Professional Documents
Culture Documents
Be able to describe two key characteristics (e.g., ISO layer, purpose, function, key packet
information, etc.) of each of these protocols
TCP
UDP
IP
ICMP
ARP
Be able to describe the purpose and basic operation of these protocols
DNS
DHCP (client and server)
SMTP (transport and submission)
IMAP (imaps)
HTTP (https)
LDAP (ldaps)
1
8. In bash shell scripts, what do > and >> do? What does | do?
9. In bash shell scripts, what happens when I end a command with >/dev/null 2>&1
10. What is the purpose of having a user account like "nobody" or "postfix" with no password?
11. What is the difference between a TCP/UDP port and a switch/router port?
12. Can a network administrator choose just any port number for a service? Why or why not?
13. What is port forwarding?
14. DHCP uses a four-phase process to grant a lease for IP connection settings to a DHCP client.
The first phase involves sending out a DHCPDISCOVER message. Using two or three sentences,
state the reason for sending this message out as a broadcast message, rather than a normal
unicast message.
15. What common parameters can a DHCP server set for a client?
16. Why is a "rogue" (unauthorised. unofficial) DHCP server on a subnet problematic? What
steps can be taken to resolve the problem?
17. Describe the purpose of ARP, and the basic methods it uses to do its job.
18. Describe the effect of ARP "cache poisoning".
19. Describe the purpose of DNS, the standard port and protocols it uses.
20. Describe the effect of DNS "cache poisoning".
21. Which of these files can be used instead of the DNS to map a hostname and aliases to an IP
address? (a) /etc/HOSTNAME (b) /etc/hosts (c) /etc/resolv.conf (d) /var/hostlist (e) another file
not listed. Justify your answer; assume the paths are correct
22. What is a DNS CNAME record?
23. What can Dovecot and Squirrelmail use LDAP for?
24. What are the key directives for configuring a webserver? Aside from the name, which
configuration parameters are changed to define a webserver "virtualhost"?
25. How does a DNS CNAME record relate to a webserver "virtualhost"?
26. What is the difference between using the SMTP port vs. the Submission port for mail?
27. Why should system administrators be concerned about broadcast traffic? How is the
“broadcast domain” defined?
28. What is the difference between a packet sniffer and a packet filter? How are they used by
network administrators?
29. What does ACL stand for? What is the relationship between ACLs and firewalls?
30. Briefly define and relate: security policy, acceptable use policy, security mechanisms, and
security procedures. In your description, include the associated organisational roles: who is
responsible for them, and how can we audit/verify their effectiveness.
31. What do xinetd, tcpwrap, and iptables have in common? List two characteristics of each one
that makes them different from the others.
32. Describe two key similarities and one key difference between using stunnel and OpenVPN to
provide secure network communications.
33. What is the effect of forcing users to change their password frequently? How is this a
tradeoff between security and user experience?
2
34. Why do some distributions (like Ubuntu) insist that root access is available only through
sudo? Reflect on the two sides to this issue.
35. What are the four basic rules for troubleshooting configurations?
36. What are the three Ps that are most commonly the cause of problems with service
configuration?
37. Alice tried to start a service but it gave her the message “Cannot run - Could not write to
/var/run: Access Denied”. What should she do?
38. Bob tried to start a service but it gives him the message “Exiting – could not load shared
library libres.so.0”. What three things should he do (in the proper order)?
39. Aside from google, stackexchange and stackoverflow, what are the two best ways to get help
with a command?
40. Describe in steps how you would troubleshoot the following alleged failures of services on
your network. Include the names of tools you would use, and how you would use them.
a) The web service is totally unresponsive
b) Can’t access a particular external network