LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
5th Edition
ISBN: 9781337569798
Author: ECKERT
Publisher: CENGAGE L
expand_more
expand_more
format_list_bulleted
Concept explainers
Expert Solution & Answer
Chapter 12, Problem 11RQ
Program Description Answer
The technologies that are used for the graphical remote administration is “SSH-X” and “VNC”.
Hence, correct answers are option “B and D”.
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Which of the following are graphical remote administration technologies? (Choose allthat apply.)a. telnetb. ssh -Xc. sshd. VNC
QUESTION 20
Which of the following is a command-line utility that can be used to display, change, add, and delete network configuration settings on a computer, including basic and advanced settings?
a.
hostname
b.
nslookup
c.
netsh
d.
netstat
what command, common across the vast majority of operating systems, can be used to view network connections?
a) netstat
b) nslookup
c) ip
d) ifconfig
Chapter 12 Solutions
LINUX+ AND LPIC-1 GDE.TO LINUX CERTIF.
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Which of the following is not a problem that could be caused by disabling STP in a switched network? a. Broadcast storm b. MAC spoofing c. Duplicate packets d. Switching table instabilityarrow_forwardWhich application embedded in Windows operating systems allows remote control of a computer and uses the RDP secure protocol for transmissions? a. Telnet b. Remote Desktop c. SFTP d. SSHarrow_forwardWhere will be the Remote objects stored?. a. HTTP b. DNS c. Remote area d. Serverarrow_forward
- Kye wants to transfer files between a workstation and a server through a command-line interface, with encryption of both the data and the commands being used to copy the files. Which of the following protocols would provide these tools? a. FTPS b. FTP c. TFTP d. SFTParrow_forwardWhich of the following is NOT part of a Layer 2 Frame? A. Preamble B. Source MAC Address C. Destination IP Address D. Payload E. CRC Error Checkingarrow_forwardWhich of the following statements best describe middlebox devices?a. Middlebox device act as network hubs that forward data to multiple devices.b.Middlebox devices operate only in the network layer.c.Middlebox devices are routers that process, modify, and forward IP packetsd.A firewall is a type of middlebox device.arrow_forward
- Which of the following are IPC techniques for data transfer between processes? -Networking with sockets -shared memory -message passing -named pipes -all of the above -none of the abovearrow_forwardWhich two commands can be used to modify the route table on a Linux computer?(Choose two answers.)a. routeb. ipconfigc. ipd. traceroutearrow_forwardNOTE: I need CIM PowerShell command please don't use get-wmiobject command What class can you use to view the current IP address of a network adapter? Does the class have any methods that you could use to release a DHCP lease? (Hint: network is a good keyword here.)arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Comptia A+ Core 1 Exam: Guide To Computing Infras...Computer ScienceISBN:9780357108376Author:Jean Andrews, Joy Dark, Jill WestPublisher:Cengage Learning
Comptia A+ Core 1 Exam: Guide To Computing Infras...
Computer Science
ISBN:9780357108376
Author:Jean Andrews, Joy Dark, Jill West
Publisher:Cengage Learning