Last Updated on March 6, 2018 by Admin
Introduction to Linux II Final Comprehensive Exam (Chapter 1-19)
-
1. Question
The reference time that the system time is calculated from is known as:
- 1.
- 2.
- 3.
- 4.
-
2. Question
Thedate
command is used for:- 1.
- 2.
- 3.
- 4.
-
3. Question
The precision provided by NTP is on the order of:
- 1.
- 2.
- 3.
- 4.
-
4. Question
Which of the following options, when used with thentpd
command, will perform a one time synchronization:- 1.
- 2.
- 3.
- 4.
-
5. Question
The/etc/ntp.conf
file lists three servers for querying. Two of them return the time10:54:23
while the third one shows a different time (i.e.10:50:37
). The system will use which of the return values?- 1.
- 2.
- 3.
- 4.
-
6. Question
Two NTP servers are used byntpd
; one runs Stratum-2 clock while the other uses Stratum-4. Which one is considered to be more accurate?- 1.
- 2.
- 3.
- 4.
-
7. Question
To verify if a NTP server is available, which of the following commands should be executed?
- 1.
- 2.
- 3.
- 4.
-
8. Question
The daemon that provides logging services for applications and programs is:
- 1.
- 2.
- 3.
- 4.
-
9. Question
System administrators can use logs for all of the following, except:
- 1.
- 2.
- 3.
- 4.
-
10. Question
Which of the following commands is not used to view log files on a Linux operating system?
- 1.
- 2.
- 3.
- 4.
-
11. Question
Errors relating scheduledcron
jobs can be found at which of the following locations?- 1.
- 2.
- 3.
- 4.
-
12. Question
The system administrator is seeing a surge in the number of logged messages. She checked the process accounting setting and it is not turned on. What else could be the reason for the sudden increase?
- 1.
- 2.
- 3.
- 4.
-
13. Question
Each line insyslog.conf
must specify:- 1.
- 2.
- 3.
- 4.
-
14. Question
Which of the following selector settings insyslog.conf
will select all kernel messages?- 1.
- 2.
- 3.
- 4.
-
15. Question
Which of the following ports should be opened in the firewall to allow centralized logging?
- 1.
- 2.
- 3.
- 4.
-
16. Question
Which option to thelogger
command is used to specify a tag for the log entry?- 1.
- 2.
- 3.
- 4.
-
17. Question
Which of the followinglogger
command options will use the message specified in thetemp_message
file?- 1.
- 2.
- 3.
- 4.
-
18. Question
The transfer of messages between machines and routing them to the correct destination is done by the Mail Transfer Agents (MTAs).
True or False?- 1.
- 2.
-
19. Question
While accessing mail through themail
command interface, a user sees 5 new messages in his mailbox. Since the second message appears important, he would like to read that message first. Whichmail
command should be used?- 1.
- 2.
- 3.
- 4.
-
20. Question
A user is having trouble accessing the CDROM drive. He wants to send a message to the root user for help. Which of the following commands will create a new message that will be sent to the root user?
- 1.
- 2.
- 3.
- 4.
-
21. Question
Which of the following information is NOT available in the output from themailq
command?- 1.
- 2.
- 3.
- 4.
-
22. Question
Deborah created a new alias and added it to the mail alias file. Next, she tried to use the alias through thesendmail
command, but the new alias is not working. What is the most likely reason?- 1.
- 2.
- 3.
- 4.
-
23. Question
A message was forwarded as per the.forward
file found in the user’s home directory. What happens to the original message?- 1.
- 2.
- 3.
- 4.
-
24. Question
Which of the following is NOT a core module ofqmail
?- 1.
- 2.
- 3.
- 4.
-
25. Question
CUPS stands for:
- 1.
- 2.
- 3.
- 4.
-
26. Question
By mistake, a user sends a file to print on a remote printer. The best course of action is:
- 1.
- 2.
- 3.
- 4.
-
27. Question
A user reports to the system administrator that when printing a Japanese web page, he gets junk characters. Which of the following settings should the system administrator check in the CUPS configuration file?
- 1.
- 2.
- 3.
- 4.
-
28. Question
CUPS can only be administered by:
- 1.
- 2.
- 3.
- 4.
-
29. Question
Which of the following statements regardingcupsd
is FALSE?- 1.
- 2.
- 3.
- 4.
-
30. Question
Which of the following statements about CUPS Print Queues is correct?
- 1.
- 2.
- 3.
- 4.
-
31. Question
Identify the correct command to view the status of all printers:
- 1.
- 2.
- 3.
- 4.
-
32. Question
What is used to partition a network into different logical networks?
- 1.
- 2.
- 3.
- 4.
-
33. Question
The 4th octet is used for creating subnets for Class C networks.
True or False?- 1.
- 2.
-
34. Question
Which are the different types of IP addresses used on the Internet?
- 1.
- 2.
- 3.
- 4.
-
35. Question
Which of the following does not need a public IP address?
- 1.
- 2.
- 3.
- 4.
-
36. Question
Which file is used for mapping the application services to their respective port numbers?
- 1.
- 2.
- 3.
- 4.
-
37. Question
Which of the statements are not true about the routing table?
- 1.
- 2.
- 3.
- 4.
-
38. Question
Which protocol uses a sequence number mechanism to ensure ordered delivery of data?
- 1.
- 2.
- 3.
- 4.
-
39. Question
What is the size of UDP headers?
- 1.
- 2.
- 3.
- 4.
-
40. Question
FTP encrypts the user name and password entered by the user to log in.
True or False?- 1.
- 2.
-
41. Question
The _____ indicates the maximum number of IP routers that can route a packet.
- 1.
- 2.
- 3.
- 4.
-
42. Question
The system administrator tries to assign the valuehost*2014@SNG
using thehostname
command. What is the result of executing this command?- 1.
- 2.
- 3.
- 4.
-
43. Question
Which of the configuration directives given below is not found in the/etc/resolv.conf
file?- 1.
- 2.
- 3.
- 4.
-
44. Question
Which file contains host and routing details of all configured network interfaces for Red Hat based systems?
- 1.
- 2.
- 3.
- 4.
-
45. Question
Which command is used to assign a netmask toeth1
?- 1.
- 2.
- 3.
- 4.
-
46. Question
The kernel’s routing table contains static and dynamic routes.
True or False?- 1.
- 2.
-
47. Question
Which of the following is not shown in the output of theifconfig
command?- 1.
- 2.
- 3.
- 4.
-
48. Question
Which of the information listed below is not shown by theping
command?- 1.
- 2.
- 3.
- 4.
-
49. Question
Which file will be used to enable DHCP based configuration on Red Hat based systems?
- 1.
- 2.
- 3.
- 4.
-
50. Question
Which API is used to query address information from the Name Service Switch (NSS) resolver?
- 1.
- 2.
- 3.
- 4.
-
51. Question
How is the DNS configuration file/etc/resolv.conf
setup?- 1.
- 2.
- 3.
- 4.
-
52. Question
If you are trying to login to a server and are unable to connect, which command would you use to verify network connectivity?
- 1.
- 2.
- 3.
- 4.
-
53. Question
Which command is used to restart the network service on Red Hat systems?
- 1.
- 2.
- 3.
- 4.
-
54. Question
The network interface disabled using theifdown
command will remain disabled after the system restarts.True or False?
- 1.
- 2.
-
55. Question
Which of the following is not a probable reason for theHost unreachable
error?- 1.
- 2.
- 3.
- 4.
-
56. Question
Which of the following is not a function of thenetstat
command?- 1.
- 2.
- 3.
- 4.
-
57. Question
Which command can be used to find the ports that are listening for connections on a host?
- 1.
- 2.
- 3.
- 4.
-
58. Question
You have an existing interfaceeth0
and have now added a new interfaceeth1
. You notice that the count of RX and TX packets is 0 in the output ofifconfig
. What does this indicate?- 1.
- 2.
- 3.
- 4.
-
59. Question
You log in to a server using telnet and bring down theeth0
interface (the only configured interface) using theifdown
command. What is the result of executingifdown
?- 1.
- 2.
- 3.
- 4.
-
60. Question
Which command is used to keep track of suspicious connections?
- 1.
- 2.
- 3.
- 4.
-
61. Question
The Linux system assigns a default IP address to a newly installed NIC.
True or False?- 1.
- 2.
-
62. Question
Which of the following user ID types is not supported by Linux?
- 1.
- 2.
- 3.
- 4.
-
63. Question
Which of the following commands is used to find all files that have the SGID bit set?
- 1.
- 2.
- 3.
- 4.
-
64. Question
Why is the SUID/SGID bit set for thechage
command?- 1.
- 2.
- 3.
- 4.
-
65. Question
Which password is required for authentication to usesudo
?- 1.
- 2.
- 3.
- 4.
-
66. Question
What type of information is stored in the/etc/passwd
file?- 1.
- 2.
- 3.
- 4.
-
67. Question
What is the default value of thePASS_MAX_DAYS
variable, which defines the maximum number of days before the user must change his password?- 1.
- 2.
- 3.
- 4.
-
68. Question
You need to enforce an organization’s policy of mandatory password changes every 90 days. Which command can you use for this?
- 1.
- 2.
- 3.
- 4.
-
69. Question
Which of the following is not a state of ports as reported bynmap
?- 1.
- 2.
- 3.
- 4.
-
70. Question
What is the purpose of thelsof
command?- 1.
- 2.
- 3.
- 4.
-
71. Question
The system administrator can enforce limits on the size of files created by users (in terms of number of blocks) using theulimit
command.True or False?
- 1.
- 2.
-
72. Question
Which super server has replacedinetd
?- 1.
- 2.
- 3.
- 4.
-
73. Question
What happens when you login to a host using telnet?
- 1.
- 2.
- 3.
- 4.
-
74. Question
The two files used by TCP Wrappers to control access are _____:
- 1.
- 2.
- 3.
- 4.
-
75. Question
What happens to the service request received by TCP Wrappers if thehosts.allow
andhosts.deny
files do not permit connection?- 1.
- 2.
- 3.
- 4.
-
76. Question
You are using a server with two NICs,eth0
andeth1
. You want to configure TCP Wrappers for using the telnet service oneth1
only in thehosts.allow
file, this can be done by specifying ____:- 1.
- 2.
- 3.
- 4.
-
77. Question
The/etc/nologin
file is used to prevent all users from logging on to the system.True or False?
- 1.
- 2.
-
78. Question
What is the PID of theinit
process?- 1.
- 2.
- 3.
- 4.
-
79. Question
What does the command,init 6
, do?- 1.
- 2.
- 3.
- 4.
-
80. Question
Which of the following is not a valid option for the scripts in the/etc/init.d
directory?- 1.
- 2.
- 3.
- 4.
-
81. Question
What is the limitation of telnet from the security perspective?
- 1.
- 2.
- 3.
- 4.
-
82. Question
What does the~/.ssh/id_rsa
file contain?- 1.
- 2.
- 3.
- 4.
-
83. Question
The size of a DSA key is:
- 1.
- 2.
- 3.
- 4.
-
84. Question
Which of the following entries in/etc/ssh/sshd_config
turn on host based authentication?- 1.
- 2.
- 3.
- 4.
-
85. Question
You want to ensure that thessh-agent
is run for all users, which command can be used for this?- 1.
- 2.
- 3.
- 4.
-
86. Question
Thessh-add
program ran for userwill
, but his RSA identity files were not added, what could be the reason for this?- 1.
- 2.
- 3.
- 4.
-
87. Question
Which of the following commands are used to setup SSH tunneling?
- 1.
- 2.
- 3.
- 4.
-
88. Question
Which is the default configuration file used by GnuPG?
- 1.
- 2.
- 3.
- 4.
-
89. Question
Which of the following algorithms are not supported by GnuPG for key generation?
- 1.
- 2.
- 3.
- 4.
-
90. Question
Which command is used to verify the signature of a package?
- 1.
- 2.
- 3.
- 4.