Quiz-summary
0 of 89 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
Information
Because of some problems with how to create an Test Online, we temporarily use the symbol (\) instead of the symbol (/) in some sentences. So you need to change the symbol (\)to the symbol (/) when you do it in practice. Thank you!
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 89 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- Answered
- Review
-
Question 1 of 89
1. Question
1 pointsThe reference time that the system time is calculated from is known as:Correct
Incorrect
-
Question 2 of 89
2. Question
1 pointsThe date command is used for:Correct
Incorrect
-
Question 3 of 89
3. Question
1 pointsThe precision provided by NTP is on the order of:Correct
Incorrect
-
Question 4 of 89
4. Question
1 pointsWhich of the following options, when used with the ntpd command, will perform a one time synchronization:Correct
Incorrect
-
Question 5 of 89
5. Question
1 pointsThe \etc\ntp.conf file lists three servers for querying. Two of them return the time 10:54:23 while the third one shows a different time (i.e. 10:50:37). The system will use which of the return values?Correct
Incorrect
-
Question 6 of 89
6. Question
1 pointsTwo NTP servers are used by ntpd; one runs Stratum-2 clock while the other uses Stratum-4. Which one is considered to be more accurate?Correct
Incorrect
-
Question 7 of 89
7. Question
1 pointsTo verify if a NTP server is available, which of the following commands should be executed?Correct
Incorrect
-
Question 8 of 89
8. Question
1 pointsThe daemon that provides logging services for applications and programs is:Correct
Incorrect
-
Question 9 of 89
9. Question
1 pointsSystem administrators can use logs for all of the following, except:Correct
Incorrect
-
Question 10 of 89
10. Question
1 pointsWhich of the following commands is not used to view log files on a Linux operating system?Correct
Incorrect
-
Question 11 of 89
11. Question
1 pointsErrors relating scheduled cron jobs can be found at which of the following locations?Correct
Incorrect
-
Question 12 of 89
12. Question
1 pointsThe system administrator is seeing a surge in the number of logged messages. She checked the process accounting setting and it is not turned on. What else could be the reason for the sudden increase?Correct
Incorrect
-
Question 13 of 89
13. Question
1 pointsEach line in syslog.conf must specify:Correct
Incorrect
-
Question 14 of 89
14. Question
1 pointsWhich of the following selector settings in syslog.conf will select all kernel messages?Correct
Incorrect
-
Question 15 of 89
15. Question
1 pointsWhich of the following ports should be opened in the firewall to allow centralized logging?Correct
Incorrect
-
Question 16 of 89
16. Question
1 pointsWhich option to the logger command is used to specify a tag for the log entry?Correct
Incorrect
-
Question 17 of 89
17. Question
1 pointsWhich of the following logger command options will use the message specified in the temp_message file?Correct
Incorrect
-
Question 18 of 89
18. Question
1 pointsThe transfer of messages between machines and routing them to the correct destination is done by the Mail Transfer Agents (MTAs). True or False?Correct
Incorrect
-
Question 19 of 89
19. Question
1 pointsWhile accessing mail through the mail command interface, a user sees 5 new messages in his mailbox. Since the second message appears important, he would like to read that message first. Which mailcommand should be used?Correct
Incorrect
-
Question 20 of 89
20. Question
1 pointsA user is having trouble accessing the CDROM drive. He wants to send a message to the root user for help. Which of the following commands will create a new message that will be sent to the root user?Correct
Incorrect
-
Question 21 of 89
21. Question
1 pointsWhich of the following information is NOT available in the output from the mailq command?Correct
Incorrect
-
Question 22 of 89
22. Question
1 pointsDeborah created a new alias and added it to the mail alias file. Next, she tried to use the alias through the sendmail command, but the new alias is not working. What is the most likely reason?Correct
Incorrect
-
Question 23 of 89
23. Question
1 pointsA message was forwarded as per the .forward file found in the user’s home directory. What happens to the original message?Correct
Incorrect
-
Question 24 of 89
24. Question
1 pointsWhich of the following is NOT a core module of qmail?Correct
Incorrect
-
Question 25 of 89
25. Question
1 pointsCUPS stands for:Correct
Incorrect
-
Question 26 of 89
26. Question
1 pointsBy mistake, a user sends a file to print on a remote printer. The best course of action is:Correct
Incorrect
-
Question 27 of 89
27. Question
1 pointsA user reports to the system administrator that when printing a Japanese web page, he gets junk characters. Which of the following settings should the system administrator check in the CUPS configuration file?Correct
Incorrect
-
Question 28 of 89
28. Question
1 pointsCUPS can only be administered by:Correct
Incorrect
-
Question 29 of 89
29. Question
1 pointsWhich of the following statements regarding cupsd is FALSE?Correct
Incorrect
-
Question 30 of 89
30. Question
1 pointsWhich of the following statements about CUPS Print Queues is correct?Correct
Incorrect
-
Question 31 of 89
31. Question
1 pointsIdentify the correct command to view the status of all printers:Correct
Incorrect
-
Question 32 of 89
32. Question
1 pointsWhat is used to partition a network into different logical networks?Correct
Incorrect
-
Question 33 of 89
33. Question
1 pointsThe 4th octet is used for creating subnets for Class C networks. True or False?Correct
Incorrect
-
Question 34 of 89
34. Question
1 pointsWhich are the different types of IP addresses used on the Internet?Correct
Incorrect
-
Question 35 of 89
35. Question
1 pointsWhich of the following does not need a public IP address?Correct
Incorrect
-
Question 36 of 89
36. Question
1 pointsWhich file is used for mapping the application services to their respective port numbers?Correct
Incorrect
-
Question 37 of 89
37. Question
1 pointsWhich of the statements are not true about the routing table?Correct
Incorrect
-
Question 38 of 89
38. Question
1 pointsWhich protocol uses a sequence number mechanism to ensure ordered delivery of data?Correct
Incorrect
-
Question 39 of 89
39. Question
1 pointsWhat is the size of UDP headers?Correct
Incorrect
-
Question 40 of 89
40. Question
1 pointsFTP encrypts the user name and password entered by the user to log in. True or False?Correct
Incorrect
-
Question 41 of 89
41. Question
1 pointsThe _____ indicates the maximum number of IP routers that can route a packet.Correct
Incorrect
-
Question 42 of 89
42. Question
1 pointsThe system administrator tries to assign the value host*2014@SNG using the hostname command. What is the result of executing this command?Correct
Incorrect
-
Question 43 of 89
43. Question
1 pointsWhich of the configuration directives given below is not found in the \etc\resolv.conf file?Correct
Incorrect
-
Question 44 of 89
44. Question
1 pointsWhich file contains host and routing details of all configured network interfaces for Red Hat based systems?Correct
Incorrect
-
Question 45 of 89
45. Question
1 pointsWhich command is used to assign a netmask to eth1?Correct
Incorrect
-
Question 46 of 89
46. Question
1 pointsThe kernel’s routing table contains static and dynamic routes. True or False?Correct
Incorrect
-
Question 47 of 89
47. Question
1 pointsWhich of the following is not shown in the output of the ifconfig command?Correct
Incorrect
-
Question 48 of 89
48. Question
1 pointsWhich of the information listed below is not shown by the ping command?Correct
Incorrect
-
Question 49 of 89
49. Question
1 pointsWhich file will be used to enable DHCP based configuration on Red Hat based systems?Correct
Incorrect
-
Question 50 of 89
50. Question
1 pointsWhich API is used to query address information from the Name Service Switch (NSS) resolver?Correct
Incorrect
-
Question 51 of 89
51. Question
1 pointsHow is the DNS configuration file \etc\resolv.conf setup?Correct
Incorrect
-
Question 52 of 89
52. Question
1 pointsIf you are trying to login to a server and are unable to connect, which command would you use to verify network connectivity?Correct
Incorrect
-
Question 53 of 89
53. Question
1 pointsWhich command is used to restart the network service on Red Hat systems?Correct
Incorrect
-
Question 54 of 89
54. Question
1 pointsThe network interface disabled using the ifdown command will remain disabled after the system restarts. True or False?Correct
Incorrect
-
Question 55 of 89
55. Question
1 pointsWhich of the following is not a probable reason for the Host unreachable error?Correct
Incorrect
-
Question 56 of 89
56. Question
1 pointsWhich of the following is not a function of the netstat command?Correct
Incorrect
-
Question 57 of 89
57. Question
1 pointsWhich command can be used to find the ports that are listening for connections on a host?Correct
Incorrect
-
Question 58 of 89
58. Question
1 pointsYou have an existing interface eth0 and have now added a new interface eth1. You notice that the count of RX and TX packets is 0 in the output of ifconfig. What does this indicate?Correct
Incorrect
-
Question 59 of 89
59. Question
1 pointsYou log in to a server using telnet and bring down the eth0 interface (the only configured interface) using the ifdown command. What is the result of executing ifdown?Correct
Incorrect
-
Question 60 of 89
60. Question
1 pointsWhich command is used to keep track of suspicious connections?Correct
Incorrect
-
Question 61 of 89
61. Question
1 pointsThe Linux system assigns a default IP address to a newly installed NIC. True or False?Correct
Incorrect
-
Question 62 of 89
62. Question
1 pointsWhich of the following user ID types is not supported by Linux?Correct
Incorrect
-
Question 63 of 89
63. Question
1 pointsWhich of the following commands is used to find all files that have the SGID bit set?Correct
Incorrect
-
Question 64 of 89
64. Question
1 pointsWhy is the SUID/SGID bit set for the chage command?Correct
Incorrect
-
Question 65 of 89
65. Question
1 pointsWhich password is required for authentication to use sudo?Correct
Incorrect
-
Question 66 of 89
66. Question
1 pointsWhat type of information is stored in the \etc\passwd file?Correct
Incorrect
-
Question 67 of 89
67. Question
1 pointsWhat is the default value of the PASS_MAX_DAYS variable, which defines the maximum number of days before the user must change his password?Correct
Incorrect
-
Question 68 of 89
68. Question
1 pointsYou need to enforce an organization’s policy of mandatory password changes every 90 days. Which command can you use for this?Correct
Incorrect
-
Question 69 of 89
69. Question
1 pointsWhich of the following is not a state of ports as reported by nmap?Correct
Incorrect
-
Question 70 of 89
70. Question
1 pointsWhat is the purpose of the lsof command?Correct
Incorrect
-
Question 71 of 89
71. Question
1 pointsThe system administrator can enforce limits on the size of files created by users (in terms of number of blocks) using the ulimit command. True or False?Correct
Incorrect
-
Question 72 of 89
72. Question
1 pointsWhich super server has replaced inetd?Correct
Incorrect
-
Question 73 of 89
73. Question
1 pointsWhat happens when you login to a host using telnet?Correct
Incorrect
-
Question 74 of 89
74. Question
1 pointsThe two files used by TCP Wrappers to control access are _____:Correct
Incorrect
-
Question 75 of 89
75. Question
1 pointsWhat happens to the service request received by TCP Wrappers if the hosts.allow and hosts.deny files do not permit connection?Correct
Incorrect
-
Question 76 of 89
76. Question
1 pointsYou are using a server with two NICs, eth0 and eth1. You want to configure TCP Wrappers for using the telnet service on eth1 only in the hosts.allow file, this can be done by specifying ____:Correct
Incorrect
-
Question 77 of 89
77. Question
1 pointsThe \etc\nologin file is used to prevent all users from logging on to the system. True or False?Correct
Incorrect
-
Question 78 of 89
78. Question
1 pointsWhat is the PID of the init process?Correct
Incorrect
-
Question 79 of 89
79. Question
1 pointsWhich of the following is not a valid option for the scripts in the \etc\init.d directory?Correct
Incorrect
-
Question 80 of 89
80. Question
1 pointsWhat is the limitation of telnet from the security perspective?Correct
Incorrect
-
Question 81 of 89
81. Question
1 pointsWhat does the ~/.ssh/id_rsa file contain?Correct
Incorrect
-
Question 82 of 89
82. Question
1 pointsThe size of a DSA key is:Correct
Incorrect
-
Question 83 of 89
83. Question
1 pointsWhich of the following entries in \etc\ssh\sshd_config turn on host based authentication?Correct
Incorrect
-
Question 84 of 89
84. Question
1 pointsYou want to ensure that the ssh-agent is run for all users, which command can be used for this?Correct
Incorrect
-
Question 85 of 89
85. Question
1 pointsThe ssh-add program ran for user will, but his RSA identity files were not added, what could be the reason for this?Correct
Incorrect
-
Question 86 of 89
86. Question
1 pointsWhich of the following commands are used to setup SSH tunneling?Correct
Incorrect
-
Question 87 of 89
87. Question
1 pointsWhich is the default configuration file used by GnuPG?Correct
Incorrect
-
Question 88 of 89
88. Question
1 pointsWhich of the following algorithms are not supported by GnuPG for key generation?Correct
Incorrect
-
Question 89 of 89
89. Question
1 pointsWhich command is used to verify the signature of a package?Correct
Incorrect