Home / Operating System / Linux / Questions / Questions Linux!

Questions Linux!

LINUX II – III

  1. ____________ is an extremely flexible OS install program used by Redhat.
    1. Python
    2. Cobra
    3. Anaconda
    4. Viper                                                                             C
    5. __________ is the command to create the kickstart file .
      1. System-config-kickstart
      2. Config-system-kickstart
      3. Kickstart-config-system
      4. Kickstart-system-config                                                 A
      5. ___________ is name of the file used to create a minimal boot media.
        1. Minimal.iso
        2. Boot.iso
        3. Minboot.iso
        4. Kickstart.iso                                                                            B
        5. _________ is a method to boot the Linux installer over the network.
          1. DHCP
          2. TFTP
          3. Netboot
          4. PXE                                                                               B
          5. _________ is the entry specified in the startup bootline to obtain kickstart file from CDROM.
            1. ks=cdrom:dir/ks.cfg
            2. ks=cd:/dir/ks.cfg
            3. ks=cdrom:/dir/ks.cfg
            4. ks=cdrom://dir/ks.cfg                                                     C
            5. _________is a command – line interpreter and an interface between the user and the kenel.
              1. Operating system
              2. Shell
              3. Daemon
              4. Boot media                                                                    B
              5. How many vitual consoles exist in RHEL6 operating system __________?
                1. 5
                2. 2
                3. 6
                4. 10                                                                                  C
                5.  “ssh” uses private key for _________ messages between server and client.
                  1. Encrypting
                  2. Decryting
                  3. Encrypting and decrypting
                  4. Translating                                                                    B
                  5. What is the file name where the server ‘s public key is stored ________ ?
                    1. Ssh_key
                    2. Rsa_pub_key
                    3. Known_hosts
                    4. Public_file                                                                      C
                    5.  What is the command used to switch between users of a Linux machine ___?
                      1. Switch
                      2. Logout
                      3. Sigout
                      4. Su –                                                                               D
                      5.  _________ link cannot be used across filesystems but increases the link count.
                        1. Hard link
                        2. Sofl link
                        3. Simple link
                        4. Flexible link                                                                   A
                        5.  What information does an inode store regading a file ________.
                          1. File contents
                          2. File name
                          3. File pemissions
                          4. File inode number                                                                    C
                          5.  In VIM, which mode is used to save and quit the created file ________ .
                            1. Command mode
                            2. Visual mode
                            3. EX mode
                            4. Save mode                                                                     C
                            5.  Which utility is used by TAR to compress files _________ .
                              1. Tarzip
                              2. Winzip
                              3. Gunzip
                              4. Compzip                                                                        C
                              5.  What is character used in VIM command mode to switch to EX mode _____?
                                1. #
                                2. *
                                3. @
                                4. :                                                                                     D

 

 

  1.  ________ is the file descriptor        for the standard input stream.
    1. 0
    2. 1
    3. 2
    4. 3                                                                                    A
    5. ________ is the operator used for the standard error stream.
      1. 2<
      2. 2&
      3. 2>
      4. &2                                                                                 C
      5.  _________ are the pattern matches for “root”.
        1. Rott
        2. Roo
        3. Rooo
        4. Roottt                                                                            D
        5.  ________ are the pattern matches for “g[123]o[45]”
          1. G12o
          2. G123o4
          3. G2o5
          4. G13o45                                                                          C
          5.  ________ are the pattern matches for “G+”
            1. G
            2. GG
            3. G+
            4. G++                                                                               C
            5. How many bits is an IPv4 and IPv6 address respectively __________.
              1. 32 bits and 48 bits
              2. 64 bits and 128 bits
              3. 32 bits and 128 bits
              4. 48 bits and 64 bits                                                                   C
              5.  Which configuration file is used to verify the TCP/IP info of interface ith5 _______.
                1. /dev/sysconfig/network-cripts/ifcfg-eth5
                2. /var/lib/network-scripts/ifcfg-eth5
                3. /home/sysconfig/ network-scripts/ifcfg-eth5
                4. /etc/syscofig/ network-scripts/ifcfg-eth5                         D
                5.  What is command to view the kernel routing table ____________.
                  1. Kernel routing table
                  2. Ip route
                  3. Show ip route
                  4. Routingtable                                                                  B
                  5. What is the command used to restart network services daemon _________.
                    1. Service net  restart
                    2. Service networking  restart
                    3. Service network restart
                    4. Service networks restart                                                          C
                    5. What is name of the file that contains the Hostnameto IP address mappings ________ .
                      1. /etc/hosts
                      2. /etc/resolv.conf
                      3. /etc/sysconfig/network
                      4. /etc/hosts.cfg                                                                  A
                      5.  With the help of  “ blkid” utility, you can get some important information such as ______.
                        1. GUID
                        2. UUID
                        3. UID
                        4. ID                                                                                  B
                        5. At the time of bootup, __________ file store the information of all partition.
                          1. /etc/mnt
                          2. /mnt
                          3. /etc/fstab
                          4. /fstab                                                                                       C
                          5.  _________ utility enables you to create a LUKS encrypted partition.
                            1. Cryptosetup
                            2. Cryptsetup
                            3. Crypsetup
                            4. Luksformat                                                                              D
                            5.  With the help of ­­­­­­­­­­_____________ partition ID, you can create a Linux SWAP partition.
                              1. 80
                              2. 81
                              3. 82
                              4. 83                                                                                  C
                              5. With the help of ___________ command, you can setup a SWAP space.
                                1. Mkswap
                                2. Makeswap
                                3. Swapon
                                4. Swapmake                                                                     A
                                5. _________ is a storage pool that contains a set of physical volumes.
                                  1. Logical Volume
                                  2. Volume Group
                                  3. Physical Group
                                  4. Logical Group                                                                B

 

  1. __________ is a feature that is use to backup a logical volume.
    1. Snapshot
    2. Photoshot
    3. LVsnaps
    4. Snaps                                                                             A
    5. ________ is the default size of a physical extent allocated to the volume group media.
      1. 1 MiB
      2. 4 MiB
      3. 3 MiB
      4. 2 MiB                                                                            B
      5.  Is the command to grow a file system residing  in a partition.
        1. Resize 1fs
        2. Resize 4fs
        3. Resize 3fs
        4. Resize 2fs                                                                       D
        5. ________ is the order of implementing LVM on a Linux machine.
          1. VG_PV-LV
          2. PV-VG-LV
          3. PV-LV-VG
          4. LV-PV-VG                                                                    C
          5. _________ is a SMB/CIFS implementation used widely in almost all Linux distributions.
            1. NTFS
            2. EXT4
            3. Samba
            4. NetBios                                                                          C
            5. _________ is a service that perform auto mounting of NFS shares.
              1. Autofs
              2. Smb
              3. Nfs
              4. Cifs                                                                                A
              5. _________ is a default timeout value for maintaining automounts.
                1. 1 minute
                2. 3 minutes
                3. 5 minutes
                4. 7 minutes                                                                       C
                5. The name of the special directory that can be used by automounter is _________.
                  1. /automount
                  2. /mnt
                  3. /mount
                  4. /net                                                                                 D
                  5. ___________ is the command to view the shares on a NFS server.
                    1. Showshares –e ip
                    2. Showmount –e ip
                    3. Shownfs –e ip
                    4. Show –e ip                                                                     B
                    5. ___________ is the file location that contains passwords of every Linux used created.
                      1. /etc/passwd
                      2. /etc/shadow/
                      3. /etc/gpasswd/
                      4. /etc/gshadow/                                                                 B
                      5.  _________ is the command to alter password policies of user accounts stored in a Linux machine.
                        1. Chage
                        2. Change
                        3. Policyedit
                        4. Pwdpolicy                                                                      A
                        5.  ________ is the time period that must elapse before a user can change the password .
                          1. Inactive days
                          2. Warn days
                          3. Max days
                          4. Min days                                                                        D
                          5.  __________ is the user identification (UID) number of the root user.
                            1. 0
                            2. 1
                            3. 2
                            4. 3                                                                                    A
                            5.  ________ is the utility used to view the users associated with the processes running in a Linux
                              1. Us
                              2. Ls
                              3. Ps
                              4. Ks                                                                                  C
                              5. ___________ is the command that is used to setup LDAP client configuration.
                                1. System-config-ldap
                                2. System-config-urers
                                3. System-config-authentication
                                4. System-config-ldapusers                                                         C

 

 

 

 

  1.  ___________ is the protocol that is used to secure communication between LDAP server and client.

 

  1. SSL
  2. TLS
  3. MD5
  4. SHA-2                                                                           B
  5.  ________ is the utiliy that is used to retrieve information about users from the LDAP server database.
    1. Get
    2. Getentry
    3. Getent
    4. Getusers                                                                         C
    5.  _________ is the service that is automatically started affer the LDAP client setup completers.
      1. SLAPD
      2. SSSD
      3. SAMBA
      4. SSHD                                                                            B
      5.  ________ is an alternative to LDAP in the Microsoft network environment.
        1. Active Directory
        2. Exchange Server
        3. Microsoft Directory  protocol
        4. Passive Directory                                                                    A
        5.  The _________ option specifies the users that are members of the group.
          1. –C
          2. –M
          3. –A
          4. –N                                                                                  B
          5. _______ is the command to view the primary and supplementary groups of a user.
            1. Idusername
            2. Id
            3. Ids
            4. Ids username                                                                  B
            5.  ______ is the name of the file that stores all the group passwords in a Linux machine.
              1. /etc/passwd
              2. /etc/gshadow
              3. /etc/shadow
              4. /etc/group                                                                       B

 

 

  1. _______ is a type of ACL that provides inheritance to files inside a directory.
    1. Inherited ACL
    2. Access ACL
    3. Directory ACL
    4. Default ACL                                                                  D
    5.  _______ is the parameter that limits the maximum permissions assigned to users.
      1. Subnet Mask
      2. Wildcard Mask
      3. ACL Mask
      4. Net Mask                                                                       C
      5.  _________ is the SELinux mode that allows both protection and logging.
        1. Testing
        2. Logging
        3. Enforcing
        4. Checking                                                                        C
        5.  _______ is a name that is used by the SELinux policy to control processes interacting with files.
          1. Security tokens
          2. Security contexts
          3. Security lables
          4. Security tags                                                                  B
          5.  _________ are switches that alter the behavior of SELinux policies.
            1. Booleans
            2. Contexts
            3. Attributes
            4. Parameters                                                                     A
            5.  ________ is the location where SELinux violations are logged .
              1. /var/log/messages
              2. /var/log/semessages
              3. /var/log/audits
              4. /var/log                                                                          A
              5.  ________ is the command used to alter a SELinux Boolean.
                1. Setbool
                2. Setsebool
                3. Seboot
                4. Seboolean                                                                      B
                5.  Redhat distributes software packages with the help of  ______ format.
                  1. Tar
                  2. Rpm
                  3. Zip
                  4. Iso                                                                                  B
                  5.  During package installation, you will be automatically resolve dependency issues with the help of ________ package manager.
                    1. Yum
                    2. Installer
                    3. Packer
                    4. Rpm                                                                               A
                    5.  YUM utility utilizes the _______ extension for repository files.
                      1. .yum
                      2. .repo
                      3. .rpm
                      4. .yumrepo                                                                       B
                      5.  On a RHEL6 machine , the YUM repo files are located at ______ .
                        1. /etc/yum.config.d/repofiles
                        2. /etc/yum.repos.d/repo
                        3. /etc/repo/yum.repos.d
                        4. /etc/yum.repos.d                                                            D
                        5.  The _________ command enables you to modify the software on your system.
                          1. Yum
                          2. Repo
                          3. Rpm
                          4. Createrepo                                                                     A
                          5.  The background processes that a Linux machine uses to perform various tasks are known as _________ .
                            1. Services
                            2. Scripts
                            3. Daemons
                            4. Utilities                                                                          C
                            5.  With the help of ______ command, you can enable a service automatically at bootup.
                              1. Chkconfig
                              2. Bootconfig
                              3. Checkconfig
                              4. Serviceconfig                                                                 A
                              5.  The runlevel number ________ presents an X11 graphical interface in RHEL6.
                                1. 2
                                2. 6
                                3. 5
                                4. 1                                                                                    C

 

 

 

 

  1.  The server scripts which manage daemons are located in ________.
    1. /etc/rc/linit.d
    2. /etc/rc.d/linit
    3. /etc/rc/init
    4. /etc/rc.d/linit.d                                                                D
    5.  _________ commandenables to check the status of a service.
      1. Service
      2. Check
      3. Fsck
      4. Srvstatus                                                                       A
      5. _________ fields are used to match log events.
        1. Type and Facility
        2. Facility and Serverity
        3. Type and level
        4. Facility and Level                                                                    B
        5.  ________ is the parameter used to redirect logwatch reports as a mail to a specific user.
          1. MailTo=
          2. LogTo=
          3. SendTo=
          4. EmailTo=                                                                       A
          5. Logs are _________ to keep them from filling up the file system containing /var/log.
            1. Deleted
            2. Rotated
            3. Refreshed
            4. Quarantined                                                                   B
            5.  _________ is the serverity code for informational messages.
              1. 2
              2. 8
              3. 4
              4. 6                                                                                    B
              5.  ________ is the name of the filename where the rsyslogd rules are registered.
                1. /syslogd.conf
                2. /etc/syslogd.conf
                3. /etc/rsyslogd.conf
                4. /var/log/rsyslogd.conf                                                    C
                5. _________ is the command line utility used to view real-time statistics of running processes.
                  1. Bottom
                  2. Ps
                  3. Top
                  4. Nice                                                                               C
                  5.  _________ is the signal number used to forcibly kill a process that is misbehaving.
                    1. 9
                    2. 1
                    3. 15
                    4. 0                                                                                     A
                    5.  _________ is the command used to alter the priority of a running process.
                      1. Niceness
                      2. Nice
                      3. Priority
                      4. Alter                                                                              B
                      5.  _________ are the crontab entries for scheduling jobs for 5p.m on 27th March, a Sunday.
                        1. 05 00 27 03 00
                        2. 00 12 27 03 05
                        3. 05 27 03 00 17
                        4. 00 05 27 03 00                                                              B
                        5.  _________ is the utility used to perform task scheduling only once.
                          1. At
                          2. To
                          3. In
                          4. So                                                                                  A
                          5.  ________ is the command to view all the currently installed kernel modules.
                            1. Viewmod
                            2. Showmod
                            3. Lsmod
                            4. Dispmod                                                                        C
                            5.  ________are object files that are loaded dynamically into the kernet to enhance its features
                              1. Kernel enhancers
                              2. Kernel modules
                              3. Kernel tuners
                              4. Kernel parameters                                                                   B
                              5.  _________ is the kernel’s location in the Linux file system .
                                1. /root/kernel
                                2. /boot
                                3. /etc
                                4. /root                                                                               B
                                5.  _________ is the command that is used to view the kernel version number.
                                  1. Kname –r
                                  2. Lname –r
                                  3. Uname –r
                                  4. Gname –r                                                                       C
                                  5.  ________ is the command used to remove an old kernel installed in the Linux system.
                                    1. Yum remove kernel-<version no>
                                    2. Yum remove kernel
                                    3. Rpm –e kernel
                                    4. Rm –f kernel-<version no>                                            A
                                    5.  The __________ process used by the kernel manages all other processes.
                                      1. Initial
                                      2. Initramfs
                                      3. Init
                                      4. Initiator                                                                          B
                                      5.  The _______ enables you to select and start the OS .
                                        1. WORM
                                        2. GRUB
                                        3. BOOTMGR
                                        4. NTLDR                                                                          B
                                        5.  With the help of the ________ utility, you can fix inconsistencies in filesystems secondary to power outage.
                                          1. Fixer
                                          2. Fsck
                                          3. Repairfs
                                          4. Checkfs                                                                          B
                                          5.  The _________ provides the essential modules to kernel.
                                            1. Tempfs
                                            2. Initrd
                                            3. Initramfs
                                            4. Ext4                                                                               C
                                            5.  The integer representing the default run-level is stored by the ________ filename.
                                              1. /etc/inittab
                                              2. /etc/run-level
                                              3. /etc/run-code
                                              4. /etc/initlevel                                                                    A
                                              5.  __________ is a lightweight graphical tool for managing virtual machines.
                                                1. Virsh
                                                2. Virt-manager
                                                3. Virt-install
                                                4. Dguestfish                                                                      B

 

 

 

 

 

  1.  ________ tool is used to show the actual physical disk usage of virtual machines.
    1. Virt-cat
    2. Virt-df
    3. Virt-edit
    4. Virt-filesystem                                                               B
    5.  ________ tool lists files and directories inside a virtual machine.
      1. Virt-edit
      2. Virt-filesystem
      3. Cguestfish
      4. Virtls                                                                             D
      5. The virt-xml-validate tool is install as part of the ________ package.
        1. Libvirt-client
        2. Libguestfs-tools
        3. Virt-who
        4. Virt-viewer                                                                    A
        5.  The ________ tool helps in displaying the virtual system’s graphical console through SPICE and VNC.protocols.
          1. Virt-who
          2. Virt-top
          3. Virt-see
          4. Virt-viewer                                                                    D
          5.   The super user has a user ID ­­­­­­­­­­­___________.
            1. 0
            2. 1
            3. 2
            4. 3                                                                                    A
            5.  __________ command is used to modify sudo parameters.
              1. Su
              2. /usr/local/apps/check.pl
              3. Grep
              4. Visudo                                                                           D
              5.  KDC stands for _________________.
                1. Key Domain Center
                2. Key Data Center
                3. Key Distribution Center
                4. Kerberos Distribution Center                                        C

 

 

 

 

  1.  __________ is a feature of Linux operating system that is used for access control and authentication purposes.
    1. Sudo
    2. Kerberos
    3. Super user
    4. SSSD (system security services deamon)                      D
    5.  HBAC stands for __________
      1. Host Based Access Control
      2. Host Before Access Control
      3. Host Based Authentication Control
      4. Hot Based Access Control                                             A
      5.  Password aging configuration is possible with _______ command in Linux
        1. chage
        2. grep
        3. tail
        4. diff’                                                                              A
        5.  ‘Grep’ which stands for ‘global – regular expression – print’ is a multi-purpose utility for ________
          1. File comparison
          2. File creation
          3. File search
          4. File display                                                                              C
          5.  Which of the following command is used to extract fields from files?
            1. grep
            2. tail
            3. cut
            4. diff’                                                                              C
            5.  Which of the control operator mentioned below is used in ‘ Pipeline and Redirection’?
              1. ‘&’
              2. ‘*’
              3. ‘|&’
              4. ‘@’                                                                                C
              5.  File pemission can be changed through which of the following command?
                1. chmod 777 branching’
                2. ./looping
                3. ./branching
                4. chmod 777 looping’                                                     A (D)

 

 

 

 

  1.  PGP stands for ___________
    1. Pretty Good Program
    2. Pretty Good Privacy
    3. Pretty Good Policy
    4. Pretty Good Party                                                                   B
    5.  How can you encrypt an e-mail message to someone ?
      1. Using his/her public key
      2. Using his/her private key
      3. Using a combined key
      4. Using pass key                                                              A
      5.  Which of the following command is used to encrypt a single file?
        1. $ gpg –c file_name.gpg
        2. $ gpg –s file_name.ext
        3. $ file_name.ext
        4. $ gpg –c file_name.ext                                                   D
        5.  What will be the extansion of a binary encrypted file?
          1. .bin
          2. .asc
          3. .gpg
          4. .bna                                                                                B
          5.  What is the command used to verify an ASCII file by checking the signature?
            1. $ gpg –verify private.asc
            2. $ gpg –verify doc.asc
            3. $ asc – verify private.doc.gpg
            4. $ bin –verify private.doc.asc                                         A(B)
            5.  The ______ command is used to query the database of installed packages.
              1. Rmp –q
              2. Rmp-w
              3. Rmp-t
              4. Rmp-d                                                                           A
              5.  You need to used the _________ command to build an RPM.
                1. Rpm-q
                2. Rmpbuild
                3. Rmpfind
                4. Rpmbuild                                                                       D

 

 

 

 

  1.  Which of the following tab enables you to search the internet for packages by name, summary and architecture?
    1. Package listing
    2. Rpmfind
    3. Distributions
    4. Behavior                                                                        B
    5.  ‘Download dir’ is used ____________.
      1. To set the metadata server
      2. To provide settings and options that corresponds to the web find feature.
      3. To specify proxies for use with HTTP and FTP transfer user name and password.
      4. To specify the location for file saving.                           D
      5.  Which of the following command is used to remove a software package with YUM?
        1. $ yum remove
        2. & yum remove
        3. # yum remove
        4. * yum remove                                                                C
        5.  Tcpdump command captures and displays ________ .
          1. The packet header on a particular network interface or on all interface
          2. The packet message and body of the packet
          3. Network traffic between two intranet
          4. Network analysis and graph                                          A
          5. $ vnstattr command line used to __________
            1. To calculate the packet size
            2. To calculate network traffic
            3. To troubleshoot the network problem
            4. None of the above                                                                   B
            5.  Which of the following problems is caused by Denial of Service Attack?
              1. Increases the server traffic
              2. Disconnects the network
              3. Passes virus to system to corrupt the file system
              4. None of the above                                                                   A
              5.  Nmap or  Network Mapper is a command line utility program that
                1. Scans a machine to identify network traffic
                2. Scans a machine for TCP open ports and increases the server traffic
                3. Scans a machine for single port on a machine
                4. Scans a machine for single port on a machine and disconnects the net work                    A
                5. Command nmap –s Thostname is used to
                  1. Scan a machine for TCP address
                  2. Scan a machine for TCP open ports
                  3. Scan a machine for single port
                  4. Scan a machine for multiple ports                                 B
                  5.  The _______ command is used to display all the aliases that are up and running.
                    1. Ifconfig
                    2. Ip-config
                    3. Ping ipconfig
                    4. None of above                                                               A
                    5.  To restart the network, execute the command __________ .
                      1. $ service restart
                      2. $ service network restart
                      3. $ network restart
                      4. $ restart service network                                                         B
                      5.  The minimum value for the parameter semmsl is __________.
                        1. 350
                        2. 100
                        3. 250
                        4. 128                                                                                A
                        5.  The ___________ command will display the current routing table.
                          1. # ip route table show
                          2. # ip route display
                          3. # show ip route
                          4. # ip route show                                                              D
                          5.  The correct syntax for the IP route command is ______________.
                            1. Ip route add {DEVICE} via {IP} dev {NETWORK}
                            2. Ip route add {NETWORK} via {IP} dev {DEVICE}
                            3. Ip route add {DEV} via {IP} NETWORK {DEVICE}
                            4. Ip route add {NETWORK} via {dev} {DEVICE}                  B
                            5.  You can see list of well-known port numbers in the ___________ .
                              1. /etc/port file
                              2. /etc/services file
                              3. /etc/config file
                              4. /bin/service file                                                               B
                              5.  ‘ssh_exchange_identification: Connection closed by remote host’ this error message is due to __________
                                1. Port already in use by another application
                                2. Typing in an incorrect forwarding address
                                3. Specifying an incorrect port on which the server should listen.
                                4. None of the bove                                                           C
                                5.  ________ is the table for handling network packets.
                                  1. Netfilter table
                                  2. Filter table
                                  3. NAT table
                                  4. Mangle table                                                                  B

 

  1. Which one of the following built-in chain is not considered for NAT table:
    1. PREROUTING – Alters network packets when they arrve.
    2. INPUT – Alters network packets targeted for the host.
    3. OUTPUT – Alters locally –gennerated network packets before they are sent out.
    4. POSTROUTING – Alters network packets before they are sent out.                   B
    5. Whoch one of he following command is not used to Flush all rules.
      1. Iptables –F
      2. Iptables –t nat _F
      3. Iptables –t chain –F
      4. Iptables –t mangle –F                                                    C
      5. The file _____________ has configuration of NTP parameters.
        1. /etc/ntp.conf
        2. /bin/ntp.conf
        3. /ntp/etc.conf
        4. /etc/ntpd.conf                                                                 A
        5. Consider the following statement

A .         Network time protocol (NTP) provide algorithms and defines messages for the asynchronization of time

  1. NTP server systems fall into three categories: primary reference servers, secondary reference servers, and backup servers.
    1. Both are true
    2. Both are false
    3. A is true B is false
    4. Bis true A is false                                                                    C
    5. The command used to start, stop and resart the NTP daemon.
      1. ntpd start’; ‘ntpd stop’ and ‘ntpd restart’
      2. start’; ‘stop’ and ‘restart’
      3. ntp start’; ‘ntp stop’ and ‘ntp restart’
      4. None of above                                                               A
      5.  The command to query the NTP server daemon.
        1. ntpq –p’ command
        2. ntpqu’ command
        3. ntpq –k’ command
        4. None of above                                                               A
        5.  The main source of configuration information is the ________ file of the NTP server installation.
          1. Ntpq –p
          2. Ntp.conf
          3. Etc.conf
          4. Ntpd.                                                                             B
          5. Sar-n NFSD is used to _________.
            1. Display network device failure statistics
            2. Display NFS client activities
            3. Display NFS server activities
            4. Display sockets in use for IPv4                                               C

 

  1.  __________ is used to remove files that are not accessed for a specified number of hours.
    1. Disk scan
    2. Tmpwatch
    3. Logrotate
    4. None of above                                                               B
    5.  The –q, –quiet tag of tmpwatch will ___________ .
      1. Not remove files owned by the user, which can be a user name or numeric user ID.
      2. Report only fatal errors.
      3. Not attempt to remove directories, even if they are empty.
      4. Remove all file types, not just regular files, symbolic links, and directories.                                                                                                           B
      5.  All configuration directives must be specified one per line and must start with the _______
        1. Ampersand sign (&)
        2. Dollar sign ($)
        3. Asterisk sign (*)
        4. Dollar with hyphen sign ($ -)                                         B
        5.  Every rule line consists of two fields, which are __________ .
          1. a ‘ selector field’ and a ‘filter field’
          2. a ‘ command field’ and an ‘action field’
          3. a ‘ selector field’ and an ‘action field’
          4. a ‘ message field’ and an ‘action field’                           C
          5.  LUKS stands for ____________.
            1. Linux Unified Key Setup
            2. Linux Unified Kernal  Setup
            3. Linux Unified Key Session
            4. Linux Ubentu Key Setup                                                         A
            5.  In order to have the module loaded at boot you will need to add a script to the ______ .
              1. /etc/sysconfig/modules directory
              2. /etc/config/modules directory
              3. /etc/tmp/modules directory
              4. /etc/sysconfig/module directory                                               A

 

  1.  The partition with encryption is done using to command ___________
    1. Lukesetup cryptFormat/dev/vdb1
    2. Cryptsetup luks Format/dev/vdb1
    3. Cryptsetup Format/dev/vdb1
    4. Setup luks Format/dev/vdb1                                         B
    5.  This disk will be formatted with the EXT4 file system using the command _______.
      1. Mkfs.ext4 /dev/mapper/LuksTEST
      2. Cryptsetup.ext4 /dev/mapper/LuksTEST
      3. Setup.ext4 /dev/mapper/LuksTEST
      4. Mkfs.ext /dev/mapper/LuksTEST                                 A
      5.  _________ command check on your system if you have iSCSI rpm installed.
        1. #rpm –qh iSCSI
        2. #rpm –qe iSCSI
        3. #rpm –qs iSCSI
        4. #rpm –qa iSCSI                                                             D
        5.  TLS stands for __________________ .
          1. Transfer Layer Security
          2. Transport Layer Security
          3. Total Layer Security
          4. Time Layer Security                                                      B
          5.  To get certificate signed by a certificate authority, you have to create a _______
            1. CLI
            2. CGI
            3. SSL
            4. CSR                                                                               D
            5.  For the secure web server, the document root will be located at ___________ .
              1. /var/www/SSL.
              2. /var/www/html
              3. /etc/httpd/conf.d/ssl.conf
              4. /var/www/SSL/Passneeded                                            A
              5.  You have to remove the keys and the certificate before using the ________ command.
                1. Makefile
                2. Openssl
                3. Creategenkey
                4. Htpasswd                                                                      A

 

 

 

 

  1.  While generating a certificate request you have to enter the server’s host name for ______
    1. Locality name
    2. Organization unit name
    3. Common name
    4. Organization name                                                         C
    5.  A ________ directive is used to configure the virtual host
      1. NameVirtualHost
      2. Scrip.Alias
      3. Configure Virtualhost
      4. authName                                                                      A
      5.  the CGI scripts are given the extension _________.
        1. .igi
        2. .cgi
        3. .gi
        4. .igc                                                                                 B

 

  1.  The _______ is used only for the first time when you use htpasswd to create a new file.
    1. –b flag
    2. –a flag
    3. –c flag
    4. –r flag                                                                            C
    5.  The ________ directive informs the server of the protocol to be used for authentication purposes.
      1. authName
      2. AuthUserFile
      3. Require
      4. Auth Type                                                                     D
      5.  You need to use the ________ directive to restrict users to their specific groups.
        1. Require
        2. AuthName
        3. AuthType
        4. AuthUserFile                                                                 A
        5.  Which command is used to check whether the imap package is installed or not?
          1. Rpm –q imap
          2. Rpm –ivhimap
          3. Rpm –p imap
          4. Rpm –r imap                                                                 A

 

 

  1.  Which command is used to give out all the external mail to the gateway machine?
    1. Define (‘HOST’, ‘gateway.abdc.com’)
    2. Define (‘SMART_HOST’, ‘gateway,abdc.com’)
    3. Define (‘SMART_HOST’, ‘gateway.abdc.com’)
    4. include (‘SMARTHOST’, ‘gateway.abdc.com’)            C
    5.  which command is used to obtain the installation status of the imap-2000-9 rpm package?
      1. Rpm –as | grep –iimap
      2. Rpm –at | grep –iimap
      3. Rpm –av | grep –iimap
      4. Rpm –aq | grep –iimap                                                  D
      5. Which command is used to remove the delay caused by IDENT by reducing the time to 1 second?
        1. O Timeout .ident=1s
        2. O Ident.timeout=1s
        3. Timeout .ident=1s
        4. Ident.timeout=1s                                                            A
        5. Which command is used to restart xinetd?
          1. Xinetd restart
          2. Service restart
          3. Service xinetd restart
          4. Service xinet restart                                                       C
          5. Email server or servers responsible for the domain name are identified by _____ record.
            1. A
            2. MX
            3. CNAME
            4. AAAA                                                                           B
            5. _________ is an authoritative DNS server that fetches the zone record from the DNS master server .
              1. Primary server
              2. Slave server
              3. Recursive server
              4. Caching – only server                                                    D
              5. A ________ record contains all the IP addresses in reverse format with suffix as – addr.arpa.
                1. Canonical Name
                2. Pointer
                3. Service
                4. Name server                                                                            B
                5. A simple utility called ________ is used the perform DNS lookups as well as to convert website names to IP addresses and vice versa.
                  1. Dig
                  2. Libersolv.so
                  3. /etc/hosts
                  4. Host                                                                               A
                  5. The program called _________ in BIND responds to all your DNS queries from remote machines.
                    1. Named
                    2. Recursive
                    3. Slave
                    4. Canonical name                                                             A
                    5. What does fstab represent ?
                      1. File tab
                      2. File system tab
                      3. File table
                      4. File sharing table                                                           B
                      5. Which option will give permission only to root use to edit NFS server?
                        1. Root_squash
                        2. No_root_squash
                        3. no_allsquash
                        4. allsquash                                                                        A
                        5. Which command is used to display the NFS server export list?
                          1. Showmount
                          2. f-h
                          3. showmount –e
                          4. howmount –h                                                                C
                          5. To make permanent mounting for NFS share file, we should add an entry in _______ file .
                            1. /fs/tab
                            2. Etc/fstab/nfs
                            3. //etc/crontab
                            4. /etc/fstab                                                                        D
                            5. Which command is used to check if all packages are installed for NFS configuration?
                              1. Rpm-qa | grep nfs
                              2. Showmount
                              3. df –e
                              4. grep nfs                                                                          A

 

 

  1. which of the following is used to provide shared access to files and printers?
    1. CIFS
    2. AFS
    3. CUPS
    4. SMB                                                                              A
    5. What is the name of the bash’s builtin command ?
      1. Smbclient
      2. Smbspool
      3. Sudo
      4. Enble                                                                             A
      5. The _________ command sets up the shared windows printer by giving the uresname, password, netbois name and printer name as a single parameter.
        1. Cifs
        2. Lpadmin
        3. Sbin
        4. Smb                                                                               D
        5. Which of the following command refers to the path to a local directory where the share is mounted?
          1. Smbspoll
          2. Smbclinet
          3. Mount.cifs
          4. Mount_point                                                                 C
          5. Which of the following is a Kernel code?
            1. Bin
            2. Sbin
            3. Cifs
            4. Smb                                                                               C
            5. The protocol for tansfering large files over the internet is _________ .
              1. FTP
              2. SMTP
              3. HTTP
              4. SNMP                                                                            A
              5. The protocol used for electronic mail transter is _________ .
                1. FTP
                2. SMTP
                3. HTTP
                4. SNMP                                                                            B

 

 

 

 

  1. In an FTP, data is sent in the form of __________.
    1. Clear text
    2. Encrypted text
    3. Binary text
    4. None of the above                                                                   A
    5. Which one of the following is an FTP server?
      1. XU-FTPD
      2. WU- FTPD
      3. LU- FTPD
      4. KU- FTPD                                                                     B
      5. Which one of the following is not a feature of vsftpd?
        1. PAM intergration
        2. Per-user configuration
        3. SSL decryption
        4. Bandwidth throtting                                                      C
        5. __________ files should be checked first if you are unsure of where the errors occurred.
          1. Error
          2. Configuration
          3. Etc/error
          4. Bootup
          5. IPv4 and IPv6 network interface can be configured using the _________ option.
            1. Configure rescue interface
            2. Configure network interface
            3. Rescue network
            4. Rescue interface                                                             B
            5. Which of the following command is used to boot your system in rescue mode?
              1. Boot: linux rescue
              2. Boot: linux single
              3. Boot: linux emergency
              4. Boot: linux double                                                         A
              5. The ________ command is used if the filesystem is mounted and you want to make your machine as the root partition.
                1. Boot: linux rescue
                2. /mnt/sysimage
                3. Chroot/mnt/sysimage
                4. Mount –t ext3 /dev/hda5/foo                                         C
                5. The ________ option is disabled as the serial port does not display graphics.
                  1. Splashimage
                  2. Splash.image.xml
                  3. Image<file-type>          d. Splash-image                    A
Print Friendly

About dongpolice

Check Also

cài đặt ffmeg

Cài đặt FFmpeg + FFmpeg-PHP +Lame + Ruby + Mplayer + Mencoder + flv2tool

Cài đặt FFmpeg + FFmpeg-PHP +Lame + Ruby + Mplayer + Mencoder + flv2tool Để …