Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Linux+ Certification Bible.pdf
Скачиваний:
46
Добавлен:
15.03.2015
Размер:
3.78 Mб
Скачать

Chapter 7 Study Guide 257

Lab Exercises

Lab 7-1 Configuring Networking

The objective for this hands-on lab is to gain experience in configuring Linux networking. You should be able to use any distribution of Linux for this installation exercise.

1.Login as the root user

2.Start the linuxconf or netconfig program

3.Use the program to configure network services

4.Save the settings

5.Test the configuration using ifconfig -a and accessing a network

Answers to Chapter Questions

Chapter Pre-test

1.Transmission Control Protocol and Internet Protocol (TCP/IP) suite is the default protocol of the Internet, and all Linux systems.

2.Domain Name System is the naming system of the Internet; Windows Internet Naming Service is the Microsoft naming service; Network Information System is used in UNIX and is often called Yellow Pages; and Dynamic Host Configuration Protocol is used to assign IP addressing and can be used with all of the other services.

3.SMB/CIFS (System Message Block) and NFS (Network File System) are both protocols that allow network access of file systems.

4.Point-to-Point Protocol is a connection method used to create serial connections.

5.HyperText Transfer Protocol, Post Office Protocol, Simple Mail Transfer Protocol and Simple Network Management Protocol are used with TCP/IP to provide network services.

6.File Transfer Protocol and Trivial File Transfer Protocol are used to transfer files.

7.Telnet, rlogin, and SSH are the most common methods of remote access.

8.Gateways are usually routes to other networks and netmask defines the network scope.

258 Chapter 7 Study Guide

9.TCP/IP is the standard protocol of the Internet.

10.POP3 and IMAP are the standard Internet e-mail client protocols. SMTP is usually a server side protocol.

Assessment Questions

1.A. TCP is a connection-oriented protocol. For review, see the “TCP/IP Protocol Suite” section.

2.B. PPP is most often used to create serial point-to-point connections. For review, see the “Point-to-Point Protocol” section.

3.C. NIS and NFS use the RCP TCP/IP protocol. NIS is a similar service to DNS, DHCP is not used to provide NIS or NFS, and NIS is also known as Yellow Pages. For review, see the “Other network protocols” section.

4.D. The programs used for network configuration are linuxconf and netconfig. The others are not standard programs for network configuration. For review, see the “Configuring Basic Network Services” section.

5.B. The host name is most often used to provide the Fully Qualified Domain Name. The others are not naming systems. For review, see the “Host name” section.

6.C. IP addresses are 32-bit numbers. The others are not correct. For review, see the “IP addressing” section.

7.D. IP addresses are controlled by IANA; however, most clients receive IP addresses from ISPs. DHCP and DNS use IP addressing but are not assigning authorities. For review, see the “IP addressing” section.

8.A. The DHCP service is used to automatically assign IP addresses to clients. It does not provide the other services. For review, see the “DHCP” section.

9.C. When attempting to connect to a Web site, the major service used is DNS. DHCP is for IP addressing and NIS and WINS are normally used for LAN or Intranet naming. For review, see the “DNS” section.

10.A. A subnet mask identifies the class subnetting for that particular IP address. For review, see the “IP addressing” section.

11.A and D. PPP is preferred because it provides secure password authentication, error detection, and both synchronous and asynchronous communications. For review, see the “Point-to-Point Protocol” and “Serial Line Internet Protocol” sections.

12.B. NFS uses the NIS system. The others are not normally used for NFS sharing. For review, see the “NFS” section.

13.D. The Apache Web server is the most common Web server in use today. For review, see the “Apache Web Server” section.

Chapter 7 Study Guide 259

14.D. Samba is used to support the Microsoft SMB/CIFS systems. Samba is not used to support NFS, IPX or DHCP. For review, see the “Samba File Server” section.

15.A. The most common location of the Samba client files is /usr/local/ samba/bin/ or /usr/samba/bin/ directory. For review, see the “SMB/CIFS” section.

16.B. The command used to display the NIS password database is ypcat passwd.byname. The others do not provide the information. For review, see the “NIS client configuration” section.

17.A and C. FTP and TFTP are used to download files from a remote server. Telnet is used for remote access and SNMP is used for management. For review, see the “FTP” and “TFTP” sections.

18.D. The insmod command is used to load a module into the kernel. For review, see the “Hardware resources” section.

19.A, B, and D. To provide remote access Linux uses rlogin, Telnet, and SSH. For review, see the “Remote Access” Section.

20.D. SSH provides the best security of all the programs listed. For review, see the “OpenSSH” section.

Scenarios

1.The sales manager is wise to be worried about what services are started automatically. By default, the inetd daemon starts the ftpd, rlogind, rexecd, rshd, talkd, telnetd, and uucpd daemons, which can create many security holes. Editing inetd.conf can be done to stop these services from automatically being started.

2.Linux can replace most of the services that a Microsoft Windows NT server can provide with the Samba service.

User Environment

Settings

EXAM OBJECTIVES

3.3 Set environment variables (e.g., PATH, DISPLAY, TERM)

3.7 Identify when swap space needs to be increased

3.8 Add and configure printers

3.9 Install and configure add-in hardware (e.g., monitors, modems, network interfaces, scanners)

3.10 Reconfigure boot loader (e.g., LILO)

3.11 Identify the purpose and characteristics of configuration files (e.g., BASH, inittab, fstab, /etc/*)

3.12 Edit basic configuration files (e.g., BASH files, inittab, fstab)

3.14 Document the installation of the operating system, including configuration

C 8H A P T E R

262 Part III Configuration

CHAPTER PRE-TEST

1.What is the purpose of PATH?

2.What is the purpose of TERM?

3.Can the swap file be reconfigured?

4.Where is the inittab file located?

5.Where is the fstab file located?

6.What is a basic editor?

7.Can users have different shells on the same system?

8.What is BASH?

9.What should be done before editing any system configuration file?

10.What is the main reason to use a shell?

Answers to these questions can be found at the end of the chapter.

Соседние файлы в предмете Операционные системы