Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Svolore
S
Svolore
Community Contributor
Quizzes Created: 12 | Total Attempts: 11,281
| Attempts: 177 | Questions: 32
Please wait...
Question 1 / 32
0 %
0/100
Score 0/100
1. The ____ service on UDP or TCP port 7 repeats back to you whatever you type.

Explanation

The correct answer is "echo." The echo service on UDP or TCP port 7 repeats back to you whatever you type. This means that any input sent to this service will be returned as output.

Submit
Please wait...
About This Quiz
Linux Networking Quizzes & Trivia

This Linux Networking Quiz 4 covers essential aspects of Linux networking, including daemon processes, syslogd, and time synchronization with NTP. It tests knowledge on security practices and network configuration.

Personalize your quiz and earn a certificate with your name on it!
2. _____ programs that are typically started by the system and are not associated with a user’s terminal.

Explanation

Daemons are programs that are typically started by the system and are not associated with a user's terminal. They run in the background and perform various tasks, such as managing system services or performing scheduled tasks. Unlike user programs, daemons do not require user interaction or a terminal to function. They are essential for the smooth operation of the system and often run continuously, waiting for specific events or requests to occur. Examples of daemons include web servers, database servers, and network services.

Submit
3. By default, the syslogd daemon supports the remote transfer of log messages.

Explanation

The syslogd daemon is a system utility that collects and manages log messages on a Unix or Unix-like operating system. By default, it is configured to support the remote transfer of log messages. This means that log messages can be sent from one system to another over a network, allowing for centralized logging and analysis of logs from multiple systems. Therefore, the statement "By default, the syslogd daemon supports the remote transfer of log messages" is true.

Submit
4. The default action of tcpd (TCP Wrappers) is to allow incoming connections.

Explanation

The default action of tcpd (TCP Wrappers) is to allow incoming connections. This means that if no specific rules or restrictions are set, tcpd will allow all incoming connections by default.

Submit
5. _____ automates subscribing, unsubscribing, and sending all the messages so an individual doesn’t have to spend the time to manage a (sometimes) huge list of users.

Explanation

Mailing-list software automates the process of subscribing, unsubscribing, and sending messages to a large list of users. This eliminates the need for individuals to manually manage the list, saving them time and effort.

Submit
6. The most common way to set time at boot-up is to use the ____ program.

Explanation

The correct answer is "ntpdate". Ntpdate is a program that is commonly used to set the time at boot-up. It is a utility that allows the system clock to be set using the Network Time Protocol (NTP). Ntpdate queries NTP servers and adjusts the system time accordingly, ensuring accurate time synchronization.

Submit
7. If the finger program is enabled, the superserver watches for incoming finger queries on port 79 and sends them to the ____ daemon.

Explanation

The superserver watches for incoming finger queries on port 79 and sends them to the in.fingerd daemon. The in.fingerd daemon is responsible for handling finger requests and providing information about users on the system.

Submit
8. The ntpd daemon will refuse to synchronize to other time sources if its local time is off by more than 1000 seconds from the other servers.

Explanation

The ntpd daemon is a time synchronization program that ensures the accuracy of the system time by synchronizing with other time sources. If the local time of the ntpd daemon is off by more than 1000 seconds from the other servers, it will refuse to synchronize with them. This is because such a significant time difference indicates a potential error or inconsistency in the time source, and synchronizing with it could result in inaccurate timekeeping. Therefore, the statement "The ntpd daemon will refuse to synchronize to other time sources if its local time is off by more than 1000 seconds from the other servers" is true.

Submit
9. _____ supports the Internet Printing Protocol (IPP).

Explanation

Common Unix Printing System (CUPS) is the correct answer because it is a printing system that supports the Internet Printing Protocol (IPP). CUPS is a widely used printing system in Unix-like operating systems, including Linux and macOS. It provides a way to print documents over a network using the IPP protocol, which is a standard for printing over the internet. CUPS allows users to easily configure and manage printers, and it provides a consistent printing experience across different platforms. Therefore, CUPS is the most suitable option among the given choices for supporting the Internet Printing Protocol (IPP).

Submit
10. _____ most widely used text-mode reader in Linux systems.

Explanation

The trn program is the most widely used text-mode reader in Linux systems.

Submit
11. _____ is designed to give you feedback about how the components of your network are functioning.

Explanation

SNMP is designed to give feedback about how the components of a network are functioning. It is a protocol that allows network administrators to monitor and manage network devices, such as routers, switches, and servers. SNMP collects and organizes information from these devices, providing valuable insights into the performance and health of the network. This feedback helps administrators identify and troubleshoot issues, optimize network performance, and ensure the smooth operation of the network.

Submit
12. The finger program provides the user’s public encryption key using the ____ file.

Explanation

The finger program provides the user's public encryption key using the .pgp file. This file extension is commonly associated with Pretty Good Privacy (PGP), a data encryption and decryption program used for secure communication. The .pgp file contains the user's public key, which can be used to encrypt messages and verify the authenticity of the sender.

Submit
13. Sending the word ____ as the body of an e-mail message to [email protected] causes majordomo to send back a list of all the mailing lists being hosted on that server.

Explanation

Sending the word "list" as the body of an e-mail message to [email protected] causes majordomo to send back a list of all the mailing lists being hosted on that server.

Submit
14. A full news feed can consume 250 GB of storage each day.

Explanation

A full news feed can consume 250 GB of storage each day because news feeds often consist of various types of media such as images, videos, and articles. These media files can take up a significant amount of storage space, especially if the news feed is constantly updated with new content throughout the day. Additionally, news feeds may include high-resolution images or videos, which can further increase the storage requirements. Therefore, it is plausible that a full news feed can consume 250 GB of storage each day.

Submit
15. The 32-bit number that NTP uses to measure seconds will reach its upper bounds (all ones) in the year ____ and roll over to all zeros, bringing us back to the beginning of NTP time—midnight, January 1, 1900.

Explanation

The 32-bit number used by NTP to measure seconds will reach its upper limit (all ones) in the year 2036. At this point, it will roll over to all zeros, resetting the time back to the beginning of NTP time, which is midnight, January 1, 1900.

Submit
16. Daemons that bind to ports higher than ____ may be run by other users.

Explanation

Daemons that bind to ports higher than 1023 may be run by other users because ports below 1024 are considered privileged ports and can only be bound by processes running with administrative privileges. Ports above 1023 are considered unprivileged ports and can be bound by regular user processes. Therefore, other users can run daemons on ports higher than 1023.

Submit
17. Which of the following programs enables you to add a time server in Windows XP?

Explanation

The correct answer is "regedit". Regedit is a program in Windows XP that allows users to edit the registry, which contains configuration settings for the operating system. By using regedit, users can add a time server to Windows XP by modifying the appropriate registry keys. This enables the computer to synchronize its time with the designated time server.

Submit
18. _____ controlled by the two daemons klogd and syslogd (for kernel messages and all other messages, respectively).

Explanation

The Linux logging facility is controlled by the two daemons klogd and syslogd. These daemons handle kernel messages and all other messages respectively. They are responsible for capturing and storing log information from various sources within the Linux system. The logging facility plays a crucial role in monitoring system events, troubleshooting issues, and maintaining system security.

Submit
19. The ____ program, which is based on the Line Printer Daemon Protocol, controls the line printer daemon.

Explanation

The correct answer is "lpd". The explanation is that the "lpd" program, which is based on the Line Printer Daemon Protocol, is responsible for controlling the line printer daemon. The line printer daemon is a program that manages and controls the printing process on a network printer. Therefore, "lpd" is the correct program to control the line printer daemon.

Submit
20. The daytime service on UDP and TCP port ____ returns the current date and time in human-readable form, then closes the connection.

Explanation

The correct answer is 13 because port 13 is commonly used for the daytime service on both UDP and TCP protocols. The daytime service allows clients to retrieve the current date and time from a server in a human-readable format. Once the server sends the date and time information, it closes the connection.

Submit
21. _____ queries the database maintained by a domain registrar to learn about a specific domain.

Explanation

The correct answer is the "whois utility". The whois utility is used to query the database maintained by a domain registrar in order to obtain information about a specific domain. It allows users to retrieve details such as the domain owner, registration date, expiration date, and name servers associated with the domain. This information is useful for various purposes, including investigating domain ownership, checking domain availability, and resolving technical issues related to a domain.

Submit
22. Each level in an NTP server hierarchy is called a(n) ____.

Explanation

In an NTP (Network Time Protocol) server hierarchy, each level is referred to as a "stratum". Stratum refers to the distance or number of hops away from a reference clock source. The lower the stratum number, the closer the server is to the reference clock and the more accurate the time synchronization.

Submit
23. The term ____ refers to sending an e-mail message to an e-mail list.

Explanation

The term "posting" refers to sending an e-mail message to an e-mail list. When someone posts an e-mail, they are sending it to a specific group of recipients who have subscribed to that particular e-mail list. This allows for efficient and targeted communication, as the message will only be received by those who have expressed interest in the topic or content of the e-mail list.

Submit
24. You can use that whois server in another whois command with the ____ option to get further details about a specific domain.

Explanation

The correct answer is -h. By using the -h option in another whois command, you can connect to a specific whois server and retrieve additional details about a particular domain. This option allows you to gather more specific information by querying a specific whois server instead of relying on a default server.

Submit
25. The .nofinger file created to hide user activities should not be visible to the finger daemon.

Explanation

The .nofinger file created to hide user activities should be visible to the finger daemon. This is because the finger daemon is responsible for providing information about users on a system, and if the .nofinger file is hidden from it, it would defeat the purpose of hiding user activities. Therefore, the correct answer is False.

Submit
26. _____ used by peer servers in the NTP hierarchy to determine which servers are keeping accurate time.

Explanation

The Correctness Principle is used by peer servers in the NTP hierarchy to determine which servers are keeping accurate time. This principle ensures that the time synchronization process is reliable and consistent across the network. It involves comparing the time reported by different servers and selecting the most accurate and reliable sources as references for time synchronization. By following the Correctness Principle, NTP servers can maintain accurate timekeeping and ensure the integrity of time-sensitive operations within the network.

Submit
27. Linux master control program used to manage the getty program.

Explanation

The init program in Linux is responsible for managing the system initialization process. It is the first process that is started when the computer boots up and it is responsible for starting and stopping other processes and services. The init program also manages the getty program, which is responsible for displaying the login prompt on virtual terminals. Therefore, the init program is the correct answer as it is the Linux master control program used to manage the getty program.

Submit
28. The talkd daemon uses UDP on port ____ to communicate with remote hosts.

Explanation

The correct answer is 517. The talkd daemon is a program that allows users on different computers to communicate with each other through text-based messages. It uses UDP (User Datagram Protocol) as the transport protocol for communication. UDP uses port numbers to identify different services, and in this case, the talkd daemon uses port 517 to communicate with remote hosts.

Submit
29. To restart xinetd you must send a ____ signal.

Explanation

To restart xinetd, you need to send a SIGUSR2 signal. This signal is used to instruct the xinetd service to reload its configuration files and restart any services that have been modified. Sending a SIGUSR2 signal allows for a graceful restart of xinetd without interrupting any active connections or services.

Submit
30. Newsgroup postings are passed around the Internet using ____.

Explanation

Newsgroup postings are passed around the Internet using NNTP (Network News Transfer Protocol). NNTP is a protocol specifically designed for the distribution, retrieval, and posting of news articles in Usenet newsgroups. It allows users to access and participate in discussions by sending and receiving messages to and from news servers. SMTP (Simple Mail Transfer Protocol) is used for sending email, SNMP (Simple Network Management Protocol) is used for network management, and SNTP (Simple Network Time Protocol) is used for time synchronization.

Submit
31. For best accuracy, you should include at least ____ servers in the ntpd configuration file.

Explanation

For best accuracy, it is recommended to include at least 5 servers in the ntpd configuration file. This is because having multiple servers helps to ensure a more reliable and accurate time synchronization. By including multiple servers, the ntpd daemon can compare the time reported by each server and choose the most accurate one. This redundancy also helps to mitigate the impact of any server failures or network issues, ensuring that the system can still synchronize time effectively.

Submit
32. The ____ option for syslogd lets you specify domain names to be stripped off before logging an event.

Explanation

The "-s" option for syslogd allows you to specify domain names that should be stripped off before logging an event. This means that if a domain name is included in the log message, it will be removed before the event is logged. This can be useful in situations where the domain name is not relevant or necessary for the logging purposes.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 09, 2009
    Quiz Created by
    Svolore
Cancel
  • All
    All (32)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The ____ service on UDP or TCP port 7 repeats back to you whatever you...
_____ programs that are typically started by the system and are not...
By default, the syslogd daemon supports the remote transfer of log...
The default action of tcpd (TCP Wrappers) is to allow incoming...
_____ automates ...
The most common way to set time at boot-up is to use the ____ program.
If the finger program is enabled, the superserver watches for incoming...
The ntpd daemon will refuse to synchronize to other time sources ...
_____ supports the Internet Printing Protocol (IPP).
_____ most widely used text-mode reader in Linux systems.
_____ is designed to give you feedback about how the components of...
The finger program provides the user’s public encryption key using...
Sending the word ____ as the body of an e-mail message to...
A full news feed can consume 250 GB of storage each day.
The 32-bit number that NTP uses to measure seconds will reach its...
Daemons that bind to ports higher than ____ may be run by other users.
Which of the following programs enables you to add a time server in...
_____ controlled by the two daemons klogd and syslogd (for kernel...
The ____ program, which is based on the Line Printer Daemon Protocol,...
The daytime service on UDP and TCP port ____ returns the current date...
_____ queries the database maintained by a domain registrar to learn...
Each level in an NTP server hierarchy is called a(n) ____.
The term ____ refers to sending an e-mail message to an e-mail list.
You can use that whois server in another whois command with the ____...
The .nofinger file created to hide user activities should not be...
_____ used by peer servers in the NTP hierarchy to determine which...
Linux master control program used to manage the getty program.
The talkd daemon uses UDP on port ____ to communicate with remote...
To restart xinetd you must send a ____ signal.
Newsgroup postings are passed around the Internet using ____.
For best accuracy, you should include at least ____ servers in the...
The ____ option for syslogd lets you specify domain names to be...
Alert!

Advertisement