DispersedNet
SiteMap
Network Admin
Unix Admin
System Admin
Network Security
Network Monitoring
«Prev
Next»
Linux Administration
TCP/IP Concepts
Four Layers TCP/IP
Application Layer Protocol
TCP/IP Protocol
Transport Layer
Link Layer
IP Addressing Netmasks
Netmask Structure Usage
Networking Conclusion
TCP/IP Configuration
Configuration Process
Name Service Resolver
Name Service Methods
Configure Network Interface
dmesg Command Output
Listing Configuration Interfaces
IP Address Netmask
Changing IP Address
Configuring Routing Table
What is ARP?
ARP - Quiz
Single Machine Host Names
TCP/IP Conclusion
Network Daemons
Clients Servers
TCP-UDP
Port Numbers
Known Port Numbers
Ephemeral Port Numbers
TPC/UDP Port Numbers-Quiz
Listening Server Process
Iterative Concurrent Servers
inetd Super Server
/etc/inetd.conf
Stand Alone Servers
Remote Procedure Calls
Check Port Mapper Process
Survey Common Services
Telnet Clients Servers
FTP Bulk Data Transfer Service
Berkeley Commands rloginrsh
Domain Name Service
SMTP
NNTP
xprotocol Display
HTTP
Port Number Service Conclusion
Network Monitoring
ping command
Determining listening Servers
Trace Route TCP Dump - Quiz
Each question is worth one point. Select the best answer or answers for each question.
1.
You are administering an SMTP server. You suspect that a break has occurred between you and your DNS server. You do not know the exact location of the failure, but you want identify it quickly. Of the choices given below, which TCP/IP utility would you choose?
Please select the best answer.
A.
netstat
B.
ping
C.
traceroute
D.
nslookup
2.
What is the purpose of tcpdump?
Please select all the correct answers.
A.
To locate failures occurring outside your network
B.
To read all network traffic on a particular network segment
C.
To help put an ethernet device into a promiscuous mode
D.
To restart name service in the event of a network failure
3.
What is needed for an ethernet interface to send all network traffic up to the protocol stack?
Please select the best answer.
A.
It needs to be placed in promiscuous mode using tcpdump.
B.
It needs to be pinged to see if a remote machine is alive.
C.
It needs to be placed in promiscuous mode using tcpdump with root permissions.
D.
It needs to have traceroute run to follow packets through the network.
TCP/IP Illustration