How are rhel and centos different

Assignment Help Computer Engineering
Reference no: EM131917271

Assignment

Computer Networking Questions

1. How do Cloud providers increase the reliability of their storage options?

2. In AWS, what additional security features are available in VPC?

3. Given x.y.z.q/r Determine the number of hosts, the network address, the first and last host addresses

4. Regulatory compliance requires that operating systems be supported.

a. How does this impact free linux distributions?

b. How are RHEL and CentOS different?

5. In linux, what is the default, super user account name?

6. What is the CLI linux command to shutdown or restart the OS?

7. What is a linux script?

a. What are the specific steps to create and run a script?
b. Write a simple script to:

i. Save the results of ls -la to a file
ii. Ping google.com
iii. Rename a directory

8. Linux permissions

a. How are Linux permissions formatted?
b. Be able to change the permissions for a file to a specified setting

9. How do you launch a script from the CLI?

10. How can you determine what network interfaces are available on a linux machine?

11. How can you turn an Ethernet interface on/off, set the IP

12. Nano editor

a. Create, edit and save a file

13. What is the default linux shell?

14. How can you display the online help file for a linux command?

15. How can you run a command that requires elevated privileges in linux?

16. What is Webmin?

a. What can you do with it?
b. How do you access it?

17. What is the difference between redirection and a pipe?

18. Puttygen

a. What does it do?
b. How do you use it?

19. In VMware, what is the difference in the network settings between bridged and NAT? Other than examining the VMware settings, how could you determine which was being used?

20. What is jitter, as it relates to IP packets? How is jitter calculated?

21. In a AWS Type 2 VPC, what was the purpose of using NAT between the servers?

a. Should all of the servers reach the Internet? Explain

22. If a computer you were trying to "ping" didn't respond, how would you troubleshoot that. Assume the destination node is in the cloud. Assume your firewall wasn't blocking ICMP

23. You are logged into a linux machine, with the username user1, you are a standard user. You can't open a file for editing. What would you do? Explain your troubleshooting process

24. How is the ls command different from ls -la ?

25. Contrast ILEC and CLECs.

a. How are the different.
b. Why would someone choose to buy services from one over the other.
c. Who is responsible for the local loop?

26. Contrast the use of a Channel Bank as compared to a T1-PRI interface?

27. Why would a company use a SIP trunk? When would it make sense to use a SIP trunk?

28. What is Caller-ID spoofing?

29. What is the meaningful advantage of using PoE with VoIP phones compared with using the AC power adapter?

30. How does a phone get its config from a TFTP server.

a. How does that work?
b. How does the phone learn about a TFTP server?

31. Explain common VoIP terms:

a. Adaptive jitter buffer
b. Latency
c. Jitter
d. Silence suppression
e. SIP
f. CO
g. ILEC
h. CLEC
i. LATA
j. Local loop
k. PSTN
l. T1
m. POTS
n. CODEC
o. DTMF
p. Line appearance
q. FXO
r. FXS

32. Explain the major PBX features

a. ACD
b. IVR
c. Least Cost Routing

33. What are the potential issues with using a Hosted PBX.

Reference no: EM131917271

Questions Cloud

The definition of government expenditures : Which of the following is the definition of government expenditures? Congress might lower taxes if the economy appears to be in
Prepare a memo that either supports or refutes controller : a lack of available space for inventory and current inventory levels are high, but it is anticipated that the inventory will decrease in the coming months
Fed changed due to the financial crisis : How has the role of the Fed changed due to the financial crisis?
What area of network management is involved : A network manager decides to replace a version of accounting software with a new version. What area of network management is involved here?
How are rhel and centos different : How does this impact free linux distributions? How are RHEL and CentOS different? In linux, what is the default, super user account name?
What is the ph at the midpoint in the titration : When a 21.0 mL sample of a 0.308 M aqueous hypochlorous acid solution is titrated with a 0.388 M aqueous potassium hydroxide solution
Aqueous barium hydroxide solution : What is the pH at the equivalence point in the titration of a 18.7 mL sample of a 0.478 M aqueous acetic acid solution with a 0.370 M aqueous barium hydroxide.
Determine the ph during the titration : Determine the pH during the titration of 14.7 mL of 0.218 M nitric acid by 0.138 M potassium hydroxide at the following points:
Write a custom function with the definition def computegrade : Write a custom function with the definition def computegrade(): Validate that the score is numeric within a try-except block.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss the organization and estimate both the damage cost

Assess damage and cost-assess the damage to the organization and estimate both the damage cost and the cost of the containment efforts

  Create a keyboard driven video game

The objective is pretty simple. Create a keyboard driven video game, with you the player in the center of the screen

  What are the reasons why systems fail

What must be management's role in the system development life cycle.

  What are the contents of the a register after the execution

What are the contents of the A register after the execution of this instruction? XXXX=XXX XXXXXXXX XXXXXX== and XXXX=XX= XXXXXXXX XXXXXX==.

  Discuss security attacks on information systems occur

Security attacks on information systems occur all the time and pertain to every aspect of the attacked system

  Describe simplex half-duplex and full-duplex transmission

Describe simplex, half-duplex, and full-duplex transmission and compare them in terms of cost and effective data transfer rate.

  Proposing the reasonable values

Propose the reasonable values for items in risk register for this asset and threat, and give the justifications for your choices.

  Which of the two executes faster

There are two ways of loading the accumulator with a number: Which of the two executes faster? Why?

  Create a flowchart of the preliminary investigation overview

Create a flowchart of the Preliminary Investigation Overview, should be used along the decision lines

  Create a useful model of supply chain operations which

explain the aspects regarding three crucial decisions to make regarding the creation and holding of inventory in a

  Prepare a data-flow diagram of one of its main process

Prepare a data-flow diagram (DFD) of one of its main processes and an entity-relationship diagram showing the data within the scope of the system.

  What is the role of a pilot project in information systems

jim watanabe was in his new car driving down i-5 on his way to work. he dreaded the phone call he knew he was going to

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd