We have sent an email with your new password.


Linux+ Networking Chapter 11

20 Questions  I  By Ajeff
Linux+ Networking Chapter 11
Linux+ Networking Chapter 11

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue?
A.
B.
C.
D.
2.  Along with a listing of user accounts,  the /etc/passwd file also contains information on account expiry. True or False?
A.
B.
3.  Which command can be used to alter the primary group associated with a given user temporarily?
A.
B.
C.
D.
4.  The process of sending print jobs from the print queue to the printer is called?
A.
B.
C.
D.
5.  What is the name of the utility used to rotate log files?
A.
B.
C.
D.
6.  When a printer is rejecting requests,____________.
A.
B.
C.
D.
7.  UIDs and GIDs are unique to the system and once used can never be reused. True or False?
A.
B.
8.  What is the background process responsible for printing on Red Hat Fedora Linux?
A.
B.
C.
D.
9.  Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.)
A.
B.
C.
D.
10.  Most log files on the system are found in which directory?
A.
B.
C.
D.
11.  When referring to the /etc/syslog.conf file, __________ specifies information from a certain area of the system, whereas _________ is the level of importance of that information.
A.
B.
C.
D.
12.  When a printer is disabled, ___________.
A.
B.
C.
D.
13.  What is the name of the file that contains a listing of all users on the system and their home directories?
A.
B.
C.
D.
14.  You can clear a log file simply by redirecting nothing in to it. True or False?
A.
B.
15.  What is the name used to describe a user providing a user name and password to log in to a system?
A.
B.
C.
D.
16.  Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?
A.
B.
C.
D.
17.  Which command can you use to lock a user account?
A.
B.
C.
D.
18.  Which command would you use to unlock a user account?
A.
B.
C.
D.
19.  Which command is used to delete a user account?
A.
B.
C.
D.
20.  You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?
A.
B.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz