Linux Prep

40 Questions | Attempts: 138
Share

SettingsSettingsSettings
Linux Quizzes & Trivia

Linux to prep for and 2


Questions and Answers
  • 1. 

    Data striping is a technique for writing and reading data sequentially to and from more than one storage device. Before the data is written it is broken up into blocks, these blocks vary in size depending on the RAID configuration (level) used. The blocks of data are then written sequentially to all disks simultaneously into areas called stripes. Because of all the read/write heads are working all the time it increases performance as opposed to writing/retrieving data to and from one disk at a time.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 2. 

    UPS is used to protect computer systems from power problems, such as power spikes and power blackouts.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 3. 

    Which of the following crontab entries will run at 1:30 each morning, removing all files in the /tmp directory that have not been accessed in 3 days?

    • A.

      30 1 3 1 * find /tmp -atime +1 -exec rm -f {}';'

    • B.

      30 1 * 3 * find /tmp -atime +1 -exec rm -f {}';'

    • C.

      1 30 3 1 * find /tmp -atime +1 -exec rm -f {}';'

    • D.

      30 1 * * * find /tmp -atime +1 -exec rm -f {}';'

    Correct Answer
    D. 30 1 * * * find /tmp -atime +1 -exec rm -f {}';'
  • 4. 

    RAID is a redundant array of independent disk drives used to protect system from HD failure. RAID 0 uses data striping. With RAID 1, data is mirrored on two or more disks, so that if one disk fails, data is read from the other disks. RAID 3 and 5 use parity as redundant information to enable data reconstruction, if one of the drives in the array fails.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 5. 

    Linux throws away anything you write to

    • A.

      /dev/wastebasket

    • B.

      /dev/sd0

    • C.

      /dev/hda

    • D.

      /dev/null

    • E.

      /garbage

    Correct Answer
    D. /dev/null
  • 6. 

    To perform full and incremental backups, you use the cron utility to schedule the tasks at defined times by adding appropriate entries to the system crontab. You can list the content of the crontab with the –l (el) option. To perform a one-time backup of a set of files, you use the at utility. You use the atq command to check that the job has been scheduled.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 7. 

    In Raid 3 and Raid 5, redundancy is achieved by the use of parity blocks. If a single drive in the array fails, data blocks and a parity block from the working drives can be combined to reconstruct the missing data. For example, if even parity is used and the data blocks are D1 = 00000111, D2 = 00000101, and D3 = 00000000, the parity block will be calculated as 00000010

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 8. 

    Rootkits may have originated as regular applications, intended to take control of a failing or unresponsive system, but in recent years have been largely malware to help intruders gain access to systems while avoiding detection.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 9. 

    A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other computers and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 10. 

    Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. The name Kerberos (Cerberus) comes from Greek mythology; it is the three-headed dog that guarded the entrance to Hades. A free implementation of this protocol is available from the Massachusetts Institute of Technology (MIT). Kerberos is available in many commercial products as well.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 11. 

    Samba-enabled Unix machine offers the following services:

    • A.

      Provides web services

    • B.

      Authenticate clients logging onto a Windows domain

    • C.

      Share printers

    • D.

      2 and 3 only

    • E.

      1 and 3 only

    Correct Answer
    D. 2 and 3 only
  • 12. 

    Free software programs, such as mush, elm, and mh, as well as Zmail, Eudora, ClarisWork, Netscape, and Explorer are MUAs that users run to read, reply to, compose, and dispose of email.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 13. 

    Which of the following describes how Apache web server works:

    • A.

      Httpd wakes up, finds requested file, sends file, then sleeps again.

    • B.

      Simultaneous requests for files result in httpd processes sleep until the conflict is resolved.

    • C.

      Httpd sends request on port 80 to a web browser

    • D.

      All of the above

    • E.

      None of the above

    Correct Answer
    A. Httpd wakes up, finds requested file, sends file, then sleeps again.
  • 14. 

    SMTP, which stands for Simple Mail Transfer Protocol, is the TCP/IP protocol that transfers e-mail messages among computers on an intranet or on the Internet. MTAs use SMTP to communicate. SMTP defines how messages move from one computer's MTA to another's MTA, but not what path the message follows.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 15. 

    You have been called out to your client's site to investigate a suspected security incident on their production ecommerce server. For now, this is classified as a "suspected incident," because no one is sure whether or not the machine was actually attacked. Your job is to find out whether the machine has been successfully attacked, without bringing the system down until you are sure. You have identified a set of files you'd like to take offline for further analysis. You should use tar to copy these to tape.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 16. 

    The daemon that controls logging is

    • A.

      Loghost

    • B.

      Logsys

    • C.

      Syslogd

    • D.

      /var/log

    • E.

      Xinetd

    Correct Answer
    C. Syslogd
  • 17. 

    Chkconfig utility ensures that

    • A.

      Samba starts at boot

    • B.

      Samba is running

    • C.

      Samba password file contains all samba user accounts

    • D.

      Only computers that are on the local network are allowed access to the Samba service

    • E.

      All of the above

    Correct Answer
    A. Samba starts at boot
  • 18. 

    Apache log files are an excellent analysis tool to see how effective your web site is. Available files are access log, error log, referer log, and agent log

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 19. 

    MTA is a mail transfer agent to

    • A.

      Append messages to users' mailbox files.

    • B.

      Enable users to read and write email.

    • C.

      Delivers user’s email message from one computer to another across a network

    • D.

      Provide mail notifier program so that users know when new mail comes in.

    Correct Answer
    C. Delivers user’s email message from one computer to another across a network
  • 20. 

    Squid is a proxy caching server for web clients, supporting the protocols HTTP, FTP, TLS, SSL, and HTTPS. By running a cache on a local network, or at least closer to your network than the resources queries, speed can be improved and network bandwidth reduced. When the same resource is requested multiple times by machines served by the same Squid server, the resources is delivered from a server-local copy rather than requiring the request go out over multiple network routers, and to potentially slow or overloaded destination servers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 21. 

    Hardening a system means removing unnecessary tools, utilities and administration options from a system in order to prevent future back-door access.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 22. 

    What is the difference between telnet and SSH?

    • A.

      There is no difference

    • B.

      In SSH everything is 100% encrypted

    • C.

      Telnet is designed to limit remote access

    • D.

      Telnet relies on private key/public key combination

    Correct Answer
    B. In SSH everything is 100% encrypted
  • 23. 

    Which of the following is the BEST reason administrators should always verify the cryptographic checksums on files they download?

    • A.

      To verify installation of the right version of software

    • B.

      Make sure software has not been corrupted

    • C.

      Avoid getting the wrong package

    • D.

      Avoid installing unneeded software

    Correct Answer
    B. Make sure software has not been corrupted
  • 24. 

    Which of the following is the best way to keep software secure?

    • A.

      Download full binary versions of the updated software

    • B.

      Apply patches to source code and recompile binaries

    • C.

      Install binary patches to new software

    • D.

      Use automatic update tools

    Correct Answer
    B. Apply patches to source code and recompile binaries
  • 25. 

    Why are some of the most critical systems the LEAST up-to-date?

    • A.

      Busy testing before updating

    • B.

      Multiple services to update

    • C.

      Fear of disrupting system function

    • D.

      Patches not released fast enough

    Correct Answer
    C. Fear of disrupting system function
  • 26. 

    Samba is an open source implementation of the SMB file sharing protocol that provides file and print services to SMB/CIFS clients

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 27. 

    What does the /etc/mail/access file do?

    • A.

      List of hosts that are permitted to relay e-mail through your system

    • B.

      The file that holds a user's mail

    • C.

      Maps e-mail addresses to usernames on the system

    • D.

      The sendmail daemon executable image

    • E.

      List of addresses not permitted to send mail to your system

    Correct Answer
    E. List of addresses not permitted to send mail to your system
  • 28. 

    Authentication is a security property that identifies a user based on credentials.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 29. 

    Access control is a security property that determines whether access to a resource is permitted.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 30. 

    Integrity is a security property that ensures information has not been destroyed in an authorized manner.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 31. 

    The X is a standard graphical window system for the Linux and Unix operating systems.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 32. 

    X server program takes input from the keyboard and mouse and displays to a screen. The X server accepts requests from graphical output (windows) and sends back user input (keyboard, mouse). The X server communicates with various client programs over the X protocol.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 33. 

    The default X startup configuration can be found in /usr/lib/X11/xinit/xinitrc

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 34. 

    The desktop environment components include icons, panels, windows, and desktop area. Individual window components include border, buttons, tabs, bars, and main panel.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 35. 

    The OpenOffice suite has filters that allow it to work with documents created by the Microsoft Office suite

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 36. 

    Evolution is an email client program that can send and receive email messages via the Internet Service Provider (ISP). It is also a personal manager that can store contacts, appointments, reminders, and memos.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 37. 

    GIMP is the primary image editing software in Linux and can be used to create attractive graphics.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 38. 

    The Linux file system comprises a number of standard directories arranged hierarchically beneath the / system root. Using the Linux GUI, a user can navigate around the file system graphically using the File Browser application

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 39. 

    You launch a shell terminal window to work at the command line using one of the shells, such as sh, bash, csh, or ksh.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 40. 

    Which of the following tasks can be automated through scripts?

    • A.

      Add new users

    • B.

      Clear out out-of-date or temporary files

    • C.

      Determine the hardware architecture of the computer on which a script is executing.

    • D.

      Encrypt incoming data files for storage or outgoing data files for transmission over the network

    • E.

      All of the above

    Correct Answer
    E. All of the above

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 16, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 17, 2009
    Quiz Created by
    Hamidos1
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.