is being disabled by the command "a2disconf apache2-doc"?

    <p>Apache documentation configuration</p> Signup and view all the answers

    True or false: ICMP is used to send data between directly connected nodes.

    <p>False</p> Signup and view all the answers

    Which command should you use to enable 999-fallback.conf?

    <p>a2ensite</p> Signup and view all the answers

    How can you enable 999-fallback.conf and disable 000-default.conf?

    <p>You can enable 999-fallback.conf using a2ensite and disable 000-default.conf using a2dissite.</p> Signup and view all the answers

    What is the effect of disabling a configuration using the "a2disconf" command?

    <p>The configuration will be permanently disabled</p> Signup and view all the answers

    What is the difference between dynamic and static routing?

    <p>Dynamic routing determines the next hop based on network loads, while static routing ignores network loads.</p> Signup and view all the answers

    What is required to allow external access to the computer?

    <p>To allow external access to the computer, the port on the firewall needs to be opened.</p> Signup and view all the answers

    How are HTTP status codes categorized, and what are some examples?

    <p>HTTP status codes are categorized into 5 groups based on their first digit. Examples include 200 OK, 301 Moved Permanently, 400 Bad Request, 404 Not Found, and 504 Gateway Timeout.</p> Signup and view all the answers

    How do subnets allow devices to communicate, and what do subnet masks define?

    <p>Subnets allow devices to communicate without IP within the same network, and subnet masks define which part of the IP address is the network ID and which part is the host ID.</p> Signup and view all the answers

    What is the purpose of the tools mentioned in the text for monitoring servers?

    <p>To detect network issues and troubleshoot them</p> Signup and view all the answers

    What are SSH keys used for?

    <p>Setting up SSH tunnels</p> Signup and view all the answers

    What does SSH use for encrypting traffic and authenticating users?

    <p>Both B and C</p> Signup and view all the answers

    What is the purpose of a graceful restart after making changes to the Apache configuration?

    <p>To apply the changes without interrupting active connections</p> Signup and view all the answers

    True or false: ARP is used to match physical addresses to internet addresses.

    <p>False</p> Signup and view all the answers

    What is the base unit of information that can be sent over a network?

    <p>Packet</p> Signup and view all the answers

    True or false: DNS translates IP addresses into domain names.

    <p>False</p> Signup and view all the answers

    What is the Python HTTP server and what does it do?

    <p>The Python HTTP server is a tool used for creating an HTTP server with Python. It serves files in the specified directory.</p> Signup and view all the answers

    What type of protocol is DNS?

    <p>Application layer</p> Signup and view all the answers

    What is UDP?

    <p>A transport protocol</p> Signup and view all the answers

    True or false: The exercise involves configuring the firewall to work with a new port.

    <p>True</p> Signup and view all the answers

    What tool can be used to sniff HTTP traffic?

    <p>Wireshark</p> Signup and view all the answers

    True or false: X11 forwarding can be secured if sshd has X11Forwarding no in its config.

    <p>False</p> Signup and view all the answers

    What is the main motivation behind using TOR?

    <p>Personal internet anonymity</p> Signup and view all the answers

    Why is it important to use trusted VPN and TOR services?

    <p>It is important to use trusted VPN and TOR services to ensure security and privacy.</p> Signup and view all the answers

    What is the purpose of setting up SSH keys for remote server access?

    <p>SSH keys are used for secure remote access to servers. They provide a more secure alternative to passwords for authentication.</p> Signup and view all the answers

    What transport protocol does the application layer protocol for DNS use?

    <p>TCP or UDP over port 53</p> Signup and view all the answers

    How can port forwarding using SSH be done using the -N and -L options?

    <p>Port forwarding using SSH can be done using the -N option to prevent SSH from executing a remote command and the -L option to specify the local port to forward traffic to.</p> Signup and view all the answers

    What type of DNS is local DNS?

    <p>Authoritative DNS</p> Signup and view all the answers

    True or false: Multiple instances of server code can be run in the background if each instance uses the same IP address and port number.

    <p>False</p> Signup and view all the answers

    What is the duration of the class and lab?

    <p>No information is provided</p> Signup and view all the answers

    Where should test content be created?

    <p>In the Default Document Root</p> Signup and view all the answers

    Is it necessary to use SSH keys for encrypted traffic?

    <p>Yes</p> Signup and view all the answers

    What should be done before creating test content in a new subdirectory in the Default Document Root?

    <p>Test content should be created in a new subdirectory in the Default Document Root.</p> Signup and view all the answers

    What needs to be done to add a new host to the zone?

    <p>To add a new host to the zone, the zone file needs to be updated.</p> Signup and view all the answers

    How can Apache2 be tested?

    <p>Apache2 can be tested using the configtest command.</p> Signup and view all the answers

    What is the focus of the lab exploring DNS zone files in a Docker Network?

    <p>Examining the zone file on the nameserver part of the network</p> Signup and view all the answers

    What is the main purpose of certificates in online security?

    <p>To establish trust between parties</p> Signup and view all the answers

    What is the purpose of the root.hints file?

    <p>The root.hints file contains links to all the different root servers that can be used to bootstrap the DNS resolution process.</p> Signup and view all the answers

    True or false: Traceroute is used to test communication between nodes.

    <p>False</p> Signup and view all the answers

    What does SSH port forwarding allow?

    <p>Passing data over an encrypted connection</p> Signup and view all the answers

    What is the format of the class and lab?

    <p>No information is provided</p> Signup and view all the answers

    What are ARP requests used for?

    <p>Resolving MAC addresses</p> Signup and view all the answers

    What is the role of switches in a local network?

    <p>To direct incoming packets to the destination device</p> Signup and view all the answers

    How can multiple instances of server code be run in the background?

    <p>Multiple instances of server code can be run in the background if each instance uses a different IP address and port number.</p> Signup and view all the answers

    What is the process of TOR routing and how does it ensure anonymity?

    <p>TOR routing involves encryption and key wrapping by relays. Alice receives the fully wrapped message and can decrypt it. Key exchange is done one at a time and encrypted with previous keys. TOR has three types of relays: middle, exit, and bridge. Middle relays only handle encrypted packets and increase obscurity. Exit relays communicate unencrypted with the destination and are seen as the source of traffic. Bridge relays are unlisted and used to circumvent censorship.</p> Signup and view all the answers

    True or false: The Start of Authority (SOA) record should include the time-to-refresh, time-to-retry, time-to-expire, and minimum TTL.

    <p>True</p> Signup and view all the answers

    How can DNS lookup tools like dig be used in network troubleshooting?

    <p>DNS lookup tools like dig can be used to resolve hostnames and IP addresses, which can be useful in diagnosing network issues.</p> Signup and view all the answers

    What can you use Dig for?

    <p>Dig can be used to determine the IP address and name server for a domain.</p> Signup and view all the answers

    True or false: DNS lookup tools like dig can be used to resolve hostnames and IP addresses.

    <p>True</p> Signup and view all the answers

    Which command should you use to disable 000-default.conf?

    <p>a2dissite</p> Signup and view all the answers

    What is a DNS zone?

    <p>A DNS zone is a subset of the DNS structure defined by zone files.</p> Signup and view all the answers

    How can you reload the Apache service?

    <p>You can reload the Apache service using systemctl.</p> Signup and view all the answers

    What is the purpose of a GET request in HTTP?

    <p>The purpose of a GET request in HTTP is to retrieve data from a server.</p> Signup and view all the answers

    What is the purpose of running multiple instances of the server code in the background?

    <p>To test the server's performance under heavy load</p> Signup and view all the answers

    Why can't MAC addresses be organized into subnets, and what is the consequence of this?

    <p>MAC addresses cannot be organized into subnets and would make routing tables too large.</p> Signup and view all the answers

    What should be done after making modifications to the "sites-*" tree?

    <p>Reload Apache</p> Signup and view all the answers

    What are the exercises in the text intended to achieve?

    <p>The exercises in the text are intended to achieve testing connectivity to the echo server.</p> Signup and view all the answers

    What is the purpose of network redundancy?

    <p>Network redundancy allows for multiple paths between nodes to prevent loss of connectivity.</p> Signup and view all the answers

    What type of record can be used to have www.knuckles.ca resolve to host1.knuckles.ca?

    <p>A CNAME record can be used to have <a href="http://www.knuckles.ca">www.knuckles.ca</a> resolve to host1.knuckles.ca.</p> Signup and view all the answers

    What command is used to enable a site?

    <p>To enable a site, use the a2ensite command.</p> Signup and view all the answers

    What is the purpose of the network diagram created in the lab?

    <p>To show the flow when host1 tries to load a webpage hosted on host2</p> Signup and view all the answers

    What file should be modified to point to the correct certificate and key files?

    <p>The default-ssl.conf file should be modified to point to the correct files.</p> Signup and view all the answers

    Are SSH keys exchanged for specific users?

    <p>Yes</p> Signup and view all the answers

    What should be modified in the default-ssl.conf file?

    <p>The file path of the certificate file</p> Signup and view all the answers

    What is IANA responsible for managing?

    <p>IP addresses and domain names</p> Signup and view all the answers

    What are some examples of tunnels that can be set up using SSH?

    <p>Tunnels can be set up to access HTTPS on a server or SSH on a VM, among other things.</p> Signup and view all the answers

    What are the four requirements to work inside an IPv4 network?

    <p>An IP address, a subnet mask, a route to a default gateway, and access to a Domain Name Server</p> Signup and view all the answers

    How can access to a VM via SSH be tested?

    <p>Using localhost.</p> Signup and view all the answers

    What are TCP and UDP used for?

    <p>Streaming</p> Signup and view all the answers

    True or false: MobaXterm only allows for X11 port forwarding over SSH on Windows operating systems.

    <p>False</p> Signup and view all the answers

    True or false: Well-defined ports require specifying port numbers or a range.

    <p>False</p> Signup and view all the answers

    What is the command used to enable a site after configuring it in sites-available?

    <p>a2ensite</p> Signup and view all the answers

    What is the importance of the public key in certificates?

    <p>It is a crucial part of the certificate</p> Signup and view all the answers

    What is the role of the Verification Authority in the certificate issuance process?

    <p>To act as a third-party verifier of certificates</p> Signup and view all the answers

    What is the purpose of DNS?

    <p>To translate hostnames into IP addresses.</p> Signup and view all the answers

    How can the webpage be tested?

    <p>By using https://</p> Signup and view all the answers

    What is the significance of the lines that tell the NameServer where to find hosts in the zone file?

    <p>They help the NameServer locate hosts in the network</p> Signup and view all the answers

    True or false: The given steps are applicable to all web servers, not just Apache.

    <p>False</p> Signup and view all the answers

    What does DNS translate domain names into?

    <p>IP addresses</p> Signup and view all the answers

    What is ICMP and what is it used for?

    <p>ICMP is an IP layer protocol used for communicating network level information and error reporting.</p> Signup and view all the answers

    True or false: The example zone file includes the name server and hosts for knuckles.ca.

    <p>True</p> Signup and view all the answers

    What command can be used with Dig to determine all the jumps in the DNS resolution process?

    <p>The command &quot;dig +trace&quot; can be used to determine all the jumps in the DNS resolution process.</p> Signup and view all the answers

    What is the purpose of SSH tunneling?

    <p>To forward data over an encrypted connection</p> Signup and view all the answers

    What is routing, and what is the difference between dynamic and static routing?

    <p>Routing is the process of finding a path of hops between two IP addresses on different networks. Dynamic routing determines the next hop based on network loads, while static routing ignores network loads.</p> Signup and view all the answers

    What is the port number commonly used for HTTP servers?

    <p>8080</p> Signup and view all the answers

    Which key is the public key in SSH?

    <p>id_rsa)pub</p> Signup and view all the answers

    What is the purpose of running multiple instances of the server code in the background?

    <p>Running multiple instances of the server code in the background is for testing connectivity from different machines.</p> Signup and view all the answers

    How can Wireshark be used to sniff HTTP traffic?

    <p>Wireshark can be used to sniff HTTP traffic by capturing packets on a network interface and analyzing the contents of the packets to extract HTTP data.</p> Signup and view all the answers

    What should you do after enabling 999-fallback.conf and disabling 000-default.conf?

    <p>Reload the Apache service using systemctl.</p> Signup and view all the answers

    What is SSH and how does it work for remote shell access?

    <p>SSH is a type of remote shell used for accessing a computer's operating system remotely. Users can share their own public key with an SSH server for authentication. SSH key generation creates private and public keys. SSH port forwarding allows passing data over an encrypted connection.</p> Signup and view all the answers

    What is the purpose of changing the port and IP address of the server code?

    <p>To test connectivity to different ports and IP addresses</p> Signup and view all the answers

    What determines the type of sockets different applications use?

    <p>The needs of the application</p> Signup and view all the answers

    What is X11?

    <p>A windowing system that provides the framework for GUI environment</p> Signup and view all the answers

    What is shown in the network diagram created in the lab?

    <p>The network diagram shows the flow when host1 tries to load a webpage hosted on host2.</p> Signup and view all the answers

    What is an SSH tunnel and how is it used for secure remote access?

    <p>An SSH tunnel is a secure connection between two devices that allows for secure remote access to servers and applications.</p> Signup and view all the answers

    What is used for user authentication in SSH?

    <p>Public key cryptography</p> Signup and view all the answers

    What command is used to restart Apache gracefully?

    <p>To restart Apache gracefully, use the command apachectl graceful.</p> Signup and view all the answers

    What is the purpose of a Forward Zone File?

    <p>The purpose of a Forward Zone File is to map IP addresses to domain names.</p> Signup and view all the answers

    What are the two main motivations for using VPNs?

    <p>Accessing private networks and increased privacy and internet safety</p> Signup and view all the answers

    What is the difference between HTTP and HTTPS traffic?

    <p>HTTPS traffic is encrypted and HTTP traffic is not</p> Signup and view all the answers

    How can the webpage be tested after configuring SSL?

    <p>The webpage can be tested using https:// instead of http://.</p> Signup and view all the answers

    What should you do to ensure that traffic is going to the correct virtual host?

    <p>You should look at the log files to make sure traffic is going to the correct virtual host.</p> Signup and view all the answers

    True or false: The default gateway is a router on the same network as the node.

    <p>True</p> Signup and view all the answers

    What is the purpose of the NC command in the context of HTTP?

    <p>The NC command can be used to establish a connection to a server from another terminal.</p> Signup and view all the answers

    True or false: A hardened system or server may not require a DE or windowing interface.

    <p>True</p> Signup and view all the answers

    What must be specified for non-well-defined ports when allowing traffic in the firewall?

    <p>The port number and protocol</p> Signup and view all the answers

    What is the unique ID of a Network Interface Card (NIC)?

    <p>MAC address</p> Signup and view all the answers

    What is the prerequisite for the Linux II course?

    <p>No information is provided</p> Signup and view all the answers

    What is dig and how is it used?

    <p>Dig is a DNS lookup tool used to resolve hostnames and IP addresses. It is used by typing &quot;dig [hostname]&quot; in the command line.</p> Signup and view all the answers

    What is the purpose of the "a2dismod" command?

    <p>To disable Apache modules</p> Signup and view all the answers

    True or false: SSH keys can be generated and copied for secure remote access to servers.

    <p>True</p> Signup and view all the answers

    What is a fully qualified domain name (FQDN)?

    <p>A domain name that includes all parts of a domain name</p> Signup and view all the answers

    What is the difference between TOR and VPNs in terms of traffic decentralization?

    <p>TOR aims to decentralize traffic while VPNs go through a single server</p> Signup and view all the answers

    What are some benefits of virtualized networks like Docker Networks?

    <p>Some benefits of virtualized networks like Docker Networks include easier management, increased security, and better resource utilization.</p> Signup and view all the answers

    What needs to be done to allow traffic on specific ports?

    <p>To allow traffic on specific ports, the firewall must be configured.</p> Signup and view all the answers

    What is the purpose of the DHCP and DNS applications in the context of HTTP?

    <p>DHCP and DNS are applications used for network configuration and name resolution, respectively. They are not directly related to HTTP.</p> Signup and view all the answers

    What is the role of the SOA line in the zone file?

    <p>To specify the Start of Authority</p> Signup and view all the answers

    What should you do to ensure that traffic is going to the correct virtual host?

    <p>Look at the log files.</p> Signup and view all the answers

    Does SSH offer a secure way to access remote machines?

    <p>Yes</p> Signup and view all the answers

    True or false: The example zone file uses the IN directive to specify Internal as the class.

    <p>False</p> Signup and view all the answers

    What is the purpose of a Reverse Zone File?

    <p>The purpose of a Reverse Zone File is to map domain names to IP addresses.</p> Signup and view all the answers

    What is the purpose of using SSL/TLS certificates?

    <p>SSL/TLS certificates are used to encrypt data sent between a server and a client.</p> Signup and view all the answers

    What type of transport protocol does DHCP use?

    <p>UDP</p> Signup and view all the answers

    What is the text discussing in relation to building an authoritative zone file?

    <p>How to build an authoritative zone file for a domain</p> Signup and view all the answers

    True or false: The text discusses setting up SSH tunnels to various servers and ports.

    <p>True</p> Signup and view all the answers

    What is the purpose of Wireshark?

    <p>To analyze network traffic</p> Signup and view all the answers

    Which command is used to enable an Apache module?

    <p>a2enmod</p> Signup and view all the answers

    What is the root.hints file and what does it contain?

    <p>The root.hints file contains links to all the different root servers that can be used.</p> Signup and view all the answers

    What is the name of the software that allows X11 port forwarding over SSH?

    <p>MobaXterm</p> Signup and view all the answers

    How can access to a VM via SSH be tested using localhost?

    <p>Access to a VM via SSH can be tested using localhost by establishing an SSH connection to the VM from the local machine using the loopback IP address (127.0.0.1).</p> Signup and view all the answers

    What are Google's name servers?

    <p>8.8.8.8 and 8.8.4.4</p> Signup and view all the answers

    What are some potential issues that could arise when setting up SSH tunnels to various servers and ports?

    <p>There are many potential issues that could arise, including firewall restrictions, port conflicts, and authentication errors.</p> Signup and view all the answers

    What is XWindows System and how does it relate to X11?

    <p>XWindows System is the windowing system for most *nix systems. X11 is a client-server protocol that uses the 6000 port range. X11 can use Unix sockets if both client and server are running on the same host. X11 clients can run on one host and use an X server on another host.</p> Signup and view all the answers

    True or false: SSH stands for Secure Socket Host.

    <p>False</p> Signup and view all the answers

    What is the purpose of SSH in remote development?

    <p>To establish a secure connection between local and remote machines.</p> Signup and view all the answers

    What request method is used to retrieve a specified resource?

    <p>GET</p> Signup and view all the answers

    What are SSH keys and how are they used for secure remote access to servers?

    <p>SSH keys are used for secure remote access to servers by generating a public and private key pair. The public key is copied to the server and the private key is kept on the user's computer.</p> Signup and view all the answers

    True or false: Proper configuration of the firewall is not important for the security of the new port(s).

    <p>False</p> Signup and view all the answers

    What knowledge is required for proper firewall configuration?

    <p>Knowledge of network protocols and port numbers</p> Signup and view all the answers

    What is the purpose of tcpdump in network troubleshooting and debugging?

    <p>To analyze network traffic</p> Signup and view all the answers

    What is the importance of proper firewall configuration?

    <p>To ensure the new port(s) are accessible and secure</p> Signup and view all the answers

    True or false: Link layer protocols handle packet forwarding and routing.

    <p>False</p> Signup and view all the answers

    What is the Internet an example of?

    <p>A wide area network</p> Signup and view all the answers

    What is the purpose of the external resources provided in the text?

    <p>To provide further learning opportunities for the reader</p> Signup and view all the answers

    What is network redundancy, and why is it important?

    <p>Network redundancy allows for multiple paths between nodes to prevent loss of connectivity.</p> Signup and view all the answers

    What can be done to further learning after reading the text?

    <p>External resources provided in the text can be used for further learning.</p> Signup and view all the answers

    What is ARP and what is it used for?

    <p>ARP is used to match IP addresses to physical addresses (MAC addresses).</p> Signup and view all the answers

    What is the main goal of TOR routing?

    <p>To have as much of the path encrypted as possible</p> Signup and view all the answers

    What directory should you add subdirectories to?

    <p>You should add subdirectories to /var/www/html.</p> Signup and view all the answers

    True or false: The firewall needs to be configured to allow traffic on port 9876.

    <p>False</p> Signup and view all the answers

    True or false: SSH encrypts data sent over the network using symmetric key cryptography.

    <p>True</p> Signup and view all the answers

    Which domain is used as an example in the zone file?

    <p>knuckles.ca</p> Signup and view all the answers

    What is the purpose of configuring a firewall to block unwanted traffic?

    <p>To improve network security</p> Signup and view all the answers

    What port should you set up a port-based VHost to direct traffic to your first JavaScript project?

    <p>You should set up a port-based VHost to direct traffic over port 8123 to your first JavaScript project.</p> Signup and view all the answers

    True or false: The text provides detailed solutions to the issues encountered when setting up SSH tunnels.

    <p>False</p> Signup and view all the answers

    What is the significance of root-servers.org?

    <p>Root-servers.org provides information about root servers that can be used in the DNS resolution process.</p> Signup and view all the answers

    What was attempted during the SSH tunnel setup in the text?

    <p>Sniffing HTTP traffic</p> Signup and view all the answers

    What is the purpose of routers in a network?

    <p>To connect local area networks to wide access networks</p> Signup and view all the answers

    What command is used to allow traffic on a port?

    <p>The command &quot;ufw allow&quot; is used to allow traffic on a port.</p> Signup and view all the answers

    What is the importance of using filters in Wireshark?

    <p>Using filters in Wireshark can help to focus on specific network traffic and can aid in troubleshooting network issues.</p> Signup and view all the answers

    True or false: The example zone file also includes the IP address for the name server and hosts.

    <p>True</p> Signup and view all the answers

    True or false: The internet layer is responsible for implementing sequence checking.

    <p>False</p> Signup and view all the answers

    What is the purpose of routers in a network?

    <p>To connect local area networks to wide access networks</p> Signup and view all the answers

    How many steps are involved in the DHCP process?

    <p>4</p> Signup and view all the answers

    What is the main topic of the text?

    <p>The main topic of the text is monitoring and testing servers using various tools and exercises in Python.</p> Signup and view all the answers

    What is X11?

    <p>A windowing system used in Unix-based systems.</p> Signup and view all the answers

    What is the purpose of TCP/IP in data transmission?

    <p>TCP/IP is a packet switching protocol for data transmission.</p> Signup and view all the answers

    What is the purpose of the echo server provided in the text?

    <p>To provide a simple way to test network connectivity</p> Signup and view all the answers

    How can knowledge of DNS zone files be useful in network administration?

    <p>Knowledge of DNS zone files can be useful in network administration for tasks such as troubleshooting DNS issues and managing domain names.</p> Signup and view all the answers

    What are some advantages of using SSH for remote access?

    <p>Some advantages of using SSH for remote access include increased security, encrypted communication, and the ability to access remote resources from anywhere with an internet connection.</p> Signup and view all the answers

    What is the tool used to find IP addresses of hosts in the Docker Network?

    <p>Dig</p> Signup and view all the answers

    What is MobaXterm and how can it be used for X11 port forwarding over SSH?

    <p>MobaXterm is a client that can be configured for X11 port forwarding over SSH, allowing users to run X11 clients on one host and use an X server on another host.</p> Signup and view all the answers

    Which command is used to disable an Apache configuration?

    <p>a2disconf</p> Signup and view all the answers

    What is the Python HTTP server used for and what are its limitations?

    <p>The Python HTTP server is used for serving files over HTTP. Its limitations include only being able to serve files in the specified directory and not being suitable for production use.</p> Signup and view all the answers

    What is Network Address Translation (NAT)?

    <p>A way to forward network traffic from one IP address to another</p> Signup and view all the answers

    What is the command used to establish an SSH connection between a client and server?

    Signup and view all the answers

    What request method is used to submit an entity to the specified resource, often in response to a form?

    <p>POST</p> Signup and view all the answers

    What are ICMP and ARP, and what are their respective purposes?

    <p>ICMP is an IP layer protocol used for communicating network level information and error reporting, while ARP is used to match IP addresses to physical addresses (MAC addresses).</p> Signup and view all the answers

    What is the purpose of DNS zones and what are the two types of zone files?

    <p>DNS zones are subsets of the DNS structure defined by zone files. The two types of zone files are Forward Zone File, which maps IP addresses to domain names, and Reverse Zone File, which maps domain names to IP addresses.</p> Signup and view all the answers

    What does the root.hints file contain?

    <p>Links to all the different root servers that can be used for resolution</p> Signup and view all the answers

    What is the main purpose of SSH tunneling?

    <p>To forward data over an encrypted connection</p> Signup and view all the answers

    What are SSH tunnels and what are they used for?

    <p>SSH tunnels are used to create a secure connection between two devices. They are used to connect to servers and ports that are not accessible through the public internet.</p> Signup and view all the answers

    Which of the following is NOT a step in changing your hostname file?

    <p>Add 2 subdirectories to /var/www/html and add content.</p> Signup and view all the answers

    What is the crucial part of a certificate?

    <p>Public key</p> Signup and view all the answers

    What is required to use Wireshark?

    <p>A Graphical Interface for your VM or using an X-Forwarding client</p> Signup and view all the answers

    Where can additional information about HTTP request methods be found?

    <p>Additional information about HTTP request methods can be found in the reference link provided in the text.</p> Signup and view all the answers

    Study Notes

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Sure, please provide me with the quiz topic.

    More Like This

    Use Quizgecko on...
    Browser
    Browser