Linux+ Networking Chapter 11

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Ajeff
A
Ajeff
Community Contributor
Quizzes Created: 39 | Total Attempts: 59,871
| Attempts: 689 | Questions: 19
Please wait...
Question 1 / 19
0 %
0/100
Score 0/100
1. You can lock a user account by changing the default login shell to an invalid shell in /etc/passwd. True or False?

Explanation

By changing the default login shell to an invalid shell in the /etc/passwd file, it is possible to lock a user account. This means that when the user tries to log in, the system will not be able to find a valid shell to execute, effectively preventing access to the account. Therefore, the statement is true.

Submit
Please wait...
About This Quiz
Linux+ Networking Chapter 11 - Quiz

This quiz covers key concepts in Linux+ Networking, focusing on system administration tasks such as managing print jobs, user accounts, and authentication processes.

2. Which command can you use to lock a user account?

Explanation

The correct answer is "usermod –L username". This command is used to lock a user account. By adding the "-L" option followed by the username, the user's account will be locked, preventing them from logging in.

Submit
3. Which command would you use to unlock a user account?

Explanation

The correct answer is "usermod -U username". This command is used to unlock a user account. The "-U" option is used to unlock the account, and "username" is the name of the user account that needs to be unlocked.

Submit
4. You can clear a log file simply by redirecting nothing in to it. True or False?

Explanation

Redirecting nothing into a log file means that there is no input being sent to the log file, effectively clearing its contents. Therefore, the statement is true.

Submit
5. What is the name of the utility used to rotate log files?

Explanation

Logrotate is the name of the utility used to rotate log files. This utility is commonly used in Linux systems to manage log files by automatically compressing, removing, and renaming them to prevent them from becoming too large or taking up too much disk space. Logrotate allows for the efficient management of log files, ensuring that they are organized and easily accessible for troubleshooting and analysis purposes.

Submit
6. UIDs and GIDs are unique to the system and once used can never be reused. True or False?

Explanation

False. UIDs and GIDs are unique identifiers assigned to users and groups in a system. While it is generally true that they are unique and should not be reused, there are cases where UIDs and GIDs can be recycled. For example, when a user or group is deleted, their UID or GID may become available for reuse in the future. Therefore, it is not accurate to say that UIDs and GIDs can never be reused.

Submit
7. What is the background process responsible for printing on Red Hat Fedora Linux?

Explanation

cupsd is the correct answer because it stands for Common Unix Printing System Daemon, which is responsible for managing the printing process on Red Hat Fedora Linux. It is a background process that handles print requests, manages print queues, and communicates with the printer to ensure successful printing. lp, lpd, and lpstat are not the correct answers as they are either specific commands or other components related to printing, but not the main background process responsible for printing.

Submit
8. What is the name of the file that contains a listing of all users on the system and their home directories?

Explanation

The correct answer is /etc/passwd. This file is a system file in Unix-like operating systems that contains a listing of all users on the system and their home directories. It stores essential information about each user, such as their username, user ID, group ID, home directory, and default shell. It is used by the system for user authentication and to determine various user properties and permissions.

Submit
9. You use lpstat and determine that a user named User1 has placed two large print jobs in the queue for Printer1 that have yet to start printing. They have print job IDs of Printer1-17 and Printer1-21, respectively. Which command would you use to remove these two jobs from the print queue?

Explanation

The correct answer is "cancel Printer1-17 Printer1-21". This command is used to cancel or remove specific print jobs from the print queue. By specifying the job IDs "Printer1-17" and "Printer1-21", the command will only cancel these two jobs and not any others in the queue.

Submit
10. When a printer is disabled, ___________.

Explanation

When a printer is disabled, the print queue still accepts jobs and holds them in the queue until the printer is enabled again. This means that even though the printer is not currently available to print, the print jobs are still being accepted and stored for later printing.

Submit
11. When a printer is rejecting requests,____________.

Explanation

When a printer is rejecting requests, the print queue does not accept jobs and sends a message to the user noting that the printer is unavailable. This means that any print jobs sent to the printer will not be processed and the user will be notified of the printer's unavailability.

Submit
12. Which command is used to delete a user account?

Explanation

The correct answer is "userdel username". This command is used to delete a user account in a Linux system. By using this command, the specified username will be removed from the system, along with their home directory and any other associated files.

Submit
13. The process of sending print jobs from the print queue to the printer is called?

Explanation

The correct answer is "spooling". Spooling is the process of sending print jobs from the print queue to the printer. It involves temporarily storing the print jobs in a buffer or a spool file before they are sent to the printer for printing. This allows multiple print jobs to be queued and processed in the order they were received, improving efficiency and preventing print jobs from being lost or overwritten.

Submit
14. When referring to the /etc/syslog.conf file, __________ specifies information from a certain area of the system, whereas _________ is the level of importance of that information.

Explanation

In the /etc/syslog.conf file, the "facility" specifies information from a certain area of the system, while the "priority" is the level of importance of that information.

Submit
15. Which file contains default information such as UID and GID ranges and minimum password length to be used at user creation?

Explanation

The file /etc/login.defs contains default information such as UID and GID ranges and the minimum password length to be used at user creation. This file is used by the system to set the default values for these parameters when a new user is created. It provides a centralized location for managing these default settings, allowing for consistent configuration across the system.

Submit
16. Along with a listing of user accounts,  the /etc/passwd file also contains information on account expiry. True or False?

Explanation

The statement is false. The /etc/passwd file does not contain information on account expiry. It only contains a listing of user accounts and their associated information such as user ID, group ID, home directory, and login shell. Account expiry information is typically stored in a separate file or database.

Submit
17. Which command can be used to alter the primary group associated with a given user temporarily?

Explanation

The command "newgrp" can be used to alter the primary group associated with a given user temporarily. This command allows the user to switch to a different group, making it their primary group for the duration of the session. This can be useful when a user needs temporary access to files or resources that are only accessible by a specific group.

Submit
18. What is the name used to describe a user providing a user name and password to log in to a system?

Explanation

Authorization is the correct answer because it refers to the process of granting or denying access to a user based on their provided credentials, such as a username and password. This step occurs after the user has been authenticated, which confirms their identity. Authorization determines the level of access and permissions the user has within the system once they have successfully logged in.

Submit
19. Which command can be used to send a print job to the default printer named Printer1? (Choose all that apply.)

Explanation

The command "lp -d Printer1 file" can be used to send a print job to the default printer named Printer1. The "-d" option is used to specify the printer name. The command "lp file" can also be used to send a print job without specifying a printer, which will send the job to the default printer.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 05, 2009
    Quiz Created by
    Ajeff
Cancel
  • All
    All (19)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
You can lock a user account by changing the ...
Which command can you use to lock a user account?
Which command would you use to unlock a user account?
You can clear a log file simply by redirecting ...
What is the name of the utility used to rotate log files?
UIDs and GIDs are unique to the system and once ...
What is the background process responsible for ...
What is the name of the file that contains a ...
You use lpstat and determine that a user named ...
When a printer is disabled, ___________.
When a printer is rejecting requests,____________.
Which command is used to delete a user account?
The process of sending print jobs from the print ...
When referring to the /etc/syslog.conf file, ...
Which file contains default information such as ...
Along with a listing of user accounts,  the /etc/passwd file also...
Which command can be used to alter the primary ...
What is the name used to describe a user ...
Which command can be used to send a print job to ...
Alert!

Advertisement