We have sent an email with your new password.


Linux+ Networking Chapter 12

20 Questions  I  By Ajeff
Linux+ Networking Chapter 12
Linux+ Networking Chapter 12

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Which option to the rpm command can be used to remove a package from the system?
A.
B.
C.
D.
2.  Which of the following commands can be used to list the files contained within an installed RPM package?
A.
B.
C.
D.
3.  Which of the following commands creates an archive?
A.
B.
C.
D.
4.  Which of the following represents the first nonrewinding SCSI tape device on a system?
A.
B.
C.
D.
5.  Which file contains full and incremental back-up information for use with the dump/restore utility?
A.
B.
C.
D.
6.  Which of the following commands extracts an archive?
A.
B.
C.
D.
7.  Which dump level indicates a full backup?
A.
B.
C.
D.
8.  What is the most common method for obtaining Linux software?
A.
B.
C.
D.
9.  You have created a full backup and four incremental backups. In which order must you restore these backups?
A.
B.
C.
D.
10.  When compiling source code into a binary program, which command does the compiling using the GNU C Compiler?
A.
B.
C.
D.
11.  The bzip2 and gzip utilities use similar compression algorithms. True or False?
A.
B.
12.  The -9 option to the gzip utility results in a higher compression ratio. True or False?
A.
B.
13.  Which of the following commands can be used to list detailed information about a package such as its installation date and license?
A.
B.
C.
D.
14.  When compiling source code into a binary program, which command copies compiled binary files to the correct location on the filesystem?
A.
B.
C.
D.
15.  Compiling and installing software from source code updates a central database that can then be used to query and remove the software at a later time. True or False?
A.
B.
16.  When compiling source code into a binary program, which command performs a system check and creates the Makefile?
A.
B.
C.
D.
17.  Files that have been compressed using the compress utility typically have the ________ extension.
A.
B.
C.
D.
18.  Most source code is available on the Internet in tarball format. True or False?
A.
B.
19.  Which filename extension indicates a tarball?
A.
B.
C.
D.
20.  Source code is commonly obtained in Red Hat Package Manager format. True or False?
A.
B.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz