Linux Essentials Chapter 3 Exam

Last Updated on April 29, 2018 by Admin

Linux Essentials Chapter 3 Exam Answer

  1. Question ID 307

    Which of the following is true about graphical mode?

    (choose three)

    • You cannot use your mouse
    • You have menus and tools to help you find what you are looking for
    • After login, you are provided with a command prompt
    • After login, you are provided with a desktop
    • You access this mode by logging into a graphical display
  2. Question ID 308

    Which of the following is provided by a graphical interface that isn’t normally provided to a non graphical interface?

    (choose four)

    • Windows
    • Desktop
    • Menus
    • Popups
    • Shell
  3.  

  4. Question ID 309

    A server is likely to be running in graphical mode.

    True or False?

    • True
    • False
  5. Question ID 310

    In graphical mode, you can get to a shell by running which applications?

    (choose two)

    • gbash
    • guiterm
    • terminal
    • xterm
    • xconsole
  6.  

  7. Question ID 311

    Which of the following are traits of a multiuser operating system?

    (choose three)

    • Each user can only log in once per day
    • Users can protect their information from other users
    • Many users can log in simultaneously with a unique account
    • An administrative user gets a dedicated CPU
    • Resources are shared between users
  8. Question ID 312

    Virtualization means:

    • A single host can be split up into multiple guests
    • A user can connect to a server over the network and use a virtual console
    • A machine can swap memory to disk
    • Many users can share one hard drive
    • Two users get different memory spaces on the same machine
  9.  

  10. Question ID 313

    In virtualization, what are the host and guest?

    (choose two)

    • The host is the machine that runs the virtual machines
    • A host is a virtual machine
    • The terms can be used interchangeably
    • A guest is a virtual machine
    • The guest is the machine that runs the virtual machines
  11. Question ID 314

    Which of the following are traits of cloud computing?

    (choose two)

    • You own the hardware but pay for it over time
    • You pay for what you use
    • Only Linux works in cloud computing
    • You don’t have to worry about performance any more
    • The resources are virtualized
  12.  

  13. Question ID 315

    If you wanted to write a report that was to be printed, you would probably use:

    • Chrome
    • A wiki
    • Adobe Flash
    • LibreOffice
    • Firefox
  14. Question ID 316

    If you want to store logins and passwords for different websites in a secure manner, you could use:

    • Firefox
    • A LibreOffice Document
    • KeePassX
    • A sticky note on your monitor
    • A text file in your home directory
  15.  

  16. Question ID 317

    You can configure your computer to check for updates automatically.

    True or False?

    • True
    • False
  17. Question ID 319

    Two components that provide the ability to implement a firewall include:

    (choose two)

    • ipfw
    • iptables
    • Cerberus
    • Uncomplicated Firewall
    • gufw
  18. Question ID 322

    What are tradeoffs of increasing the level of privacy you have in your web browser?

    (choose two)

    • Sites may not work properly
    • Images won’t load properly
    • You may get viruses
    • Websites may load slower
    • You may have to explicitly permit some cookies to be saved
  19. Question ID 323

    Which of the following is a tool that helps you anonymize your Internet browsing?

    • The onion router
    • iptables
    • AnonFirefox
    • Web proxy
    • CookieCleaner
  20. Question ID 324

    Social network “like” buttons can track your activity across the Internet.

    True or False?

    • True
    • False
  21. Question ID 325

    Which of the following are properties of a strong password?

    (choose three)

    • A mix of upper and lower case
    • Includes symbols
    • Long so that it can be reused on multiple sites
    • At least 10 characters long
    • Based on easy to remember items like birthdays
  22. Question ID 326

    What can be done to prevent remote people from running programs on your computer?

    (choose two)

    • Use strong passwords on all user accounts
    • Block all cookies
    • Turn on a firewall
    • Don’t use wireless networks – only wired
    • Block third party cookies