Linux Prep

40 Questions | Attempts: 138
Share
Please wait...
Question 1 / 40
0 %
0/100
Score 0/100
1. Squid is a proxy caching server for web clients, supporting the protocols HTTP, FTP, TLS, SSL, and HTTPS. By running a cache on a local network, or at least closer to your network than the resources queries, speed can be improved and network bandwidth reduced. When the same resource is requested multiple times by machines served by the same Squid server, the resources is delivered from a server-local copy rather than requiring the request go out over multiple network routers, and to potentially slow or overloaded destination servers.
Submit
Please wait...
About This Quiz
Linux Quizzes & Trivia

Linux to prep for and 2

Personalize your quiz and earn a certificate with your name on it!
2. SMTP, which stands for Simple Mail Transfer Protocol, is the TCP/IP protocol that transfers e-mail messages among computers on an intranet or on the Internet. MTAs use SMTP to communicate. SMTP defines how messages move from one computer's MTA to another's MTA, but not what path the message follows.
Submit
3. Apache log files are an excellent analysis tool to see how effective your web site is. Available files are access log, error log, referer log, and agent log
Submit
4. Authentication is a security property that identifies a user based on credentials.
Submit
5. The desktop environment components include icons, panels, windows, and desktop area. Individual window components include border, buttons, tabs, bars, and main panel.
Submit
6. The Linux file system comprises a number of standard directories arranged hierarchically beneath the / system root. Using the Linux GUI, a user can navigate around the file system graphically using the File Browser application
Submit
7. A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other computers and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.
Submit
8. Samba is an open source implementation of the SMB file sharing protocol that provides file and print services to SMB/CIFS clients
Submit
9. Access control is a security property that determines whether access to a resource is permitted.
Submit
10. Evolution is an email client program that can send and receive email messages via the Internet Service Provider (ISP). It is also a personal manager that can store contacts, appointments, reminders, and memos.
Submit
11. Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. The name Kerberos (Cerberus) comes from Greek mythology; it is the three-headed dog that guarded the entrance to Hades. A free implementation of this protocol is available from the Massachusetts Institute of Technology (MIT). Kerberos is available in many commercial products as well.
Submit
12. X server program takes input from the keyboard and mouse and displays to a screen. The X server accepts requests from graphical output (windows) and sends back user input (keyboard, mouse). The X server communicates with various client programs over the X protocol.
Submit
13. The OpenOffice suite has filters that allow it to work with documents created by the Microsoft Office suite
Submit
14. You launch a shell terminal window to work at the command line using one of the shells, such as sh, bash, csh, or ksh.
Submit
15. Data striping is a technique for writing and reading data sequentially to and from more than one storage device. Before the data is written it is broken up into blocks, these blocks vary in size depending on the RAID configuration (level) used. The blocks of data are then written sequentially to all disks simultaneously into areas called stripes. Because of all the read/write heads are working all the time it increases performance as opposed to writing/retrieving data to and from one disk at a time.
Submit
16. Rootkits may have originated as regular applications, intended to take control of a failing or unresponsive system, but in recent years have been largely malware to help intruders gain access to systems while avoiding detection.
Submit
17. UPS is used to protect computer systems from power problems, such as power spikes and power blackouts.
Submit
18. To perform full and incremental backups, you use the cron utility to schedule the tasks at defined times by adding appropriate entries to the system crontab. You can list the content of the crontab with the –l (el) option. To perform a one-time backup of a set of files, you use the at utility. You use the atq command to check that the job has been scheduled.
Submit
19. Hardening a system means removing unnecessary tools, utilities and administration options from a system in order to prevent future back-door access.
Submit
20. The X is a standard graphical window system for the Linux and Unix operating systems.
Submit
21. GIMP is the primary image editing software in Linux and can be used to create attractive graphics.
Submit
22. In Raid 3 and Raid 5, redundancy is achieved by the use of parity blocks. If a single drive in the array fails, data blocks and a parity block from the working drives can be combined to reconstruct the missing data. For example, if even parity is used and the data blocks are D1 = 00000111, D2 = 00000101, and D3 = 00000000, the parity block will be calculated as 00000010
Submit
23. RAID is a redundant array of independent disk drives used to protect system from HD failure. RAID 0 uses data striping. With RAID 1, data is mirrored on two or more disks, so that if one disk fails, data is read from the other disks. RAID 3 and 5 use parity as redundant information to enable data reconstruction, if one of the drives in the array fails.
Submit
24. You have been called out to your client's site to investigate a suspected security incident on their production ecommerce server. For now, this is classified as a "suspected incident," because no one is sure whether or not the machine was actually attacked. Your job is to find out whether the machine has been successfully attacked, without bringing the system down until you are sure. You have identified a set of files you'd like to take offline for further analysis. You should use tar to copy these to tape.
Submit
25. The default X startup configuration can be found in /usr/lib/X11/xinit/xinitrc
Submit
26. Free software programs, such as mush, elm, and mh, as well as Zmail, Eudora, ClarisWork, Netscape, and Explorer are MUAs that users run to read, reply to, compose, and dispose of email.
Submit
27. What is the difference between telnet and SSH?
Submit
28. Which of the following is the BEST reason administrators should always verify the cryptographic checksums on files they download?
Submit
29. Linux throws away anything you write to
Submit
30. MTA is a mail transfer agent to
Submit
31. Which of the following tasks can be automated through scripts?
Submit
32. Why are some of the most critical systems the LEAST up-to-date?
Submit
33. Samba-enabled Unix machine offers the following services:
Submit
34. The daemon that controls logging is
Submit
35. Which of the following crontab entries will run at 1:30 each morning, removing all files in the /tmp directory that have not been accessed in 3 days?
Submit
36. Which of the following is the best way to keep software secure?
Submit
37. Chkconfig utility ensures that
Submit
38. Which of the following describes how Apache web server works:
Submit
39. What does the /etc/mail/access file do?
Submit
40. Integrity is a security property that ensures information has not been destroyed in an authorized manner.
Submit
View My Results

Quiz Review Timeline (Updated): Mar 16, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 16, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 17, 2009
    Quiz Created by
    Hamidos1
Cancel
  • All
    All (40)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Squid is a proxy caching server for web clients, supporting the ...
SMTP, which stands for Simple Mail Transfer Protocol, is the TCP/IP ...
Apache log files are an excellent analysis tool to see how effective ...
Authentication is a security property that identifies a user based on...
The desktop environment components include icons, panels, windows,...
The Linux file system comprises a number of standard directories ...
A computer worm is a self-replicating computer program. It uses a ...
Samba is an open source implementation of the SMB file sharing...
Access control is a security property that determines whether access...
Evolution is an email client program that can send and receive email ...
Kerberos is a network authentication protocol. It is designed to ...
X server program takes input from the keyboard and mouse and displays ...
The OpenOffice suite has filters that allow it to work with documents...
You launch a shell terminal window to work at the command line using...
Data striping is a technique for writing and reading data...
Rootkits may have originated as regular applications, intended to...
UPS is used to protect computer systems from power problems, such as...
To perform full and incremental backups, you use the cron utility to ...
Hardening a system means removing unnecessary tools, utilities and ...
The X is a standard graphical window system for the Linux and Unix...
GIMP is the primary image editing software in Linux and can be used to...
In Raid 3 and Raid 5, redundancy is achieved by the use of parity ...
RAID is a redundant array of independent disk drives used to protect ...
You have been called out to your client's site to investigate a ...
The default X startup configuration can be found in...
Free software programs, such as mush, elm, and mh, as well as Zmail, ...
What is the difference between telnet and SSH?
Which of the following is the BEST reason administrators should...
Linux throws away anything you write to
MTA is a mail transfer agent to
Which of the following tasks can be automated through scripts?
Why are some of the most critical systems the LEAST up-to-date?
Samba-enabled Unix machine offers the following services:
The daemon that controls logging is
Which of the following crontab entries will run at 1:30 each morning, ...
Which of the following is the best way to keep software secure?
Chkconfig utility ensures that
Which of the following describes how Apache web server works:
What does the /etc/mail/access file do?
Integrity is a security property that ensures information has not been...
Alert!

Advertisement