Is configuring the loopback interface necessary for a system without networking?
Yes, as the loopback interface is used by various local services during normal operation.
What is the purpose of configuring a default gateway?
In order to route networking traffic to destinations other than the local network, the default gateway is used.
Which command is used to scan for available wireless networks?
iwlist is the command by which to scan for available wireless networks.
What do VPN implementations - like IPSEC, VPND, SSH and (many) Cisco Routers - have in common?
They all create a secure tunnel through a possibly insecure network (like the internet).
Name the three protocols which are used in an IPSEC implementation.
ESP (Encapsulating Security Payload), AH (Authentication Header) and IKE (Internet Key Exchange).
Which tool is the first to use in order to detect mulitple use of your IP address in the same network?
Using arp one can determine which MAC-addresses are using your IP-address.
What ICMP message will be sent back to a traceroute client by every system along the path to the destination specified?
An ICMP TIME_EXCEEDED reply is sent back to the packet's source address. This is because traceroute sents out a stream of packets to the destination, starting with the TTL-field set to 1 and incrementing it by one every time until the destination replies.