Linux Networking Quiz 4

32 Questions | Attempts: 158
Share

SettingsSettingsSettings
Linux Networking Quizzes & Trivia

Linux Networking quiz 4 from class.


Questions and Answers
  • 1. 
    The .nofinger file created to hide user activities should not be visible to the finger daemon.
    • A. 

      True

    • B. 

      False

  • 2. 
    The term ____ refers to sending an e-mail message to an e-mail list.
    • A. 

      Subscribing

    • B. 

      Polling

    • C. 

      Scanning

    • D. 

      Posting

  • 3. 
    By default, the syslogd daemon supports the remote transfer of log messages.
    • A. 

      True

    • B. 

      False

  • 4. 
    If the finger program is enabled, the superserver watches for incoming finger queries on port 79 and sends them to the ____ daemon.
    • A. 

      In.fingerd

    • B. 

      Pppd

    • C. 

      Talkd

    • D. 

      Tcpd

  • 5. 
    The most common way to set time at boot-up is to use the ____ program.
    • A. 

      Date

    • B. 

      Ntpq

    • C. 

      Ntpdate

    • D. 

      Ntptrace

  • 6. 
    For best accuracy, you should include at least ____ servers in the ntpd configuration file.
    • A. 

      2

    • B. 

      3

    • C. 

      4

    • D. 

      5

  • 7. 
    The ntpd daemon will refuse to synchronize to other time sources if its local time is off by more than 1000 seconds from the other servers.
    • A. 

      True

    • B. 

      False

  • 8. 
    Which of the following programs enables you to add a time server in Windows XP?
    • A. 

      Regedit

    • B. 

      Date

    • C. 

      Ntpdate

    • D. 

      Time

  • 9. 
    Daemons that bind to ports higher than ____ may be run by other users.
    • A. 

      20

    • B. 

      80

    • C. 

      500

    • D. 

      1023

  • 10. 
    The default action of tcpd (TCP Wrappers) is to allow incoming connections.
    • A. 

      True

    • B. 

      False

  • 11. 
    You can use that whois server in another whois command with the ____ option to get further details about a specific domain.
    • A. 

      -h

    • B. 

      -r

    • C. 

      -s

    • D. 

      -w

  • 12. 
    Linux master control program used to manage the getty program.
    • A. 

      Init program

    • B. 

      Whois utility

    • C. 

      Linux logging facility

    • D. 

      Mailing-list software

    • E. 

      Trn program

  • 13. 
    _____ supports the Internet Printing Protocol (IPP).
    • A. 

      Simple Network Management Protocol (SNMP)

    • B. 

      Whois utility

    • C. 

      Common Unix Printing System (CUPS)

    • D. 

      Trn program

    • E. 

      Mailing-list software

  • 14. 
    _____ controlled by the two daemons klogd and syslogd (for kernel messages and all other messages, respectively).
    • A. 

      Correctness Principle

    • B. 

      Whois utility

    • C. 

      Mailing-list software

    • D. 

      Simple Network Management Protocol (SNMP)

    • E. 

      Linux logging facility

  • 15. 
    _____ used by peer servers in the NTP hierarchy to determine which servers are keeping accurate time.
    • A. 

      Simple Network Management Protocol (SNMP)

    • B. 

      Correctness Principle

    • C. 

      Daemons

    • D. 

      Init program

    • E. 

      Mailing-list software

  • 16. 
    _____ queries the database maintained by a domain registrar to learn about a specific domain.
    • A. 

      Mailing-list software

    • B. 

      Whois utility

    • C. 

      Trn program

    • D. 

      Init program

    • E. 

      Common Unix Printing System (CUPS)

  • 17. 
    _____ automates subscribing, unsubscribing, and sending all the messages so an individual doesn’t have to spend the time to manage a (sometimes) huge list of users.
    • A. 

      Common Unix Printing System (CUPS)

    • B. 

      Mailing-list software

    • C. 

      Trn program

    • D. 

      Common Unix Printing System (CUPS)

    • E. 

      Whois utility

  • 18. 
    _____ programs that are typically started by the system and are not associated with a user’s terminal.
    • A. 

      Daemons

    • B. 

      Mailing-list software

    • C. 

      Whois utility

    • D. 

      Common Unix Printing System (CUPS)

    • E. 

      Trn program

  • 19. 
    _____ most widely used text-mode reader in Linux systems.
    • A. 

      Correctness Principle

    • B. 

      Init program

    • C. 

      Linux logging facility

    • D. 

      Trn program

    • E. 

      Common Unix Printing System (CUPS)

  • 20. 
    _____ is designed to give you feedback about how the components of your network are functioning.
    • A. 

      Common Unix Printing System (CUPS)

    • B. 

      Correctness Principle

    • C. 

      Whois utility

    • D. 

      Linux logging facility

    • E. 

      Simple Network Management Protocol (SNMP)

  • 21. 
    Sending the word ____ as the body of an e-mail message to [email protected] causes majordomo to send back a list of all the mailing lists being hosted on that server.
    • A. 

      Owner

    • B. 

      Manager

    • C. 

      List

    • D. 

      Help

  • 22. 
    The ____ program, which is based on the Line Printer Daemon Protocol, controls the line printer daemon.
    • A. 

      Lpc

    • B. 

      Lpd

    • C. 

      Lpr

    • D. 

      Lpq

  • 23. 
    The ____ service on UDP or TCP port 7 repeats back to you whatever you type.
    • A. 

      Time

    • B. 

      Chargen

    • C. 

      Echo

    • D. 

      Discard

  • 24. 
    A full news feed can consume 250 GB of storage each day.
    • A. 

      True

    • B. 

      False

  • 25. 
    The finger program provides the user’s public encryption key using the ____ file.
    • A. 

      .plan

    • B. 

      .pgp

    • C. 

      .project

    • D. 

      .address

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.