Introduction to Linux II Final Comprehensive Exam (Chapter 1-19)

Last Updated on March 6, 2018 by Admin

Introduction to Linux II Final Comprehensive Exam (Chapter 1-19)

  1. 1. Question

    The reference time that the system time is calculated from is known as:

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  2. 2. Question
    The date command is used for:
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  3. 3. Question

    The precision provided by NTP is on the order of:

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  4. 4. Question
    Which of the following options, when used with the ntpd command, will perform a one time synchronization:
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  5. 5. Question
    The /etc/ntp.conf file lists three servers for querying. Two of them return the time 10:54:23 while the third one shows a different time (i.e. 10:50:37). The system will use which of the return values?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  6. 6. Question
    Two NTP servers are used by ntpd; one runs Stratum-2 clock while the other uses Stratum-4. Which one is considered to be more accurate?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  7. 7. Question

    To verify if a NTP server is available, which of the following commands should be executed?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  8. 8. Question

    The daemon that provides logging services for applications and programs is:

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  9. 9. Question

    System administrators can use logs for all of the following, except:

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  10. 10. Question

    Which of the following commands is not used to view log files on a Linux operating system?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  11. 11. Question
    Errors relating scheduled cron jobs can be found at which of the following locations?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  12. 12. Question

    The system administrator is seeing a surge in the number of logged messages. She checked the process accounting setting and it is not turned on. What else could be the reason for the sudden increase?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  13. 13. Question
    Each line in syslog.conf must specify:
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  14. 14. Question
    Which of the following selector settings in syslog.conf will select all kernel messages?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  15. 15. Question

    Which of the following ports should be opened in the firewall to allow centralized logging?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  16. 16. Question
    Which option to the logger command is used to specify a tag for the log entry?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  17. 17. Question
    Which of the following logger command options will use the message specified in the temp_message file?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  18. 18. Question

    The transfer of messages between machines and routing them to the correct destination is done by the Mail Transfer Agents (MTAs).
    True or False?

    • 1. 
    • 2. 
  19. 19. Question
    While accessing mail through the mail command interface, a user sees 5 new messages in his mailbox. Since the second message appears important, he would like to read that message first. Which mailcommand should be used?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  20. 20. Question

    A user is having trouble accessing the CDROM drive. He wants to send a message to the root user for help. Which of the following commands will create a new message that will be sent to the root user?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  21. 21. Question
    Which of the following information is NOT available in the output from the mailq command?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  22. 22. Question
    Deborah created a new alias and added it to the mail alias file. Next, she tried to use the alias through the sendmail command, but the new alias is not working. What is the most likely reason?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  23. 23. Question
    A message was forwarded as per the .forward file found in the user’s home directory. What happens to the original message?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  24. 24. Question
    Which of the following is NOT a core module of qmail?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  25. 25. Question

    CUPS stands for:

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  26. 26. Question

    By mistake, a user sends a file to print on a remote printer. The best course of action is:

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  27. 27. Question

    A user reports to the system administrator that when printing a Japanese web page, he gets junk characters. Which of the following settings should the system administrator check in the CUPS configuration file?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  28. 28. Question

    CUPS can only be administered by:

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  29. 29. Question
    Which of the following statements regarding cupsd is FALSE?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  30. 30. Question

    Which of the following statements about CUPS Print Queues is correct?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  31. 31. Question

    Identify the correct command to view the status of all printers:

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  32. 32. Question

    What is used to partition a network into different logical networks?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  33. 33. Question

    The 4th octet is used for creating subnets for Class C networks.
    True or False?

    • 1. 
    • 2. 
  34. 34. Question

    Which are the different types of IP addresses used on the Internet?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  35. 35. Question

    Which of the following does not need a public IP address?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  36. 36. Question

    Which file is used for mapping the application services to their respective port numbers?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  37. 37. Question

    Which of the statements are not true about the routing table?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  38. 38. Question

    Which protocol uses a sequence number mechanism to ensure ordered delivery of data?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  39. 39. Question

    What is the size of UDP headers?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  40. 40. Question

    FTP encrypts the user name and password entered by the user to log in.
    True or False?

    • 1. 
    • 2. 
  41. 41. Question

    The _____ indicates the maximum number of IP routers that can route a packet.

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  42. 42. Question
    The system administrator tries to assign the value host*2014@SNG using the hostname command. What is the result of executing this command?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  43. 43. Question
    Which of the configuration directives given below is not found in the /etc/resolv.conf file?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  44. 44. Question

    Which file contains host and routing details of all configured network interfaces for Red Hat based systems?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  45. 45. Question
    Which command is used to assign a netmask to eth1?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  46. 46. Question

    The kernel’s routing table contains static and dynamic routes.
    True or False?

    • 1. 
    • 2. 
  47. 47. Question
    Which of the following is not shown in the output of the ifconfig command?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  48. 48. Question
    Which of the information listed below is not shown by the ping command?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  49. 49. Question

    Which file will be used to enable DHCP based configuration on Red Hat based systems?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  50. 50. Question

    Which API is used to query address information from the Name Service Switch (NSS) resolver?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  51. 51. Question
    How is the DNS configuration file /etc/resolv.conf setup?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  52. 52. Question

    If you are trying to login to a server and are unable to connect, which command would you use to verify network connectivity?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  53. 53. Question

    Which command is used to restart the network service on Red Hat systems?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  54. 54. Question
    The network interface disabled using the ifdown command will remain disabled after the system restarts.

    True or False?

    • 1. 
    • 2. 
  55. 55. Question
    Which of the following is not a probable reason for the Host unreachable error?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  56. 56. Question
    Which of the following is not a function of the netstat command?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  57. 57. Question

    Which command can be used to find the ports that are listening for connections on a host?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  58. 58. Question
    You have an existing interface eth0 and have now added a new interface eth1. You notice that the count of RX and TX packets is 0 in the output of ifconfig. What does this indicate?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  59. 59. Question
    You log in to a server using telnet and bring down the eth0 interface (the only configured interface) using the ifdown command. What is the result of executing ifdown?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  60. 60. Question

    Which command is used to keep track of suspicious connections?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  61. 61. Question

    The Linux system assigns a default IP address to a newly installed NIC.
    True or False?

    • 1. 
    • 2. 
  62. 62. Question

    Which of the following user ID types is not supported by Linux?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  63. 63. Question

    Which of the following commands is used to find all files that have the SGID bit set?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  64. 64. Question
    Why is the SUID/SGID bit set for the chage command?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  65. 65. Question
    Which password is required for authentication to use sudo?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  66. 66. Question
    What type of information is stored in the /etc/passwd file?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  67. 67. Question
    What is the default value of the PASS_MAX_DAYS variable, which defines the maximum number of days before the user must change his password?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  68. 68. Question

    You need to enforce an organization’s policy of mandatory password changes every 90 days. Which command can you use for this?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  69. 69. Question
    Which of the following is not a state of ports as reported by nmap?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  70. 70. Question
    What is the purpose of the lsof command?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  71. 71. Question
    The system administrator can enforce limits on the size of files created by users (in terms of number of blocks) using the ulimit command.

    True or False?

    • 1. 
    • 2. 
  72. 72. Question
    Which super server has replaced inetd?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  73. 73. Question

    What happens when you login to a host using telnet?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  74. 74. Question

    The two files used by TCP Wrappers to control access are _____:

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  75. 75. Question
    What happens to the service request received by TCP Wrappers if the hosts.allow and hosts.deny files do not permit connection?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  76. 76. Question
    You are using a server with two NICs, eth0 and eth1. You want to configure TCP Wrappers for using the telnet service on eth1 only in the hosts.allow file, this can be done by specifying ____:
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  77. 77. Question
    The /etc/nologin file is used to prevent all users from logging on to the system.

    True or False?

    • 1. 
    • 2. 
  78. 78. Question
    What is the PID of the init process?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  79. 79. Question
    What does the command, init 6, do?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  80. 80. Question
    Which of the following is not a valid option for the scripts in the /etc/init.d directory?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  81. 81. Question

    What is the limitation of telnet from the security perspective?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  82. 82. Question
    What does the ~/.ssh/id_rsa file contain?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  83. 83. Question

    The size of a DSA key is:

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  84. 84. Question
    Which of the following entries in /etc/ssh/sshd_config turn on host based authentication?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  85. 85. Question
    You want to ensure that the ssh-agent is run for all users, which command can be used for this?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  86. 86. Question
    The ssh-add program ran for user will, but his RSA identity files were not added, what could be the reason for this?
    • 1. 
    • 2. 
    • 3. 
    • 4. 
  87. 87. Question

    Which of the following commands are used to setup SSH tunneling?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  88. 88. Question

    Which is the default configuration file used by GnuPG?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  89. 89. Question

    Which of the following algorithms are not supported by GnuPG for key generation?

    • 1. 
    • 2. 
    • 3. 
    • 4. 
  90. 90. Question

    Which command is used to verify the signature of a package?

    • 1. 
    • 2. 
    • 3. 
    • 4.