Linux Networking Quiz 4

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Svolore
S
Svolore
Community Contributor
Quizzes Created: 12 | Total Attempts: 11,132
Questions: 32 | Attempts: 176

SettingsSettingsSettings
Linux Networking Quizzes & Trivia

Linux Networking quiz 4 from class.


Questions and Answers
  • 1. 

    The .nofinger file created to hide user activities should not be visible to the finger daemon.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The .nofinger file created to hide user activities should be visible to the finger daemon. This is because the finger daemon is responsible for providing information about users on a system, and if the .nofinger file is hidden from it, it would defeat the purpose of hiding user activities. Therefore, the correct answer is False.

    Rate this question:

  • 2. 

    The term ____ refers to sending an e-mail message to an e-mail list.

    • A.

      Subscribing

    • B.

      Polling

    • C.

      Scanning

    • D.

      Posting

    Correct Answer
    D. Posting
    Explanation
    The term "posting" refers to sending an e-mail message to an e-mail list. When someone posts an e-mail, they are sending it to a specific group of recipients who have subscribed to that particular e-mail list. This allows for efficient and targeted communication, as the message will only be received by those who have expressed interest in the topic or content of the e-mail list.

    Rate this question:

  • 3. 

    By default, the syslogd daemon supports the remote transfer of log messages.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The syslogd daemon is a system utility that collects and manages log messages on a Unix or Unix-like operating system. By default, it is configured to support the remote transfer of log messages. This means that log messages can be sent from one system to another over a network, allowing for centralized logging and analysis of logs from multiple systems. Therefore, the statement "By default, the syslogd daemon supports the remote transfer of log messages" is true.

    Rate this question:

  • 4. 

    If the finger program is enabled, the superserver watches for incoming finger queries on port 79 and sends them to the ____ daemon.

    • A.

      In.fingerd

    • B.

      Pppd

    • C.

      Talkd

    • D.

      Tcpd

    Correct Answer
    A. In.fingerd
    Explanation
    The superserver watches for incoming finger queries on port 79 and sends them to the in.fingerd daemon. The in.fingerd daemon is responsible for handling finger requests and providing information about users on the system.

    Rate this question:

  • 5. 

    The most common way to set time at boot-up is to use the ____ program.

    • A.

      Date

    • B.

      Ntpq

    • C.

      Ntpdate

    • D.

      Ntptrace

    Correct Answer
    C. Ntpdate
    Explanation
    The correct answer is "ntpdate". Ntpdate is a program that is commonly used to set the time at boot-up. It is a utility that allows the system clock to be set using the Network Time Protocol (NTP). Ntpdate queries NTP servers and adjusts the system time accordingly, ensuring accurate time synchronization.

    Rate this question:

  • 6. 

    For best accuracy, you should include at least ____ servers in the ntpd configuration file.

    • A.

      2

    • B.

      3

    • C.

      4

    • D.

      5

    Correct Answer
    D. 5
    Explanation
    For best accuracy, it is recommended to include at least 5 servers in the ntpd configuration file. This is because having multiple servers helps to ensure a more reliable and accurate time synchronization. By including multiple servers, the ntpd daemon can compare the time reported by each server and choose the most accurate one. This redundancy also helps to mitigate the impact of any server failures or network issues, ensuring that the system can still synchronize time effectively.

    Rate this question:

  • 7. 

    The ntpd daemon will refuse to synchronize to other time sources if its local time is off by more than 1000 seconds from the other servers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The ntpd daemon is a time synchronization program that ensures the accuracy of the system time by synchronizing with other time sources. If the local time of the ntpd daemon is off by more than 1000 seconds from the other servers, it will refuse to synchronize with them. This is because such a significant time difference indicates a potential error or inconsistency in the time source, and synchronizing with it could result in inaccurate timekeeping. Therefore, the statement "The ntpd daemon will refuse to synchronize to other time sources if its local time is off by more than 1000 seconds from the other servers" is true.

    Rate this question:

  • 8. 

    Which of the following programs enables you to add a time server in Windows XP?

    • A.

      Regedit

    • B.

      Date

    • C.

      Ntpdate

    • D.

      Time

    Correct Answer
    A. Regedit
    Explanation
    The correct answer is "regedit". Regedit is a program in Windows XP that allows users to edit the registry, which contains configuration settings for the operating system. By using regedit, users can add a time server to Windows XP by modifying the appropriate registry keys. This enables the computer to synchronize its time with the designated time server.

    Rate this question:

  • 9. 

    Daemons that bind to ports higher than ____ may be run by other users.

    • A.

      20

    • B.

      80

    • C.

      500

    • D.

      1023

    Correct Answer
    D. 1023
    Explanation
    Daemons that bind to ports higher than 1023 may be run by other users because ports below 1024 are considered privileged ports and can only be bound by processes running with administrative privileges. Ports above 1023 are considered unprivileged ports and can be bound by regular user processes. Therefore, other users can run daemons on ports higher than 1023.

    Rate this question:

  • 10. 

    The default action of tcpd (TCP Wrappers) is to allow incoming connections.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The default action of tcpd (TCP Wrappers) is to allow incoming connections. This means that if no specific rules or restrictions are set, tcpd will allow all incoming connections by default.

    Rate this question:

  • 11. 

    You can use that whois server in another whois command with the ____ option to get further details about a specific domain.

    • A.

      -h

    • B.

      -r

    • C.

      -s

    • D.

      -w

    Correct Answer
    A. -h
    Explanation
    The correct answer is -h. By using the -h option in another whois command, you can connect to a specific whois server and retrieve additional details about a particular domain. This option allows you to gather more specific information by querying a specific whois server instead of relying on a default server.

    Rate this question:

  • 12. 

    Linux master control program used to manage the getty program.

    • A.

      Init program

    • B.

      Whois utility

    • C.

      Linux logging facility

    • D.

      Mailing-list software

    • E.

      Trn program

    Correct Answer
    A. Init program
    Explanation
    The init program in Linux is responsible for managing the system initialization process. It is the first process that is started when the computer boots up and it is responsible for starting and stopping other processes and services. The init program also manages the getty program, which is responsible for displaying the login prompt on virtual terminals. Therefore, the init program is the correct answer as it is the Linux master control program used to manage the getty program.

    Rate this question:

  • 13. 

    _____ supports the Internet Printing Protocol (IPP).

    • A.

      Simple Network Management Protocol (SNMP)

    • B.

      Whois utility

    • C.

      Common Unix Printing System (CUPS)

    • D.

      Trn program

    • E.

      Mailing-list software

    Correct Answer
    C. Common Unix Printing System (CUPS)
    Explanation
    Common Unix Printing System (CUPS) is the correct answer because it is a printing system that supports the Internet Printing Protocol (IPP). CUPS is a widely used printing system in Unix-like operating systems, including Linux and macOS. It provides a way to print documents over a network using the IPP protocol, which is a standard for printing over the internet. CUPS allows users to easily configure and manage printers, and it provides a consistent printing experience across different platforms. Therefore, CUPS is the most suitable option among the given choices for supporting the Internet Printing Protocol (IPP).

    Rate this question:

  • 14. 

    _____ controlled by the two daemons klogd and syslogd (for kernel messages and all other messages, respectively).

    • A.

      Correctness Principle

    • B.

      Whois utility

    • C.

      Mailing-list software

    • D.

      Simple Network Management Protocol (SNMP)

    • E.

      Linux logging facility

    Correct Answer
    E. Linux logging facility
    Explanation
    The Linux logging facility is controlled by the two daemons klogd and syslogd. These daemons handle kernel messages and all other messages respectively. They are responsible for capturing and storing log information from various sources within the Linux system. The logging facility plays a crucial role in monitoring system events, troubleshooting issues, and maintaining system security.

    Rate this question:

  • 15. 

    _____ used by peer servers in the NTP hierarchy to determine which servers are keeping accurate time.

    • A.

      Simple Network Management Protocol (SNMP)

    • B.

      Correctness Principle

    • C.

      Daemons

    • D.

      Init program

    • E.

      Mailing-list software

    Correct Answer
    B. Correctness Principle
    Explanation
    The Correctness Principle is used by peer servers in the NTP hierarchy to determine which servers are keeping accurate time. This principle ensures that the time synchronization process is reliable and consistent across the network. It involves comparing the time reported by different servers and selecting the most accurate and reliable sources as references for time synchronization. By following the Correctness Principle, NTP servers can maintain accurate timekeeping and ensure the integrity of time-sensitive operations within the network.

    Rate this question:

  • 16. 

    _____ queries the database maintained by a domain registrar to learn about a specific domain.

    • A.

      Mailing-list software

    • B.

      Whois utility

    • C.

      Trn program

    • D.

      Init program

    • E.

      Common Unix Printing System (CUPS)

    Correct Answer
    B. Whois utility
    Explanation
    The correct answer is the "whois utility". The whois utility is used to query the database maintained by a domain registrar in order to obtain information about a specific domain. It allows users to retrieve details such as the domain owner, registration date, expiration date, and name servers associated with the domain. This information is useful for various purposes, including investigating domain ownership, checking domain availability, and resolving technical issues related to a domain.

    Rate this question:

  • 17. 

    _____ automates subscribing, unsubscribing, and sending all the messages so an individual doesn’t have to spend the time to manage a (sometimes) huge list of users.

    • A.

      Common Unix Printing System (CUPS)

    • B.

      Mailing-list software

    • C.

      Trn program

    • D.

      Common Unix Printing System (CUPS)

    • E.

      Whois utility

    Correct Answer
    B. Mailing-list software
    Explanation
    Mailing-list software automates the process of subscribing, unsubscribing, and sending messages to a large list of users. This eliminates the need for individuals to manually manage the list, saving them time and effort.

    Rate this question:

  • 18. 

    _____ programs that are typically started by the system and are not associated with a user’s terminal.

    • A.

      Daemons

    • B.

      Mailing-list software

    • C.

      Whois utility

    • D.

      Common Unix Printing System (CUPS)

    • E.

      Trn program

    Correct Answer
    A. Daemons
    Explanation
    Daemons are programs that are typically started by the system and are not associated with a user's terminal. They run in the background and perform various tasks, such as managing system services or performing scheduled tasks. Unlike user programs, daemons do not require user interaction or a terminal to function. They are essential for the smooth operation of the system and often run continuously, waiting for specific events or requests to occur. Examples of daemons include web servers, database servers, and network services.

    Rate this question:

  • 19. 

    _____ most widely used text-mode reader in Linux systems.

    • A.

      Correctness Principle

    • B.

      Init program

    • C.

      Linux logging facility

    • D.

      Trn program

    • E.

      Common Unix Printing System (CUPS)

    Correct Answer
    D. Trn program
    Explanation
    The trn program is the most widely used text-mode reader in Linux systems.

    Rate this question:

  • 20. 

    _____ is designed to give you feedback about how the components of your network are functioning.

    • A.

      Common Unix Printing System (CUPS)

    • B.

      Correctness Principle

    • C.

      Whois utility

    • D.

      Linux logging facility

    • E.

      Simple Network Management Protocol (SNMP)

    Correct Answer
    E. Simple Network Management Protocol (SNMP)
    Explanation
    SNMP is designed to give feedback about how the components of a network are functioning. It is a protocol that allows network administrators to monitor and manage network devices, such as routers, switches, and servers. SNMP collects and organizes information from these devices, providing valuable insights into the performance and health of the network. This feedback helps administrators identify and troubleshoot issues, optimize network performance, and ensure the smooth operation of the network.

    Rate this question:

  • 21. 

    Sending the word ____ as the body of an e-mail message to [email protected] causes majordomo to send back a list of all the mailing lists being hosted on that server.

    • A.

      Owner

    • B.

      Manager

    • C.

      List

    • D.

      Help

    Correct Answer
    C. List
    Explanation
    Sending the word "list" as the body of an e-mail message to [email protected] causes majordomo to send back a list of all the mailing lists being hosted on that server.

    Rate this question:

  • 22. 

    The ____ program, which is based on the Line Printer Daemon Protocol, controls the line printer daemon.

    • A.

      Lpc

    • B.

      Lpd

    • C.

      Lpr

    • D.

      Lpq

    Correct Answer
    B. Lpd
    Explanation
    The correct answer is "lpd". The explanation is that the "lpd" program, which is based on the Line Printer Daemon Protocol, is responsible for controlling the line printer daemon. The line printer daemon is a program that manages and controls the printing process on a network printer. Therefore, "lpd" is the correct program to control the line printer daemon.

    Rate this question:

  • 23. 

    The ____ service on UDP or TCP port 7 repeats back to you whatever you type.

    • A.

      Time

    • B.

      Chargen

    • C.

      Echo

    • D.

      Discard

    Correct Answer
    C. Echo
    Explanation
    The correct answer is "echo." The echo service on UDP or TCP port 7 repeats back to you whatever you type. This means that any input sent to this service will be returned as output.

    Rate this question:

  • 24. 

    A full news feed can consume 250 GB of storage each day.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A full news feed can consume 250 GB of storage each day because news feeds often consist of various types of media such as images, videos, and articles. These media files can take up a significant amount of storage space, especially if the news feed is constantly updated with new content throughout the day. Additionally, news feeds may include high-resolution images or videos, which can further increase the storage requirements. Therefore, it is plausible that a full news feed can consume 250 GB of storage each day.

    Rate this question:

  • 25. 

    The finger program provides the user’s public encryption key using the ____ file.

    • A.

      .plan

    • B.

      .pgp

    • C.

      .project

    • D.

      .address

    Correct Answer
    B. .pgp
    Explanation
    The finger program provides the user's public encryption key using the .pgp file. This file extension is commonly associated with Pretty Good Privacy (PGP), a data encryption and decryption program used for secure communication. The .pgp file contains the user's public key, which can be used to encrypt messages and verify the authenticity of the sender.

    Rate this question:

  • 26. 

    The talkd daemon uses UDP on port ____ to communicate with remote hosts.

    • A.

      514

    • B.

      515

    • C.

      517

    • D.

      631

    Correct Answer
    C. 517
    Explanation
    The correct answer is 517. The talkd daemon is a program that allows users on different computers to communicate with each other through text-based messages. It uses UDP (User Datagram Protocol) as the transport protocol for communication. UDP uses port numbers to identify different services, and in this case, the talkd daemon uses port 517 to communicate with remote hosts.

    Rate this question:

  • 27. 

    To restart xinetd you must send a ____ signal.

    • A.

      SIGUSR2

    • B.

      SIGTERM

    • C.

      SIGHUP

    • D.

      SIGKILL

    Correct Answer
    A. SIGUSR2
    Explanation
    To restart xinetd, you need to send a SIGUSR2 signal. This signal is used to instruct the xinetd service to reload its configuration files and restart any services that have been modified. Sending a SIGUSR2 signal allows for a graceful restart of xinetd without interrupting any active connections or services.

    Rate this question:

  • 28. 

    Each level in an NTP server hierarchy is called a(n) ____.

    • A.

      Stratum

    • B.

      Epoch

    • C.

      Stage

    • D.

      Period

    Correct Answer
    A. Stratum
    Explanation
    In an NTP (Network Time Protocol) server hierarchy, each level is referred to as a "stratum". Stratum refers to the distance or number of hops away from a reference clock source. The lower the stratum number, the closer the server is to the reference clock and the more accurate the time synchronization.

    Rate this question:

  • 29. 

    Newsgroup postings are passed around the Internet using ____.

    • A.

      SMTP

    • B.

      NNTP

    • C.

      SNMP

    • D.

      SNTP

    Correct Answer
    B. NNTP
    Explanation
    Newsgroup postings are passed around the Internet using NNTP (Network News Transfer Protocol). NNTP is a protocol specifically designed for the distribution, retrieval, and posting of news articles in Usenet newsgroups. It allows users to access and participate in discussions by sending and receiving messages to and from news servers. SMTP (Simple Mail Transfer Protocol) is used for sending email, SNMP (Simple Network Management Protocol) is used for network management, and SNTP (Simple Network Time Protocol) is used for time synchronization.

    Rate this question:

  • 30. 

    The 32-bit number that NTP uses to measure seconds will reach its upper bounds (all ones) in the year ____ and roll over to all zeros, bringing us back to the beginning of NTP time—midnight, January 1, 1900.

    • A.

      2010

    • B.

      2036

    • C.

      3010

    • D.

      3036

    Correct Answer
    B. 2036
    Explanation
    The 32-bit number used by NTP to measure seconds will reach its upper limit (all ones) in the year 2036. At this point, it will roll over to all zeros, resetting the time back to the beginning of NTP time, which is midnight, January 1, 1900.

    Rate this question:

  • 31. 

    The ____ option for syslogd lets you specify domain names to be stripped off before logging an event.

    • A.

      -d

    • B.

      -r

    • C.

      -s

    • D.

      -x

    Correct Answer
    C. -s
    Explanation
    The "-s" option for syslogd allows you to specify domain names that should be stripped off before logging an event. This means that if a domain name is included in the log message, it will be removed before the event is logged. This can be useful in situations where the domain name is not relevant or necessary for the logging purposes.

    Rate this question:

  • 32. 

    The daytime service on UDP and TCP port ____ returns the current date and time in human-readable form, then closes the connection.

    • A.

      9

    • B.

      13

    • C.

      19

    • D.

      37

    Correct Answer
    B. 13
    Explanation
    The correct answer is 13 because port 13 is commonly used for the daytime service on both UDP and TCP protocols. The daytime service allows clients to retrieve the current date and time from a server in a human-readable format. Once the server sends the date and time information, it closes the connection.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 09, 2009
    Quiz Created by
    Svolore
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.