UNIX网络管理(第一部分)
--------------------------------------------------------------------------------
Which of the following is an access method?
A. RJ-45
B. CSMA/CD
C. token ring
D. token bus
@ b @
CSMA/CD stands for carrier sense, multiple access with collision detection.
This method can be defined as wait, send, and l isten. CSMA/CD is the IEEE 802.3 and Ethernet access method.
Token passing can be implemented in a ring and a bus topology
A bridge can perform translations up to an including which OSI layer
A. layer 1
B. layer 2
C. laver 3
D. laver 4
@ b @
Bridges are used to connect two LAN segments at the OSI data link layer. Bridges can only determine the link level address of the source and destination stations involved in the data transfer; it cannot deal with IP addresses.
Which of the following is not a standard ARPA service ?
A. telnet
B. rlogin
C. ftp
D. BOOTP
@ b @
rlogin, rcp,remexec are Berkeley services.
Well known port number 23 is used universally for which service?
A. ftp
B. rlogin
C. telnet
D. finger
@ c @
Refer to /etc/services. Port for ftp is 21.
Which statement is not in a format suitable for either rhosts. equiv
or .rhosts?
A. -pluto
B. +sally
C. saturn, pluto, -bob
D. saturn -bob
@ c @
The /etc/hosts.equiv file associates remote hosts with a user s host.
This association identifies equivalent hosts that are frequently accessed by the same users. If a remote host is listed in hosts.equiv, and the remote user s login name matches a login name on the local host, the user is not prompted for a password. This equivalency does not apply to superusers. $HOME/.rhosts can be created and configured by any user to specify remote login names that are equivalent to the local user s login name. $HOME/.rhosts must be owned by the local user. In both files, comma is not allowed.
Each IP address contains two parts:
A. the network portion and the host portion.
B. the host portion and the socket portion.
C. the network portion and the MAC address.
D. the MAC address and the socket portion.
@ a @
The IP network portion identifies which IP network the host s belongs to. The IP host portion is a unique identifier on that IP network.
Which protocol maps IP addresses of remote nodes to their corresponding MAC addresses?
A. IP
B. ARP
C. TCP
D. ICMP
@ b @
B. The Address Resolution Protocol (ARP) resolves a OSI network layer
address (like IP addresses) to the corresponding OSI data link layer
address (hardware (MAC) address).
Which type of access method does Ethernet and IEEE 802.3 use?
A. Fiber Distributed Data Interface (FDDI)
B. Demand Priority Protocol (100VG-AnyLAN)
C. Carrier-Sense, Multiple-Access with Collision Detection (CSMA/CD)
D. Dynamic Host Configuration Protocol (DHCP)
@ c @
C. Ethernet and IEEE 802.3 use the Carrier-Sense, Multiple-Access with Collision Detection (CSMA/CD) access method.
The ______________________ file is used by the system at boot time to
configure an IP address onto a LAN interface card.
A. /etc/rc.config.d/namesvrs
B. /etc/rc.config.d/ipconfig
C. /etc/rc.config.d/ifconfig
D. /etc/rc.config.d/netconf
@ d @
D. HP-UX uses the /etc/rc.config.d/netconf to configure the LAN interface card with the ifconfig command at system boot.
The ________________ command can be used to view the routing table on a system.
A. route
B. netroute
C. netstat
D. nfsstat
@ c @
C. The HP-UX netstat -r command displays the currently configured routing table.
Subnetting is a technique used to:
A. use the host part of an IP address to provide discrete sub-networks.
B. use the network part of an IP address to provide discrete sub-networks.
C. perform IP multiplexing.
D. perform IP forwarding on an HP-UX host.
@ a @
A. Subnetting is the technique to break up a large IP address space into smaller networks called subnets. It uses the netmask to reassign IP host portion bits to the IP network portion.
The lanscan command can be used to display:
A. the device file(s) for any LAN cards on a system.
B. the IP address on a system.
C. all protocols a system is using.
D. all MAC addresses on a system.
@ d @
D. The HP-UX lanscan command displays all of the hardware paths,
corresponding hardware states, and hardware (MAC) addresses of all of the LAN cards on the system.
The directory location of start-up/shutdown scripts on an HP-UX 10.X or 11.0 host is:
A. /etc/rc.config.d
B. /sbin/init.d
C. /usr/sbin
D. /startup
@ b @
B. All HP-UX start-up/shutdown scripts are located in the /sbin/init.d
directory.
The /etc/hosts.equiv and the ~/.rhosts files work with:
A. ftp
B. tcp
C. rcp
D. rsh
@ c @
C. The /etc/hosts.equiv and ~/.rhosts files establish equivalency for the Berkeley Internet Services that require password authentication
What command would you use to discover the sequence of gateways through which an IP packet travels to reach its destination?
A. traceroute
B. ping
C. netstat
D. ifconfig
@ a @
It is traceroute.
The file /var/adm/inetd.sec is used to:
A. provide an extra layer of security for HP-UX systems.
B. specify extra security for anonymous FTP users.
C. control access to the internet daemons database.
D. enable/disable internet daemon services such as ftp and telnet.
@ a @
A. The /var/adm/inetd.sec file in conjunction with the /etc/inetd.conf and
/etc/services is configured to allow|deny ARPA/Berkeley Internet
Services access to specified hosts and IP networks.
My host name is "einstein" and I want to display my IP address. Assuming
that everything is configured properly on my system, to display my IP
address, I could type the following:
A. hosttoip einstein
B. ifconfig einstein
C. nslookup einstein
D. lanscan einstein
@ c @
C. The HP-UX nslookup command performs hostname-to-address name
resolution.
The lanadmin command CANNOT be used to:
A. show IP address to LANIC address mappings
B. reset the LAN interface card
C. show operational status of the LAN interface
D. indicate basic input/output errors for the LAN interface
@ a @
IP to MAC mapping should use arp.
The internet daemon inetd is responsible for :
A. client rwho requests
B. sendmail requests
C. client telnet and ftp requests
D. www services
@ c @
inetd take care the servises uncommented in /etc/services, s uch as telnet, login, shell and ftp.
You add a new gateway to your network that allows you access to a business
partner network whose network number is 15. The new gateway machine has
an IP address of 145.1.22.100, what command do you need to run on client machines on your own network in order to communicate with machines on your business partner network?
A. route add net 145.1.22.100 15.0.0.0 1
B. route add net 15.0.0.0 145.1.22.100 1
C. route add net 145.1.0.0 15.0.0.0 1
D. route add net 15.0.0.0 145.1.22.100 0
@ b @
Be sure with gateway and destination.
What is the broadcast address of a host which has an IP address 124.27.60.36? (assume a default subnet mask)
A. 127.0.0.0
B. 124.27.255.255
C. 127.0.0.1
D. 124.255.255.255
@ d @
A class address, right?
During system startup and run-state changes, the /sbin/rc program runs
configuration scripts that are usually located in the ____________
directory.
A. /etc/rc.d
B. /sbin/init.d
C. sbin/config.d
D. etc/rc.confg.d
@ d @
Where is netconf, namesvrs and nfsconf?
The loopback address in TCP/IP networking is:
A. used by gateways to return undeliverable packets
B. a way in which a system can route datagrams to itself
C. used when the card is switched into promiscuous mode
D. a special route used for testing purposes only
@ b @
The loopback address in TCP/IP networking is a way in which a system can route datagrams to itself
The linkloop command is useful for showing:
A. local LAN throughput
B. loopback address operational status
C. router activity
D. LANIC address connectivity
@ b @
Use linkloop to test layer 2 connectivity.
Which of the following files can NOT be used to prevent ftp access?
A. /etc/ftpusers
B. /var/adm/inetd.sec
C. /etc/inetd.conf
D. /etc/ftp.conf
@ d @
/etc/ftpusers can deny certain users from clients.
/var/adm/inetd.sec can deny machines
/etc/inetd.conf can disable ftp services.
What, in your opinion, is the most important NFS consideration of those shown below?
A. keep the system time synchronised with all other NFS nodes
B. the server is running enough nfsd processes
C. the client is running enough biod processes
D. all user and group ID s are consistent across all NFS nodes
@ d @
Security is the top at list.
Which of the following files turns the inetd daemon off at boot?
A. No file can prevent the inetd daemon from being started at boot.
B. /etc/rc.config.d/netdaemon
C. /etc/rc.config.d/netconf
D. /etc/rc.config.d/inetd
@ a @
inetd is running by default. You can set its log option.
The default packet size used by ping transmissions is:
A. 32 bytes.
B. 64 bytes.
C. 32 bits.
D. 64 bits.
@ b @
The correct answer is: B. 64 bytes.
The default value is 64 (on HPUX systems at least).
How does an HP-UX administrator turn the bootp daemon on at boot?Edit the:
A./etc/rc.config.d/netdaemon file and set the variable BOOTP=1
B./ etc/inted.conf file and uncomment the bootp line
C./etc/rc.config.d/bootp file and set the variable BOOTP=1
D./etc/rc.config.d/netconf file and set the variable BOOTP=1
@ b @
bootp/tftp are inetd services.
After modifying the internet Daemon (inetd), what should be done to
initiate the changes?
A. Use the kill command on the current inetd then re-run /usr/sbin/inetd
B. Run the inetd command with a -r option
C. The system must be rebooted
D. Run the inetd command with a -c option
@ d @
inetd -c swagentd -r sig_named restart
Your manager makes a request for you to create a script that will start a daemon at system boot. In what directory would you put this script and the corresponding configuration file for the script?
A. /sbin/init.d , /etc/rc.config.d
B. /sbin/rc , /etc/netconfig
C. /sbin/startups, /etc/inittab
D. /usr/sbin, /etc/rc.config.d
@ a @
The correct answer is: A. /sbin/init.d , /etc/rc.config.d
By convention (System-V, Rel-4 file system layout) all startup scripts are placed in /sbin/init.d and their corresponding configuration files are located in /etc/rc.config.d . This is merely a convention and if the administrator is knowledgeable they may relocate these files (not a recommended practice!). What other directories are used during system startup and run-state changes?
Which of the following commands would allow you to determine the MAC
(ethernet) address of the local system s NIC s.
A. swlist
B. ioscan
C. lanscan
D. ifconfig
@ c @
The correct answer is: C. lanscan
lanscan provides the "station address" o f all Network Interface Cards on the local system.
The maximum cable length of each 10BaseT segment is:
A. 10 meters
B. 20 meters
C. 100 meters
D. 200 meters
@ c @
The correct answer is: C. 100 meters
The stated length for 10 Mega-bit twisted pair cabling is 100 meters.
Which of the following can NOT be determined from the netstat command?
A. state of IP-Forwarding
B. network interface status
C. active socket connections
D. route table entries
@ a @
The correct answer is: A. state of IP-Forwarding
The netstat command provides a wealth of networking information and
statistics but basic configuration flags such as IP-Forwarding can not be viewed with it. Try the ndd command instead.
Which of the following would never be used by a local host to deliver a packet to another local host?
A. network number
B. the ARP cache
C. the default gateway
D. a DNS server
@ c @
router is used to access remote host.
Which of the followng netmasks is improperly configures for a IPV4 Class
B address?
A.255.255.128.0
B.255.255.160.0
C.255.255.192.0
D.255.255.254.0
@ c @
128+64=192
In relation to network spooling which of the following statements is false?
A. the rlpdaemon must be available on the print server
B. bootpd and tftpd are required on the BOOTP server
C. HPNP JetAdmin utility software is bundled with HP-UX
D. the BOOTP server and network printer must not have a gateway between
them
@ c @
HPNP should be installed seperately.
The default depot path for software distributor is:
A. /var/spool/sw
B. /sw/defsw
C. /var/sw
D. /tmp/sw
@ a @
Recall the case when you use swinstall or swcopy.
@
16
@
W-HPUX5@
Which of the following is not a valid software distributor command?
A. swpackage
B. swacl
C. swconfig
D. swdelete
@ d @
swremove
The HP-UX linkloop command can be used to:
A. test layer 2 connectivity
B. test the operational state of the loopback interface
C. ensure that a network interface cards IP address and MAC address are
properly bound
D. enable IP multiplexing
@ a @
linkloop mac-address
You do not want the cron daemon to start at system boot. What action should you take?
A. Run the "unset cron" command.
B. Change the value of the CRON variable in /sbin/init.d/cron from 1 to 0.
C. Change the value of the CRON variable in /etc/rc.config.d/cron from 1 to 0.
D. Remove the /usr/sbin/cron executable.
@ c @
The correct answer is: C. Change the value of the CRON variable in
/etc/rc.config.d/cron from 1 to 0.
The configuration file that controls the startup of cron is
/etc/rc.config.d/cron.
An HP ENVIZEX X Station would not have :
A. RAM
B. a SCSI interface
C. an audio interface
D. a hard disk
@ d @
Diskless workstation.
What is the maximum transmission unit (MTU) size for IEEE 802.3?
A. 64 brtes
B. 1024 bytes
C. 1500 bytes
D. 6024 bytes
@ c @
netstat -in
Which of the following commands use NTP to keep clocks in sync with other nodes on the network?
A. /usr/sbin/ntpd.conf
B. /usr/sbin/ntpsync
C. /usr/sbin/ntpdate
D. /usr/sbin/ntpd
@ c @
ntpdate sets the local date and time by polling the Network Time Protocol server(s) on the host(s) given as arguments to determine the correct time. It must be run as root on the local host. Typically, ntpdate can be inserted in the startup script to set the time of day at boot time and/or can be run from time-to-time via cron.
@
When using HPNP JetAdmin to add a network printer to the local spooler you
must specify:
A. the printer name / IP name
B. the printer type
C. the LP destination queue name
D. perform all three of the above actions
@ d @
Add the printer to your spooler.
--------------------------------------------------------------------------------
文章来源于领测软件测试网 https://www.ltesting.net/