Final Exam (Ch 9-18) Exam

  1. The transfer of messages between machines and routing them to the correct destination is done by the Mail Transfer Agents (MTAs).

    True or False?

    • True 
    • False
  2. A mail alias can be created for which of the following?

    • Command 
    • User name 
    • All of the above 
    • Email address
  3. The sendmail program refers to aliases defined in the _____________ file.

    • /etc/mail.rc 
    • /etc/mail/aliases.conf 
    • /etc/mail/aliases 
    • /etc/aliases
  4. Simple Mail Transfer Protocol (SMTP) uses port ____________ for communication.

    • 25
    • 23
    • 21
    • 22
  5. The ____________ file is used to configure the sendmail daemon.

    • /etc/mail.conf
    • /etc/rc.1
    • /etc/mail/sendmail.cf
    • /etc/mail.mail.c
  6. CUPS stands for:

    • Co-managed UNIX Printing System 
    • Common UNIX Printing System 
    • Current User Printing System 
    • Common User Printing System
  7. CUPS, an open source printing system, and available for Windows, Linux, and OS X was developed by ___________.

    • Apple 
    • DEC 
    • Microsoft 
    • University of California – Berkley
  8. CUPS retains the print job in the queue even after it is printed.

    True or False?

    • True 
    • False
  9. Which of the following changes is not possible by modifying various settings in the CUPS configuration file?

    • Port to listen for printer information packets 
    • Allow access from the specified host 
    • Maximum number of copies that a user can print per job 
    • Maximum number of printers that can be configured
  10. While the testprinter printer was printing a job and had several others in the queue, Joe runs the lpadmin -x testprinter command. The effect of the command is:

    • The current job is aborted 
    • The testprinter printer gets deleted 
    • All pending jobs in the queue are deleted 
    • All choices are valid
  11. The __________ utility can be used to take a printer offline for maintenance work so that new jobs do not queue on that printer.

    • offline 
    • print 
    • cupsreject 
    • queue
  12. What is used to partition a network into different logical networks?

    • Partitioning 
    • Masking 
    • Dividing 
    • Subnetting
  13. The 4th octet is used for creating subnets for Class C networks.

    True or False?

    • True 
    • False
  14. Given an IP address 10.11.15.8, the host ID derived from it is:

    • 10.11.15.0 
    • 11.15.8 
    • 255.11.15.8 
    • 10.11.15
  15. Which are the different types of IP addresses used on the Internet?

    • Private and Proxy 
    • Public and Proxy 
    • Public and Broadcast 
    • Public and Private
  16. Which is the standard port used for HTTP service?

    • 80 
    • 161 
    • 110 
    • 25
  17. The kernel’s routing table is managed by the IP protocol.

    True or False?

    • True 
    • False
  18. IPv6 addresses are based on _____:

    • 256 bits 
    • 128 bits 
    • 32 bits 
    • 64 bits
  19. Which file is referred to on systems where DNS is not set up?

    • /etc/network-hosts 
    • /etc/host-config 
    • /etc/hosts 
    • /etc/resolv.conf
  20. The _____ command is used to view the fully qualified domain name of the host.

    • hostname -f 
    • uname 
    • hostname 
    • cat /etc/hosts
  21. The /etc/nsswitch.conf file defines the order in which DNS and the /etc/hosts file are queried for host name information.

    True or False?

    • True 
    • False
  22. Which command is used to assign a netmask to the eth1 interface?

    • ifconfig eth1 -net-mask 255.255.255.224
    • ifconfig eth1 netmask 255.255.255.* 
    • ifconfig eth1 netmask 255.255.255.224 
    • ifconfig eth1 submask 255.255.255.224
  23. The kernel’s routing table contains static and dynamic routes.

    True or False?

    • True 
    • False
  24. The IP address of your host is 192.168.10.16. In order to connect to another host with the IP address of 192.86.74.16, your router will have to be connected to the subnets:

    • 192.168.10.0 and 255.255.255.0 
    • 192.168.1.1 and 192.86.74.0 
    • 192.168.10.0 and 192.86.74.0 
    • 255.255.255.0 and 192.86.74.0
  25. Which command can be used to verify the connectivity to a network after adding a new route?

    • resolvctl
    • ifconfig
    • ip up
    • ping
  26. Two types of clocks on Linux based systems are __________ and __________ clocks.

    (choose two)

    • System 
    • Software 
    • Hardware 
    • Firmware
  27. When the system boots, the system clock is set using the value of the hardware clock.

    True or False?

    • True
    • False
  28. Amount of time the hardware clock gains or loses on a regular rate is known as:

    • Clock cycle change 
    • Delta time 
    • Clock drift 
    • Clock gain
  29. The date command can only show the time in 0-23 hour format.

    True or False?

    • True 
    • False
  30. On RedHat-based systems, the ______________ file is used to configure the timezone of the system.

    • /etc/timezone 
    • /etc/localtime 
    • /etc/local 
    • /etc/time
  31. The /etc/ntp.conf file lists three servers for querying. Two of them return the time 10:54:23 while the third one shows a different time (i.e. 10:50:37). The system will use which of the return values?

    • It will use 10:50:37 if this is closer to the system’s current time 
    • It will use an average of the time 
    • It will use the time of the server that was queried first 
    • It will use 10:54:23 since this is what the majority of servers indicate
  32. To verify if a NTP server is available, which of the following commands should be executed?

    • ntpdate -t 
    • ntpdate
    • ntpdate -p
    • ntpdate -q
  33. The daemon that provides logging services for applications and programs is:

    • applog 
    • klogd 
    • syslogd 
    • SNMP
  34. Identify the valid rsyslog.conf selector facilities:

    (choose three)

    • cron
    • batch
    • news
    • kern
  35. A line in the rsyslog.conf file contains * in the actions part. What does this mean?

    • A message is displayed to everyone who is logged in 
    • There is no action specified 
    • A text message is written into the default log file 
    • An asterisk *, in place of a text message, will be displayed
  36. Which option to the logger command is used to specify a tag for the log entry?

    • -t 
    • -f 
    • -l 
    • -s
  37. Which of the following logger command options will use the message specified in the temp_message file?

    • logger -t temp message 
    • logger -f temp_message 
    • logger -s temp_message 
    • logger -l temp_message
  38. Which of the following settings in rsyslog.conf will enable rsyslogd to log messages of err priority level only?

    • mail.none
    • mail.err;mail.!alert 
    • mail.err 
    • mail.=err
  39. Which of the following user ID types is not supported by Linux?

    • Real 
    • Saved 
    • Effective 
    • File
  40. Which command is used to unset the SUID bit from a file?

    • touch 
    • chmod 
    • lsmod 
    • chage
  41. Which of the following commands is used to find all files that have the SGID bit set?

    • find / -type f -perm -2000 
    • find / -type f -p -2000 
    • find / -type f -mode -2000 
    • find / -type f -perm -4000
  42. The /etc/sudoers file should be edited using the ____ editor only.

    • vim 
    • edsudo 
    • xsudo 
    • visudo
  43. Which is the default user that su switches to?

    • As specified in /etc/sudoers 
    • No default user 
    • As specified in /etc/su.conf 
    • Root
  44. Which file stores the encrypted password?

    • /etc/passwd 
    • /etc/shadpaswd 
    • /etc/shadow 
    • /etc/password
  45. Which command is used to activate a newly created user account?

    • passwd
    • useradd
    • chmod
    • usermod
  46. Which command is used to keep the user’s account in a locked state?

    • passwd -L
    • chage -L
    • useradd -L
    • usermod -L
  47. You need to enforce an organization’s policy of mandatory password changes every 90 days. Which command can you use for this?

    • useradd -M 90 user_name 
    • chage -M 90 user_name 
    • usermod -M 90 user_name 
    • passwd -M 90 user_name
  48. Which command is used to set limits for user processes?

    • uname
    • plimit
    • ulimit
    • slimit
  49. Which of the following items cannot be regulated using ulimit?

    • Priority to run user process with 
    • Max. number of open files 
    • Max. number of database sessions 
    • Max. CPU time
  50. Which super server has replaced inetd?

    • ninetd 
    • xinetd
    • inetdver2
    • inet
  51. What is the main feature of a super server?

    • Run as a foreground process and initiate TCP connections to other hosts 
    • Run as a master process and service incoming TCP connections 
    • Run as a background process and initiate TCP connections to other hosts 
    • Run as a master process and listen for incoming TCP connections and then start the required process
  52. For configuring xinetd, the files _____ are used:

    • /etc/xinetd.conf or separate files for each service in the /etc/xinetd.d directory 
    • /etc/xinet.conf or separate files for each service in the /etc/xinetd.d directory 
    • /etc/xinetd.conf or separate files for each service in the /etc/net/xinetd.d directory 
    • /etc/xinet.conf or separate files for each service in the /etc/xinetd.d directory
  53. The xinetd daemon will automatically reload the configuration file if it is modified.

    True or False?

    • True 
    • False
  54. What method is used to apply TCP Wrappers to a network service?

    • Add entries of the service to the /etc/tcpwrap.conf file 
    • Compile using the /usr/lib/libwrap.a library 
    • Add the /usr/lib/libwrap.a library to the /etc/xinet.d directory 
    • Add the /usr/lib/libwrap.a file to the service’s directory
  55. You had initially added some hosts in the hosts.deny file to prevent access to FTP. You remove those hosts now because you need to grant them FTP access. How do you restart TCP Wrappers?

    • /etc/networking restart 
    • tcp_wrappers restart 
    • Restart of any service is not required 
    • ftpd restart
  56. What does the /etc/init.d directory contain?

    • Scripts for the different run levels 
    • Scripts for network services 
    • Scripts for initialization 
    • Scripts for the default run level
  57. Which file is used to configure SSH clients?

    • /etc/ssh/ssh_config
    • /etc/ssh_config
    • /etc/sshd_config
    • /etc/ssh/sshd_config
  58. The _____ command is used to generate SSH keys.

    • ssh-keygen
    • ssh-genkey
    • sshgen-key
    • sshkey-gen
  59. The size of a DSA key is:

    • Exactly 1024 bits 
    • Exactly 1000 bits 
    • Exactly 768 bits 
    • Exactly 2048 bits
  60. Which of the following entries in /etc/ssh/sshd_config turn on host based authentication?

    • HostbasedAuthentication yes
    • HostbasedAuthentication enable
    • Hostbased_Authentication yes
    • HostbasedAuthentication: yes
  61. Which of the following commands are used to setup SSH tunneling?

    • ssh -L
    • ssh -l
    • ssh -p
    • ssh -t
  62. Which is the default configuration file used by GnuPG?

    • ~/gnupg/gpg.conf
    • ~/.gnupg/.gpg.conf
    • ~/.gnu/gpg.conf
    • ~/.gnupg/gpg.conf
  63. Which command is used to restart the network service on Red Hat systems?

    • /etc/init.d/network resume
    • /etc/init.d/rc.d/network restart
    • /etc/network/interfaces restart
    • /etc/init.d/network restart
  64. Which of the following is not a function of the netstat command?

    • View the route used by packets to reach a given destination 
    • View port information 
    • View interface statistics 
    • View the kernel’s routing tables
  65. You log in to a server using telnet and bring down the eth0 interface (the only configured interface) using the ifdown command. What is the result of executing ifdown?

    • The eth0 interface will be disabled and the telnetsession will be terminated 
    • The eth0 interface will be disabled with a warning 
    • An error will be displayed that the eth0interface cannot be disabled 
    • The eth0interface will be disabled and the telnet session will continue
  66. Which of the information listed below is not shown by the ping command?

    • Packet Loss 
    • Route to the destination 
    • TTL 
    • Round-trip Time
  67. The ipcommand is useful for both configuration and control of network interfaces.

    True or False?

    • True
    • False
  68. The __________ is the default Desktop Environment on Debian distributions.

    • KDE 
    • Xfce 
    • Gnome 
    • VNC
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments