Final Exam (Ch 9-18) Exam
-
The transfer of messages between machines and routing them to the correct destination is done by the Mail Transfer Agents (MTAs).
True or False?
- True
- False
-
A mail alias can be created for which of the following?
- Command
- User name
- All of the above
- Email address
-
The
sendmail
program refers to aliases defined in the _____________ file./etc/mail.rc
/etc/mail/aliases.conf
/etc/mail/aliases
/etc/aliases
-
Simple Mail Transfer Protocol (SMTP) uses port ____________ for communication.
- 25
- 23
- 21
- 22
-
The ____________ file is used to configure the
sendmail
daemon./etc/mail.conf
/etc/rc.1
/etc/mail/sendmail.cf
/etc/mail.mail.c
-
CUPS stands for:
- Co-managed UNIX Printing System
- Common UNIX Printing System
- Current User Printing System
- Common User Printing System
-
CUPS, an open source printing system, and available for Windows, Linux, and OS X was developed by ___________.
- Apple
- DEC
- Microsoft
- University of California – Berkley
-
CUPS retains the print job in the queue even after it is printed.
True or False?
- True
- False
-
Which of the following changes is not possible by modifying various settings in the CUPS configuration file?
- Port to listen for printer information packets
- Allow access from the specified host
- Maximum number of copies that a user can print per job
- Maximum number of printers that can be configured
-
While the
testprinter
printer was printing a job and had several others in the queue, Joe runs thelpadmin -x testprinter
command. The effect of the command is:- The current job is aborted
- The
testprinter
printer gets deleted - All pending jobs in the queue are deleted
- All choices are valid
-
The __________ utility can be used to take a printer offline for maintenance work so that new jobs do not queue on that printer.
offline
print
cupsreject
queue
-
What is used to partition a network into different logical networks?
- Partitioning
- Masking
- Dividing
- Subnetting
-
The 4th octet is used for creating subnets for Class C networks.
True or False?
- True
- False
-
Given an IP address
10.11.15.8
, the host ID derived from it is:10.11.15.0
11.15.8
255.11.15.8
10.11.15
-
Which are the different types of IP addresses used on the Internet?
- Private and Proxy
- Public and Proxy
- Public and Broadcast
- Public and Private
-
Which is the standard port used for HTTP service?
- 80
- 161
- 110
- 25
-
The kernel’s routing table is managed by the IP protocol.
True or False?
- True
- False
-
IPv6 addresses are based on _____:
- 256 bits
- 128 bits
- 32 bits
- 64 bits
-
Which file is referred to on systems where DNS is not set up?
/etc/network-hosts
/etc/host-config
/etc/hosts
/etc/resolv.conf
-
The _____ command is used to view the fully qualified domain name of the host.
hostname -f
uname
hostname
cat /etc/hosts
-
The
/etc/nsswitch.conf
file defines the order in which DNS and the/etc/hosts
file are queried for host name information.True or False?
- True
- False
-
Which command is used to assign a netmask to the
eth1
interface?ifconfig eth1 -net-mask 255.255.255.224
ifconfig eth1 netmask 255.255.255.*
ifconfig eth1 netmask 255.255.255.224
ifconfig eth1 submask 255.255.255.224
-
The kernel’s routing table contains static and dynamic routes.
True or False?
- True
- False
-
The IP address of your host is 192.168.10.16. In order to connect to another host with the IP address of 192.86.74.16, your router will have to be connected to the subnets:
192.168.10.0
and255.255.255.0
192.168.1.1
and192.86.74.0
192.168.10.0
and192.86.74.0
255.255.255.0
and192.86.74.0
-
Which command can be used to verify the connectivity to a network after adding a new route?
resolvctl
ifconfig
ip up
ping
-
Two types of clocks on Linux based systems are __________ and __________ clocks.
(choose two)
- System
- Software
- Hardware
- Firmware
-
When the system boots, the system clock is set using the value of the hardware clock.
True or False?
- True
- False
-
Amount of time the hardware clock gains or loses on a regular rate is known as:
- Clock cycle change
- Delta time
- Clock drift
- Clock gain
-
The
date
command can only show the time in 0-23 hour format.True or False?
- True
- False
-
On RedHat-based systems, the ______________ file is used to configure the timezone of the system.
/etc/timezone
/etc/localtime
/etc/local
/etc/time
-
The
/etc/ntp.conf
file lists three servers for querying. Two of them return the time10:54:23
while the third one shows a different time(i.e. 10:50:37)
. The system will use which of the return values?- It will use 10:50:37 if this is closer to the system’s current time
- It will use an average of the time
- It will use the time of the server that was queried first
- It will use
10:54:23
since this is what the majority of servers indicate
-
To verify if a NTP server is available, which of the following commands should be executed?
ntpdate -t
ntpdate
ntpdate -p
ntpdate -q
-
The daemon that provides logging services for applications and programs is:
applog
klogd
syslogd
SNMP
-
Identify the valid
rsyslog.conf
selector facilities:(choose three)
cron
batch
news
kern
-
A line in the
rsyslog.conf
file contains*
in the actions part. What does this mean?- A message is displayed to everyone who is logged in
- There is no action specified
- A text message is written into the default log file
- An asterisk
*
, in place of a text message, will be displayed
-
Which option to the
logger
command is used to specify a tag for the log entry?-t
-f
-l
-s
-
Which of the following
logger
command options will use the message specified in thetemp_message
file?logger -t temp message
logger -f temp_message
logger -s temp_message
logger -l temp_message
-
Which of the following settings in
rsyslog.conf
will enablersyslogd
to log messages oferr
priority level only?mail.none
mail.err;mail.!alert
mail.err
mail.=err
-
Which of the following user ID types is not supported by Linux?
- Real
- Saved
- Effective
- File
-
Which command is used to unset the SUID bit from a file?
touch
chmod
lsmod
chage
-
Which of the following commands is used to find all files that have the SGID bit set?
find / -type f -perm -2000
find / -type f -p -2000
find / -type f -mode -2000
find / -type f -perm -4000
-
The
/etc/sudoers
file should be edited using the ____ editor only.vim
edsudo
xsudo
visudo
-
Which is the default user that
su
switches to?- As specified in
/etc/sudoers
- No default user
- As specified in
/etc/su.conf
- Root
- As specified in
-
Which file stores the encrypted password?
/etc/passwd
/etc/shadpaswd
/etc/shadow
/etc/password
-
Which command is used to activate a newly created user account?
passwd
useradd
chmod
usermod
-
Which command is used to keep the user’s account in a locked state?
passwd -L
chage -L
useradd -L
usermod -L
-
You need to enforce an organization’s policy of mandatory password changes every 90 days. Which command can you use for this?
useradd -M 90 user_name
chage -M 90 user_name
usermod -M 90 user_name
passwd -M 90 user_name
-
Which command is used to set limits for user processes?
uname
plimit
ulimit
slimit
-
Which of the following items cannot be regulated using
ulimit
?- Priority to run user process with
- Max. number of open files
- Max. number of database sessions
- Max. CPU time
-
Which super server has replaced
inetd
?ninetd
xinetd
inetdver2
inet
-
What is the main feature of a super server?
- Run as a foreground process and initiate TCP connections to other hosts
- Run as a master process and service incoming TCP connections
- Run as a background process and initiate TCP connections to other hosts
- Run as a master process and listen for incoming TCP connections and then start the required process
-
For configuring
xinetd
, the files _____ are used:/etc/xinetd.conf
or separate files for each service in the/etc/xinetd.d
directory/etc/xinet.conf
or separate files for each service in the/etc/xinetd.d
directory/etc/xinetd.conf
or separate files for each service in the/etc/net/xinetd.d
directory/etc/xinet.conf
or separate files for each service in the/etc/xinetd.d
directory
-
The
xinetd
daemon will automatically reload the configuration file if it is modified.True or False?
- True
- False
-
What method is used to apply TCP Wrappers to a network service?
- Add entries of the service to the
/etc/tcpwrap.conf
file - Compile using the
/usr/lib/libwrap.a
library - Add the
/usr/lib/libwrap.a
library to the/etc/xinet.d
directory - Add the
/usr/lib/libwrap.a
file to the service’s directory
- Add entries of the service to the
-
You had initially added some hosts in the
hosts.deny
file to prevent access to FTP. You remove those hosts now because you need to grant them FTP access. How do you restart TCP Wrappers?/etc/networking restart
tcp_wrappers restart
- Restart of any service is not required
ftpd restart
-
What does the
/etc/init.d
directory contain?- Scripts for the different run levels
- Scripts for network services
- Scripts for initialization
- Scripts for the default run level
-
Which file is used to configure SSH clients?
/etc/ssh/ssh_config
/etc/ssh_config
/etc/sshd_config
/etc/ssh/sshd_config
-
The _____ command is used to generate SSH keys.
ssh-keygen
ssh-genkey
sshgen-key
sshkey-gen
-
The size of a DSA key is:
- Exactly 1024 bits
- Exactly 1000 bits
- Exactly 768 bits
- Exactly 2048 bits
-
Which of the following entries in
/etc/ssh/sshd_config
turn on host based authentication?HostbasedAuthentication yes
HostbasedAuthentication enable
Hostbased_Authentication yes
HostbasedAuthentication: yes
-
Which of the following commands are used to setup SSH tunneling?
ssh -L
ssh -l
ssh -p
ssh -t
-
Which is the default configuration file used by GnuPG?
~/gnupg/gpg.conf
~/.gnupg/.gpg.conf
~/.gnu/gpg.conf
~/.gnupg/gpg.conf
-
Which command is used to restart the network service on Red Hat systems?
/etc/init.d/network resume
/etc/init.d/rc.d/network restart
/etc/network/interfaces restart
/etc/init.d/network restart
-
Which of the following is not a function of the
netstat
command?- View the route used by packets to reach a given destination
- View port information
- View interface statistics
- View the kernel’s routing tables
-
You log in to a server using telnet and bring down the
eth0
interface (the only configured interface) using theifdown
command. What is the result of executingifdown
?- The
eth0
interface will be disabled and thetelnet
session will be terminated - The
eth0
interface will be disabled with a warning - An error will be displayed that the
eth0
interface cannot be disabled - The
eth0
interface will be disabled and the telnet session will continue
- The
-
Which of the information listed below is not shown by the
ping
command?- Packet Loss
- Route to the destination
- TTL
- Round-trip Time
-
The
ip
command is useful for both configuration and control of network interfaces.True or False?
- True
- False
-
The __________ is the default Desktop Environment on Debian distributions.
- KDE
- Xfce
- Gnome
- VNC
Subscribe
0 Comments
Newest